SlideShare a Scribd company logo
1 of 22
Privacy Networks and the Unified Trust Model
frictionless patient-centric sharing, analysis and personalization
Jonathan Hare
CEO, WebShield, Inc.
2 WebShield Inc.
with no consistent way to…
• find and retrieve patient records
• authenticate and authorize access by patient and their caregivers
• trust policy enforcement and regulatory compliance by other organizations
• share or analyze data without risking privacy, security or commercial rights
US Healthcare is
*wildly* complex
• 320 million people
• 7.8 million clinicians & staff
• inconsistent identifiers & schemas
• highly privacy sensitive & regulated data
• 1,000s of vendors, 10,000s of enterprises, 100,000s of IT systems
• each patient has a unique, fragmented and changing network of data sources and caregivers
Enterprise
Centric
Computing
Patient-Centered
Evidence-Based
Healthcare
No amount of brute force
can make
enterprise-centric computing
support
patient-centric care
on a national scale (let alone global)
4 WebShield Inc.
the
underlying
challenge
“Little Data” Privacy (records of individuals)
“Big Data” Privacy (population-scale analytics)
Commercial Rights (unwilling to share)
Semantic Interoperability (can’t link or understand)
Regulatory Compliance (not allowed to share)
5 WebShield Inc.
“Classical” enterprise-centric techniques
for data sharing and analytics are wildly inadequate
for patient-centered, evidence-based healthcare
HIPAA de-identificationdata use agreements federated analytics
Centralized
Hub
Data
Recipients
Data
Sources
aggregated
statistics
Coordinating
Center
bigger data siloes
meets legal straightjacket
works with enterprise-centric IT
creates “network effects”
exacerbates cyber-security risks
compliance expensive, inflexible
one-size-fits-all, blocks 90% of uses
forces everyone to trust the hub
“data lobotomy”
meets flawed privacy
analytic blind-fold
meets operational straightjacket
no longitudinal records
severely compromises analytics
no user interaction (missing values)
no personalized decision support
simplifies data governance
reduces privacy risks
de-identified
original data
almost always easy to re-identify
can’t de-identify genomic data
severely compromises analytics
unambiguous HIPAA compliance
sounds good (to politicians)
no personalized decision support
analyze at distributed data sources,
aggregate & interpret statistical results.
remove or obfuscate 18 types of
personally identifying attributes.
HIPAA
G-L-BIRS 6103
EU Data Protection Directive
FISMA
contracts specify commercial terms, regulatory
requirements, authorized uses & recipients
7 WebShield Inc.
The underlying problem with “classical” techniques is that there is an
inherent conflict between privacy and sharing…
…or is there?
New Paradigm: “Quantum Privacy”
obfuscate data so that it is both
- fully opaque (meaningless gibberish)
and
- fully computable (no loss of information)
- at the same time…
simultaneously enforce policies of all stakeholders
at the finest possible level of granularity (‘quantum level’)
before any meaningful data is revealed to anyone (including “insiders”)
9 WebShield Inc.
Enabling Quantum Privacy
Unified Trust ModelPrivacy Network
2952.3367731...
sJ92fKA24sL…
72679426.3166…
82Fa4JiqR3i…
93742157.4126…
We2B381H5…
Privacy
Proxy
Node 1 Node 2 Node N
encrypt
tokenize
randomize
crypto-hash
Input Graph
148.53
148.53
clear
text
Privacy Graph
apply
policies
obfuscatePrivacy
Algorithm
management plane
control plane
data plane
tokenized
randomized
crypto-hashed
429jQk1Mz9…
93742157.4126…
We2B381H5…
{148.53} {dx72Fx92Ua…} {T62p2JsV9sI…}
429jQk1Mz9…T62p2JsV9sI…dx72Fx92Ua…
Trust
Authority
Privacy
Network
Privacy Algorithms
Graphs broken up into individual values, obfuscated by distributed “privacy pipes”,
then re-assembled into a “privacy graph” made up of opaque tokens.
• privacy graphs are opaque and meaningless to any observer, yet fully computable.
• algorithms and policies can be executed data without revealing anything to anyone.
• any data, algorithms,
or policy definitions.
• provenance, schema
& trust criteria
Privacy
Proxy
Node 1 Node 2 Node N
encrypt
tokenize
randomize
crypto-hash
Input Graph
148.53
148.53
clear
text
148.53
Privacy Graph
apply
policies
obfuscate
enforce
policies
de-obfuscate
Privacy
Algorithm
management plane
control plane
data plane
tokenized
randomized
crypto-hashed
429jQk1Mz9…
93742157.4126…
We2B381H5…
429jQk1Mz9…
{148.53} {dx72Fx92Ua…} {T62p2JsV9sI…}
429jQk1Mz9…T62p2JsV9sI…dx72Fx92Ua…
Trust
Authority
Privacy Algorithms
Privacy graph information can be resolved into clear text only after all of the
trust criteria linked to all resources that contributed to creating it are enforced.
Privacy
Network
vastly better security and privacy (thousands to millions of times harder to breach)
unlimited aggregation and analysis with no loss of accuracy
precision access control (single attribute, single recipient, specified purpose, 1-
time)
trust criteria inherited automatically by all aggregates and analytic outputs
no need to agree on trust criteria
Privacy Network Advantage
13 WebShield Inc.
Trust Criteria
Identity & Security Assurance
Authorized Recipients & Purposes
IT Interoperability
Payment & Licensing Terms
Regulatory Compliance
Trust Validation Model
Rating & Reputation Metrics
Governance Processes
Trust Authorities
Audit & Certification Processes
Assessment Methodologies
Unified
Trust Model
Trust Policy Model
Assessment & Validation
Legal Agreements
Computable Trust
Trust Requirements
Provenance
Trust Resource Model
Resource Description
allows diverse policies specified by different stakeholders (e.g. user, record
subject, publisher, regulator, etc.) to be enforced by neutral trust authorities.
data
metrics software
computing
infrastructure
devices
physical assets
organizations
policiescontracts
algorithms
accounts
brands
relationships
people
14 WebShield Inc.
Applications of the Privacy Network
Nationwide Identity Network
Patient-Centered Record/Attribute Discovery and Linking
HIPPA-Compliant Access Authorization and Sharing
Privacy Network
Buy Season Pass $19.99
Watch Ad-Free for $1.99
Watch Free with AdsWatch Free with Ads
Accept Privacy Protection
Show Policies
The Privacy Network uses information about you to
authorize access to content, protect you from identity
theft, and to enforce privacy policies on the use of
your information and files.
Cancel
explain
First-time users must opt-in to privacy
policies in order to access protected
content (e.g. a football game).
Authorizes use of obfuscated data to:
• Authenticate user and verify
attributes and relationships.
• Anonymously detect user devices.
• Analyze activity to detect identity
theft & cyber-security fraud.
• Locate and authorize access to user’s
records, accounts and digital media.
• Enforce user-controlled security,
privacy and personalization policies.
• Identity theft protection with multi-factor
authentication and identity proofing.
• User’s identity, personal data and activity
hidden – no insider access by anyone.
• Personal information only revealed if
authorized by user.
Privacy Network
Buy Season Pass $19.99
Watch Ad-Free for $1.99
Watch Free with AdsWatch Free with Ads
(1) first-time users enter any
attribute (phone, email, etc.)
that specifies their identity.
Commercial
Credit
Bureaus
Phone
RegistriesProfessional
Licensing
Marketing
Profiles
Data
Aggregators
Fraud
Analytics
Enterprise
Healthcare
Records
Security
DirectoriesEmployer
HR
Retailer
Affinity ProgramsSupply-
Chain
Insurance
Databases
Banking
Records`
CRM
ERP
Government
Education
Records
Public
Records DMV
Records
State & Local
Records
IRS
Records
Social
Security
Citizenship &
Immigration
Healthcare
Data
Sources
(3) global virtual database of
obfuscated data used to verify
user’s identity, authorize access
and derive authentication options.
Accept Privacy Protection
Show Policies Cancel
explain
Text my Cell Send me Email
your phone your email- or -
The Privacy Network does not recognize this device. To
authorize access, please enter one of the following:
other options
verify deviceverify device
(Y4t) rG2-Ua91
xRs4Mw42dAk
baX3yPEq7Nm
(6) obfuscated log
entries returned
(5) user authenticated, which in turn:
• verifies identity, authorizes access
• validates privacy protection opt-in
• registers device to enable subsequent
no-login access
no personal information revealed to anyone
y4s rG22fa9i
xRs4Mw42dAk
baX3yPEq7Nm
phone
voice print
password
Authentication Services
device
fingerprint
email
fingerprint
facial
biometric
(415) 265-3250
jonathan.hare@me.com
FaceBookID 2335135
Trust
Authorities
Y4t7rG25Ua91
(415) 265-3250
(2) attributes obfuscated and
submitted to Trust Authorities.
(4) obfuscated authentication
parameters passed to neutral
authentication services.
• Global single-sign-on, anonymous identity proofing and attribute verification.
• Simple ‘no-click’ access, strong authentication without passwords.
• Anonymously matches users with their digital content, accounts and records.
• Eliminates identity theft and related cyber-security fraud.
Trusted Identity Network
Child
Teacher
Clinician
Colleague
Friend
Spouse
any
credential
or relationship
Privacy Network
any
social media or
messaging clients
any digital
content
general health education banking children online
My Policies edit my polices JonathanHare cancel
people
devices
security
payments
advertising
messaging
privacy
general
Users and organizations can link policies directly to their content, and freely share it
through standard messaging clients, social media apps and collaboration tools.
Content is encrypted end-to-end
until recipient is authenticated and
authorized, and not revealed to
apps or websites used for sharing.
Enforces policies on verified
identities and relationships of
individual people, devices and
services…
Harnessing HIPAA to enable (rather than block) access by patients and providers…
• Nationwide
• High Assurance
• On Demand
• Vendor Neutral
• Certified ComplianceRecords Discovery &
Access Authorization
Identity & HIPAA
Trust Authorities
Privacy Network
Informed Consent
& Consumer Opt-In
• Enables nationwide patient
record discovery and access.
• Enforces HIPAA Patient Mandate
for patient requests, HIPAA
Authorization for provider
requests.
Payer
Infusion
Center
Oncology Medical
Home
Clinical
Oncologist
Skilled Nursing
Facility
Radiation
Treatment Center
Home
Caregiver
Primary
Care Provider
Patient
Claims
Records
EHR
Records
Lab
Records
Pharmacy
Records
Genomic
Data
Practice
Management
Device
Data
Demographic
Data
Privacy Network
population & practice metrics
personalized clinical decision support
patient-centered coordination of care
records access & secure messaging
All-payer, all-patient, all-provider, all-purpose network
Providers
Data Sources
21 WebShield Inc.
Nationwide Secure Sharing, Compliance Verification and Attribute Discovery
Apps,
Databases
Services Patient Data
Identity &
Compliance
Data
Proxy
Data
Proxy
Patient Records
Attributes
Metrics
Privacy
Network
• Cloud-based verification of IT security and HIPAA compliance by neutral trust authorities.
• Secure sharing with any organizations or individuals without requiring IT support.
• Identity disambiguation across demographic identifiers, patient IDs, insurance IDs, etc.
• Nationwide attribute discovery and patient-centered longitudinal record syndication.
Payers
Data Security
Encryption
Key Management
Security Directory
z
Data Sources
Nationwide Single-Sign-On User Authentication, Authorization & Compliance
Providers
Patient Data
Identity &
Compliance
Data
Proxy
Data
Proxy
User
Proxy
Identity
Syndicate
Trust
Authorities
Privacy
Network
• Links diverse single-sign-on and identity infrastructure into nationwide identity syndicate.
• National scale attribute-based access control and dynamic user / attribute proofing.
• Identity assurance and HIPAA compliance verified by neutral trust authorities.
Apps,
Databases
Services
Single Sign-On
OpenID Connect, OAuth2,
SAML2, LDAP, etc.
Payers

More Related Content

What's hot

Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
Health delivery information system [HDIS] MVP
Health delivery information system [HDIS] MVPHealth delivery information system [HDIS] MVP
Health delivery information system [HDIS] MVPACCESS Health Digital
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcarekhalidhassan105
 
Blockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewBlockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewDebut Infotech
 
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...Mark Scrimshire
 
Blood Establishment Computer Software (BECS) - SoftBank.web
Blood Establishment Computer Software (BECS) - SoftBank.webBlood Establishment Computer Software (BECS) - SoftBank.web
Blood Establishment Computer Software (BECS) - SoftBank.webEMMAIntl
 
Streamline denial management process with intelligent automation
Streamline denial management process with intelligent automationStreamline denial management process with intelligent automation
Streamline denial management process with intelligent automationRuchi Jain
 
BlueButton on FHIR - HxRefactored 2016
BlueButton on FHIR - HxRefactored 2016BlueButton on FHIR - HxRefactored 2016
BlueButton on FHIR - HxRefactored 2016Mark Scrimshire
 
Aneesh Chopra - HealthCa.mp/dev Keynote. 2016: the Year to participate in the...
Aneesh Chopra - HealthCa.mp/dev Keynote. 2016: the Year to participate in the...Aneesh Chopra - HealthCa.mp/dev Keynote. 2016: the Year to participate in the...
Aneesh Chopra - HealthCa.mp/dev Keynote. 2016: the Year to participate in the...Mark Scrimshire
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007Richard Moore
 
Sentry Data Systems Revenue Cycle BI application
Sentry Data Systems Revenue Cycle BI applicationSentry Data Systems Revenue Cycle BI application
Sentry Data Systems Revenue Cycle BI applicationWilliam Kirsh, DO, MPH
 
BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf Mark Scrimshire
 
Blockchain system in healthcare | Vechain Introduced Data Management System a...
Blockchain system in healthcare | Vechain Introduced Data Management System a...Blockchain system in healthcare | Vechain Introduced Data Management System a...
Blockchain system in healthcare | Vechain Introduced Data Management System a...Mariya James
 
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET Journal
 
Health insurance information platform (hiip)
Health insurance information platform (hiip)Health insurance information platform (hiip)
Health insurance information platform (hiip)ACCESS Health Digital
 
CMS BlueButton on FHIR at Cinderblocks3
CMS BlueButton on FHIR at Cinderblocks3 CMS BlueButton on FHIR at Cinderblocks3
CMS BlueButton on FHIR at Cinderblocks3 Mark Scrimshire
 
Blockchain technology and innovation in insurance sector
Blockchain technology and innovation in insurance sectorBlockchain technology and innovation in insurance sector
Blockchain technology and innovation in insurance sectorGlobal Tech Council
 

What's hot (20)

Health information exchange (HIE)
Health information exchange (HIE)Health information exchange (HIE)
Health information exchange (HIE)
 
Cardio Track
Cardio TrackCardio Track
Cardio Track
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
Health delivery information system [HDIS] MVP
Health delivery information system [HDIS] MVPHealth delivery information system [HDIS] MVP
Health delivery information system [HDIS] MVP
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcare
 
Blockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewBlockchain in Healthcare: An Overview
Blockchain in Healthcare: An Overview
 
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...
 
Blood Establishment Computer Software (BECS) - SoftBank.web
Blood Establishment Computer Software (BECS) - SoftBank.webBlood Establishment Computer Software (BECS) - SoftBank.web
Blood Establishment Computer Software (BECS) - SoftBank.web
 
Streamline denial management process with intelligent automation
Streamline denial management process with intelligent automationStreamline denial management process with intelligent automation
Streamline denial management process with intelligent automation
 
Health Bit Webinar 612010
Health Bit Webinar 612010Health Bit Webinar 612010
Health Bit Webinar 612010
 
BlueButton on FHIR - HxRefactored 2016
BlueButton on FHIR - HxRefactored 2016BlueButton on FHIR - HxRefactored 2016
BlueButton on FHIR - HxRefactored 2016
 
Aneesh Chopra - HealthCa.mp/dev Keynote. 2016: the Year to participate in the...
Aneesh Chopra - HealthCa.mp/dev Keynote. 2016: the Year to participate in the...Aneesh Chopra - HealthCa.mp/dev Keynote. 2016: the Year to participate in the...
Aneesh Chopra - HealthCa.mp/dev Keynote. 2016: the Year to participate in the...
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007
 
Sentry Data Systems Revenue Cycle BI application
Sentry Data Systems Revenue Cycle BI applicationSentry Data Systems Revenue Cycle BI application
Sentry Data Systems Revenue Cycle BI application
 
BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf
 
Blockchain system in healthcare | Vechain Introduced Data Management System a...
Blockchain system in healthcare | Vechain Introduced Data Management System a...Blockchain system in healthcare | Vechain Introduced Data Management System a...
Blockchain system in healthcare | Vechain Introduced Data Management System a...
 
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare Records
 
Health insurance information platform (hiip)
Health insurance information platform (hiip)Health insurance information platform (hiip)
Health insurance information platform (hiip)
 
CMS BlueButton on FHIR at Cinderblocks3
CMS BlueButton on FHIR at Cinderblocks3 CMS BlueButton on FHIR at Cinderblocks3
CMS BlueButton on FHIR at Cinderblocks3
 
Blockchain technology and innovation in insurance sector
Blockchain technology and innovation in insurance sectorBlockchain technology and innovation in insurance sector
Blockchain technology and innovation in insurance sector
 

Viewers also liked

ROBERT SCHICKLER'S RESUME ##
ROBERT SCHICKLER'S RESUME ##ROBERT SCHICKLER'S RESUME ##
ROBERT SCHICKLER'S RESUME ##Rob Schickler
 
Week 2 Exploration: Storyboard
Week 2 Exploration: StoryboardWeek 2 Exploration: Storyboard
Week 2 Exploration: StoryboardPaula‎ Howard
 
Resume sample emily wernndocx
Resume sample emily wernndocxResume sample emily wernndocx
Resume sample emily wernndocxewrenn
 
Making Small Data BIG (UT Austin, March 2016)
Making Small Data BIG (UT Austin, March 2016)Making Small Data BIG (UT Austin, March 2016)
Making Small Data BIG (UT Austin, March 2016)Kerstin Lehnert
 
HXR 2016: Improving Care Experiences through Human-Centered Design - Katie Ab...
HXR 2016: Improving Care Experiences through Human-Centered Design - Katie Ab...HXR 2016: Improving Care Experiences through Human-Centered Design - Katie Ab...
HXR 2016: Improving Care Experiences through Human-Centered Design - Katie Ab...HxRefactored
 
5.3 Régression logistique
5.3 Régression logistique5.3 Régression logistique
5.3 Régression logistiqueBoris Guarisma
 
AI & Big Data Analytics : Innovation trends and use cases
AI & Big Data Analytics : Innovation trends and use casesAI & Big Data Analytics : Innovation trends and use cases
AI & Big Data Analytics : Innovation trends and use casesSarvesh Kumar
 
Les 100-questions-classiques-dun-entretien-dembauche
Les 100-questions-classiques-dun-entretien-dembaucheLes 100-questions-classiques-dun-entretien-dembauche
Les 100-questions-classiques-dun-entretien-dembauchehassan1488
 
HXR 2016: Improving Insurance Member Experiences -Dr. Vidya Raman-Tangella
HXR 2016: Improving Insurance Member Experiences -Dr. Vidya Raman-TangellaHXR 2016: Improving Insurance Member Experiences -Dr. Vidya Raman-Tangella
HXR 2016: Improving Insurance Member Experiences -Dr. Vidya Raman-TangellaHxRefactored
 

Viewers also liked (10)

ROBERT SCHICKLER'S RESUME ##
ROBERT SCHICKLER'S RESUME ##ROBERT SCHICKLER'S RESUME ##
ROBERT SCHICKLER'S RESUME ##
 
Week 2 Exploration: Storyboard
Week 2 Exploration: StoryboardWeek 2 Exploration: Storyboard
Week 2 Exploration: Storyboard
 
Resume sample emily wernndocx
Resume sample emily wernndocxResume sample emily wernndocx
Resume sample emily wernndocx
 
Making Small Data BIG (UT Austin, March 2016)
Making Small Data BIG (UT Austin, March 2016)Making Small Data BIG (UT Austin, March 2016)
Making Small Data BIG (UT Austin, March 2016)
 
HXR 2016: Improving Care Experiences through Human-Centered Design - Katie Ab...
HXR 2016: Improving Care Experiences through Human-Centered Design - Katie Ab...HXR 2016: Improving Care Experiences through Human-Centered Design - Katie Ab...
HXR 2016: Improving Care Experiences through Human-Centered Design - Katie Ab...
 
El orgullo final
El orgullo  finalEl orgullo  final
El orgullo final
 
5.3 Régression logistique
5.3 Régression logistique5.3 Régression logistique
5.3 Régression logistique
 
AI & Big Data Analytics : Innovation trends and use cases
AI & Big Data Analytics : Innovation trends and use casesAI & Big Data Analytics : Innovation trends and use cases
AI & Big Data Analytics : Innovation trends and use cases
 
Les 100-questions-classiques-dun-entretien-dembauche
Les 100-questions-classiques-dun-entretien-dembaucheLes 100-questions-classiques-dun-entretien-dembauche
Les 100-questions-classiques-dun-entretien-dembauche
 
HXR 2016: Improving Insurance Member Experiences -Dr. Vidya Raman-Tangella
HXR 2016: Improving Insurance Member Experiences -Dr. Vidya Raman-TangellaHXR 2016: Improving Insurance Member Experiences -Dr. Vidya Raman-Tangella
HXR 2016: Improving Insurance Member Experiences -Dr. Vidya Raman-Tangella
 

Similar to HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield

WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)rich_webshield
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHellmuth Broda
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copySandra (Sandy) Dunn
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final projectKelly Giambra
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...Ulf Mattsson
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxHumphrey Humphrey
 
Insider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and ContractorsInsider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and ContractorsButlerRubin
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companiesRoger Royse
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
HCMUT IMP Computer Science 20 - E-Government from the view of Privacy
HCMUT IMP Computer Science 20 - E-Government from the view of PrivacyHCMUT IMP Computer Science 20 - E-Government from the view of Privacy
HCMUT IMP Computer Science 20 - E-Government from the view of PrivacyDuc Lai Trung Minh
 

Similar to HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield (20)

WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' Data
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final project
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Smart grid
Smart gridSmart grid
Smart grid
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
 
Insider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and ContractorsInsider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and Contractors
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
HCMUT IMP Computer Science 20 - E-Government from the view of Privacy
HCMUT IMP Computer Science 20 - E-Government from the view of PrivacyHCMUT IMP Computer Science 20 - E-Government from the view of Privacy
HCMUT IMP Computer Science 20 - E-Government from the view of Privacy
 

More from HxRefactored

HXR 2017: Denise Gosnell, Pokitdok: Blockchain: The Now and The Future:
HXR 2017: Denise Gosnell, Pokitdok: Blockchain: The Now and The Future: HXR 2017: Denise Gosnell, Pokitdok: Blockchain: The Now and The Future:
HXR 2017: Denise Gosnell, Pokitdok: Blockchain: The Now and The Future: HxRefactored
 
HXR 2017: Susan Hunt Stevens, WeSpire: Holistic Wellbeing
HXR 2017: Susan Hunt Stevens, WeSpire: Holistic WellbeingHXR 2017: Susan Hunt Stevens, WeSpire: Holistic Wellbeing
HXR 2017: Susan Hunt Stevens, WeSpire: Holistic WellbeingHxRefactored
 
HXR 2017: John Weiss, Human Design: Building a Culture of Health
HXR 2017: John Weiss, Human Design: Building a Culture of HealthHXR 2017: John Weiss, Human Design: Building a Culture of Health
HXR 2017: John Weiss, Human Design: Building a Culture of HealthHxRefactored
 
HXR 2017: Juhan Sonin, GoInvo
HXR 2017: Juhan Sonin, GoInvoHXR 2017: Juhan Sonin, GoInvo
HXR 2017: Juhan Sonin, GoInvoHxRefactored
 
HXR 2017: Heather Patrick, Carrot Sense: Motivation and Health Behavior Change
HXR 2017: Heather Patrick, Carrot Sense: Motivation and Health Behavior ChangeHXR 2017: Heather Patrick, Carrot Sense: Motivation and Health Behavior Change
HXR 2017: Heather Patrick, Carrot Sense: Motivation and Health Behavior ChangeHxRefactored
 
HXR 2017: Casey Quinlan: the Price is Right
HXR 2017: Casey Quinlan: the Price is RightHXR 2017: Casey Quinlan: the Price is Right
HXR 2017: Casey Quinlan: the Price is RightHxRefactored
 
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...HxRefactored
 
HXR 2017: Jay Gupta, RxRelax: RxRelax to Reverse Polypharmacy Trends
HXR 2017: Jay Gupta, RxRelax: RxRelax to Reverse Polypharmacy TrendsHXR 2017: Jay Gupta, RxRelax: RxRelax to Reverse Polypharmacy Trends
HXR 2017: Jay Gupta, RxRelax: RxRelax to Reverse Polypharmacy TrendsHxRefactored
 
HXR 2017: Kathleen Howland, Berklee College of Music: Music Therapy in Health...
HXR 2017: Kathleen Howland, Berklee College of Music: Music Therapy in Health...HXR 2017: Kathleen Howland, Berklee College of Music: Music Therapy in Health...
HXR 2017: Kathleen Howland, Berklee College of Music: Music Therapy in Health...HxRefactored
 
HXR 2017: Center for Health Experience Design Announcement
HXR 2017: Center for Health Experience Design Announcement HXR 2017: Center for Health Experience Design Announcement
HXR 2017: Center for Health Experience Design Announcement HxRefactored
 
HXR 2017: Paul Kahn, Mad*Pow: Lessons Learned from a Bill you can understand
HXR 2017: Paul Kahn, Mad*Pow: Lessons Learned from a Bill you can understandHXR 2017: Paul Kahn, Mad*Pow: Lessons Learned from a Bill you can understand
HXR 2017: Paul Kahn, Mad*Pow: Lessons Learned from a Bill you can understandHxRefactored
 
HXR 2017: Design Challenge Announcement!
HXR 2017: Design Challenge Announcement!HXR 2017: Design Challenge Announcement!
HXR 2017: Design Challenge Announcement!HxRefactored
 
HXR 2017: Aneesh Chopra, NavHealth: Call to Action: All Hands on Deck to Brin...
HXR 2017: Aneesh Chopra, NavHealth: Call to Action: All Hands on Deck to Brin...HXR 2017: Aneesh Chopra, NavHealth: Call to Action: All Hands on Deck to Brin...
HXR 2017: Aneesh Chopra, NavHealth: Call to Action: All Hands on Deck to Brin...HxRefactored
 
HXR 2017: Amy Cueva, Mad*Pow: Purpose Driven Design
HXR 2017: Amy Cueva, Mad*Pow: Purpose Driven DesignHXR 2017: Amy Cueva, Mad*Pow: Purpose Driven Design
HXR 2017: Amy Cueva, Mad*Pow: Purpose Driven DesignHxRefactored
 
HXR 2016: Sustainable Design -Jen Briselli, James Christie, Mad*Pow
HXR 2016: Sustainable Design -Jen Briselli, James Christie, Mad*PowHXR 2016: Sustainable Design -Jen Briselli, James Christie, Mad*Pow
HXR 2016: Sustainable Design -Jen Briselli, James Christie, Mad*PowHxRefactored
 
HXR 2016: Designing for Addiction and Recovery -Mary Beth Schoening, Behavior...
HXR 2016: Designing for Addiction and Recovery -Mary Beth Schoening, Behavior...HXR 2016: Designing for Addiction and Recovery -Mary Beth Schoening, Behavior...
HXR 2016: Designing for Addiction and Recovery -Mary Beth Schoening, Behavior...HxRefactored
 
HXR 2016: Addressing the Opioid Crisis
HXR 2016: Addressing the Opioid CrisisHXR 2016: Addressing the Opioid Crisis
HXR 2016: Addressing the Opioid CrisisHxRefactored
 
HXR 2016: New Models for Care Delivery -Andrew Schutzbank, Iora Health
HXR 2016: New Models for Care Delivery -Andrew Schutzbank, Iora HealthHXR 2016: New Models for Care Delivery -Andrew Schutzbank, Iora Health
HXR 2016: New Models for Care Delivery -Andrew Schutzbank, Iora HealthHxRefactored
 
HXR 2016: New Models for Care Delivery -Ethan Berke, Dartmouth-Hitchcock
HXR 2016: New Models for Care Delivery -Ethan Berke, Dartmouth-HitchcockHXR 2016: New Models for Care Delivery -Ethan Berke, Dartmouth-Hitchcock
HXR 2016: New Models for Care Delivery -Ethan Berke, Dartmouth-HitchcockHxRefactored
 
HXR 2016: Human Focused Innovation in a Clinical Setting -Lesley Solomon, Bri...
HXR 2016: Human Focused Innovation in a Clinical Setting -Lesley Solomon, Bri...HXR 2016: Human Focused Innovation in a Clinical Setting -Lesley Solomon, Bri...
HXR 2016: Human Focused Innovation in a Clinical Setting -Lesley Solomon, Bri...HxRefactored
 

More from HxRefactored (20)

HXR 2017: Denise Gosnell, Pokitdok: Blockchain: The Now and The Future:
HXR 2017: Denise Gosnell, Pokitdok: Blockchain: The Now and The Future: HXR 2017: Denise Gosnell, Pokitdok: Blockchain: The Now and The Future:
HXR 2017: Denise Gosnell, Pokitdok: Blockchain: The Now and The Future:
 
HXR 2017: Susan Hunt Stevens, WeSpire: Holistic Wellbeing
HXR 2017: Susan Hunt Stevens, WeSpire: Holistic WellbeingHXR 2017: Susan Hunt Stevens, WeSpire: Holistic Wellbeing
HXR 2017: Susan Hunt Stevens, WeSpire: Holistic Wellbeing
 
HXR 2017: John Weiss, Human Design: Building a Culture of Health
HXR 2017: John Weiss, Human Design: Building a Culture of HealthHXR 2017: John Weiss, Human Design: Building a Culture of Health
HXR 2017: John Weiss, Human Design: Building a Culture of Health
 
HXR 2017: Juhan Sonin, GoInvo
HXR 2017: Juhan Sonin, GoInvoHXR 2017: Juhan Sonin, GoInvo
HXR 2017: Juhan Sonin, GoInvo
 
HXR 2017: Heather Patrick, Carrot Sense: Motivation and Health Behavior Change
HXR 2017: Heather Patrick, Carrot Sense: Motivation and Health Behavior ChangeHXR 2017: Heather Patrick, Carrot Sense: Motivation and Health Behavior Change
HXR 2017: Heather Patrick, Carrot Sense: Motivation and Health Behavior Change
 
HXR 2017: Casey Quinlan: the Price is Right
HXR 2017: Casey Quinlan: the Price is RightHXR 2017: Casey Quinlan: the Price is Right
HXR 2017: Casey Quinlan: the Price is Right
 
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
 
HXR 2017: Jay Gupta, RxRelax: RxRelax to Reverse Polypharmacy Trends
HXR 2017: Jay Gupta, RxRelax: RxRelax to Reverse Polypharmacy TrendsHXR 2017: Jay Gupta, RxRelax: RxRelax to Reverse Polypharmacy Trends
HXR 2017: Jay Gupta, RxRelax: RxRelax to Reverse Polypharmacy Trends
 
HXR 2017: Kathleen Howland, Berklee College of Music: Music Therapy in Health...
HXR 2017: Kathleen Howland, Berklee College of Music: Music Therapy in Health...HXR 2017: Kathleen Howland, Berklee College of Music: Music Therapy in Health...
HXR 2017: Kathleen Howland, Berklee College of Music: Music Therapy in Health...
 
HXR 2017: Center for Health Experience Design Announcement
HXR 2017: Center for Health Experience Design Announcement HXR 2017: Center for Health Experience Design Announcement
HXR 2017: Center for Health Experience Design Announcement
 
HXR 2017: Paul Kahn, Mad*Pow: Lessons Learned from a Bill you can understand
HXR 2017: Paul Kahn, Mad*Pow: Lessons Learned from a Bill you can understandHXR 2017: Paul Kahn, Mad*Pow: Lessons Learned from a Bill you can understand
HXR 2017: Paul Kahn, Mad*Pow: Lessons Learned from a Bill you can understand
 
HXR 2017: Design Challenge Announcement!
HXR 2017: Design Challenge Announcement!HXR 2017: Design Challenge Announcement!
HXR 2017: Design Challenge Announcement!
 
HXR 2017: Aneesh Chopra, NavHealth: Call to Action: All Hands on Deck to Brin...
HXR 2017: Aneesh Chopra, NavHealth: Call to Action: All Hands on Deck to Brin...HXR 2017: Aneesh Chopra, NavHealth: Call to Action: All Hands on Deck to Brin...
HXR 2017: Aneesh Chopra, NavHealth: Call to Action: All Hands on Deck to Brin...
 
HXR 2017: Amy Cueva, Mad*Pow: Purpose Driven Design
HXR 2017: Amy Cueva, Mad*Pow: Purpose Driven DesignHXR 2017: Amy Cueva, Mad*Pow: Purpose Driven Design
HXR 2017: Amy Cueva, Mad*Pow: Purpose Driven Design
 
HXR 2016: Sustainable Design -Jen Briselli, James Christie, Mad*Pow
HXR 2016: Sustainable Design -Jen Briselli, James Christie, Mad*PowHXR 2016: Sustainable Design -Jen Briselli, James Christie, Mad*Pow
HXR 2016: Sustainable Design -Jen Briselli, James Christie, Mad*Pow
 
HXR 2016: Designing for Addiction and Recovery -Mary Beth Schoening, Behavior...
HXR 2016: Designing for Addiction and Recovery -Mary Beth Schoening, Behavior...HXR 2016: Designing for Addiction and Recovery -Mary Beth Schoening, Behavior...
HXR 2016: Designing for Addiction and Recovery -Mary Beth Schoening, Behavior...
 
HXR 2016: Addressing the Opioid Crisis
HXR 2016: Addressing the Opioid CrisisHXR 2016: Addressing the Opioid Crisis
HXR 2016: Addressing the Opioid Crisis
 
HXR 2016: New Models for Care Delivery -Andrew Schutzbank, Iora Health
HXR 2016: New Models for Care Delivery -Andrew Schutzbank, Iora HealthHXR 2016: New Models for Care Delivery -Andrew Schutzbank, Iora Health
HXR 2016: New Models for Care Delivery -Andrew Schutzbank, Iora Health
 
HXR 2016: New Models for Care Delivery -Ethan Berke, Dartmouth-Hitchcock
HXR 2016: New Models for Care Delivery -Ethan Berke, Dartmouth-HitchcockHXR 2016: New Models for Care Delivery -Ethan Berke, Dartmouth-Hitchcock
HXR 2016: New Models for Care Delivery -Ethan Berke, Dartmouth-Hitchcock
 
HXR 2016: Human Focused Innovation in a Clinical Setting -Lesley Solomon, Bri...
HXR 2016: Human Focused Innovation in a Clinical Setting -Lesley Solomon, Bri...HXR 2016: Human Focused Innovation in a Clinical Setting -Lesley Solomon, Bri...
HXR 2016: Human Focused Innovation in a Clinical Setting -Lesley Solomon, Bri...
 

Recently uploaded

Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknowgragteena
 
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girls Service Chandigarh Ayushi
 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591adityaroy0215
 
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaRussian Call Girls in Ludhiana
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...Call Girls Noida
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girls Service Gurgaon
 
Russian Call Girls Gurgaon Swara 9711199012 Independent Escort Service Gurgaon
Russian Call Girls Gurgaon Swara 9711199012 Independent Escort Service GurgaonRussian Call Girls Gurgaon Swara 9711199012 Independent Escort Service Gurgaon
Russian Call Girls Gurgaon Swara 9711199012 Independent Escort Service GurgaonCall Girls Service Gurgaon
 
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130  Available With RoomVIP Kolkata Call Girl New Town 👉 8250192130  Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
Dehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service DehradunDehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service DehradunNiamh verma
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxAyush Gupta
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591adityaroy0215
 
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in UdaipurUdaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipurseemahedar019
 

Recently uploaded (20)

Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
 
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
 
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
 
Russian Call Girls Gurgaon Swara 9711199012 Independent Escort Service Gurgaon
Russian Call Girls Gurgaon Swara 9711199012 Independent Escort Service GurgaonRussian Call Girls Gurgaon Swara 9711199012 Independent Escort Service Gurgaon
Russian Call Girls Gurgaon Swara 9711199012 Independent Escort Service Gurgaon
 
Call Girls in Lucknow Esha 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
Call Girls in Lucknow Esha 🔝 8923113531  🔝 🎶 Independent Escort Service LucknowCall Girls in Lucknow Esha 🔝 8923113531  🔝 🎶 Independent Escort Service Lucknow
Call Girls in Lucknow Esha 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
 
#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi
#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi
#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi
 
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130  Available With RoomVIP Kolkata Call Girl New Town 👉 8250192130  Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
Dehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service DehradunDehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service Dehradun
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptx
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
 
Call Girl Lucknow Gauri 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
Call Girl Lucknow Gauri 🔝 8923113531  🔝 🎶 Independent Escort Service LucknowCall Girl Lucknow Gauri 🔝 8923113531  🔝 🎶 Independent Escort Service Lucknow
Call Girl Lucknow Gauri 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
 
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
 
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in UdaipurUdaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
 

HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield

  • 1. Privacy Networks and the Unified Trust Model frictionless patient-centric sharing, analysis and personalization Jonathan Hare CEO, WebShield, Inc.
  • 2. 2 WebShield Inc. with no consistent way to… • find and retrieve patient records • authenticate and authorize access by patient and their caregivers • trust policy enforcement and regulatory compliance by other organizations • share or analyze data without risking privacy, security or commercial rights US Healthcare is *wildly* complex • 320 million people • 7.8 million clinicians & staff • inconsistent identifiers & schemas • highly privacy sensitive & regulated data • 1,000s of vendors, 10,000s of enterprises, 100,000s of IT systems • each patient has a unique, fragmented and changing network of data sources and caregivers Enterprise Centric Computing Patient-Centered Evidence-Based Healthcare
  • 3. No amount of brute force can make enterprise-centric computing support patient-centric care on a national scale (let alone global)
  • 4. 4 WebShield Inc. the underlying challenge “Little Data” Privacy (records of individuals) “Big Data” Privacy (population-scale analytics) Commercial Rights (unwilling to share) Semantic Interoperability (can’t link or understand) Regulatory Compliance (not allowed to share)
  • 5. 5 WebShield Inc. “Classical” enterprise-centric techniques for data sharing and analytics are wildly inadequate for patient-centered, evidence-based healthcare
  • 6. HIPAA de-identificationdata use agreements federated analytics Centralized Hub Data Recipients Data Sources aggregated statistics Coordinating Center bigger data siloes meets legal straightjacket works with enterprise-centric IT creates “network effects” exacerbates cyber-security risks compliance expensive, inflexible one-size-fits-all, blocks 90% of uses forces everyone to trust the hub “data lobotomy” meets flawed privacy analytic blind-fold meets operational straightjacket no longitudinal records severely compromises analytics no user interaction (missing values) no personalized decision support simplifies data governance reduces privacy risks de-identified original data almost always easy to re-identify can’t de-identify genomic data severely compromises analytics unambiguous HIPAA compliance sounds good (to politicians) no personalized decision support analyze at distributed data sources, aggregate & interpret statistical results. remove or obfuscate 18 types of personally identifying attributes. HIPAA G-L-BIRS 6103 EU Data Protection Directive FISMA contracts specify commercial terms, regulatory requirements, authorized uses & recipients
  • 7. 7 WebShield Inc. The underlying problem with “classical” techniques is that there is an inherent conflict between privacy and sharing… …or is there?
  • 8. New Paradigm: “Quantum Privacy” obfuscate data so that it is both - fully opaque (meaningless gibberish) and - fully computable (no loss of information) - at the same time… simultaneously enforce policies of all stakeholders at the finest possible level of granularity (‘quantum level’) before any meaningful data is revealed to anyone (including “insiders”)
  • 9. 9 WebShield Inc. Enabling Quantum Privacy Unified Trust ModelPrivacy Network
  • 10. 2952.3367731... sJ92fKA24sL… 72679426.3166… 82Fa4JiqR3i… 93742157.4126… We2B381H5… Privacy Proxy Node 1 Node 2 Node N encrypt tokenize randomize crypto-hash Input Graph 148.53 148.53 clear text Privacy Graph apply policies obfuscatePrivacy Algorithm management plane control plane data plane tokenized randomized crypto-hashed 429jQk1Mz9… 93742157.4126… We2B381H5… {148.53} {dx72Fx92Ua…} {T62p2JsV9sI…} 429jQk1Mz9…T62p2JsV9sI…dx72Fx92Ua… Trust Authority Privacy Network Privacy Algorithms Graphs broken up into individual values, obfuscated by distributed “privacy pipes”, then re-assembled into a “privacy graph” made up of opaque tokens. • privacy graphs are opaque and meaningless to any observer, yet fully computable. • algorithms and policies can be executed data without revealing anything to anyone. • any data, algorithms, or policy definitions. • provenance, schema & trust criteria
  • 11. Privacy Proxy Node 1 Node 2 Node N encrypt tokenize randomize crypto-hash Input Graph 148.53 148.53 clear text 148.53 Privacy Graph apply policies obfuscate enforce policies de-obfuscate Privacy Algorithm management plane control plane data plane tokenized randomized crypto-hashed 429jQk1Mz9… 93742157.4126… We2B381H5… 429jQk1Mz9… {148.53} {dx72Fx92Ua…} {T62p2JsV9sI…} 429jQk1Mz9…T62p2JsV9sI…dx72Fx92Ua… Trust Authority Privacy Algorithms Privacy graph information can be resolved into clear text only after all of the trust criteria linked to all resources that contributed to creating it are enforced. Privacy Network
  • 12. vastly better security and privacy (thousands to millions of times harder to breach) unlimited aggregation and analysis with no loss of accuracy precision access control (single attribute, single recipient, specified purpose, 1- time) trust criteria inherited automatically by all aggregates and analytic outputs no need to agree on trust criteria Privacy Network Advantage
  • 13. 13 WebShield Inc. Trust Criteria Identity & Security Assurance Authorized Recipients & Purposes IT Interoperability Payment & Licensing Terms Regulatory Compliance Trust Validation Model Rating & Reputation Metrics Governance Processes Trust Authorities Audit & Certification Processes Assessment Methodologies Unified Trust Model Trust Policy Model Assessment & Validation Legal Agreements Computable Trust Trust Requirements Provenance Trust Resource Model Resource Description allows diverse policies specified by different stakeholders (e.g. user, record subject, publisher, regulator, etc.) to be enforced by neutral trust authorities. data metrics software computing infrastructure devices physical assets organizations policiescontracts algorithms accounts brands relationships people
  • 14. 14 WebShield Inc. Applications of the Privacy Network Nationwide Identity Network Patient-Centered Record/Attribute Discovery and Linking HIPPA-Compliant Access Authorization and Sharing
  • 15. Privacy Network Buy Season Pass $19.99 Watch Ad-Free for $1.99 Watch Free with AdsWatch Free with Ads Accept Privacy Protection Show Policies The Privacy Network uses information about you to authorize access to content, protect you from identity theft, and to enforce privacy policies on the use of your information and files. Cancel explain First-time users must opt-in to privacy policies in order to access protected content (e.g. a football game). Authorizes use of obfuscated data to: • Authenticate user and verify attributes and relationships. • Anonymously detect user devices. • Analyze activity to detect identity theft & cyber-security fraud. • Locate and authorize access to user’s records, accounts and digital media. • Enforce user-controlled security, privacy and personalization policies. • Identity theft protection with multi-factor authentication and identity proofing. • User’s identity, personal data and activity hidden – no insider access by anyone. • Personal information only revealed if authorized by user.
  • 16. Privacy Network Buy Season Pass $19.99 Watch Ad-Free for $1.99 Watch Free with AdsWatch Free with Ads (1) first-time users enter any attribute (phone, email, etc.) that specifies their identity. Commercial Credit Bureaus Phone RegistriesProfessional Licensing Marketing Profiles Data Aggregators Fraud Analytics Enterprise Healthcare Records Security DirectoriesEmployer HR Retailer Affinity ProgramsSupply- Chain Insurance Databases Banking Records` CRM ERP Government Education Records Public Records DMV Records State & Local Records IRS Records Social Security Citizenship & Immigration Healthcare Data Sources (3) global virtual database of obfuscated data used to verify user’s identity, authorize access and derive authentication options. Accept Privacy Protection Show Policies Cancel explain Text my Cell Send me Email your phone your email- or - The Privacy Network does not recognize this device. To authorize access, please enter one of the following: other options verify deviceverify device (Y4t) rG2-Ua91 xRs4Mw42dAk baX3yPEq7Nm (6) obfuscated log entries returned (5) user authenticated, which in turn: • verifies identity, authorizes access • validates privacy protection opt-in • registers device to enable subsequent no-login access no personal information revealed to anyone y4s rG22fa9i xRs4Mw42dAk baX3yPEq7Nm phone voice print password Authentication Services device fingerprint email fingerprint facial biometric (415) 265-3250 jonathan.hare@me.com FaceBookID 2335135 Trust Authorities Y4t7rG25Ua91 (415) 265-3250 (2) attributes obfuscated and submitted to Trust Authorities. (4) obfuscated authentication parameters passed to neutral authentication services.
  • 17. • Global single-sign-on, anonymous identity proofing and attribute verification. • Simple ‘no-click’ access, strong authentication without passwords. • Anonymously matches users with their digital content, accounts and records. • Eliminates identity theft and related cyber-security fraud. Trusted Identity Network
  • 18. Child Teacher Clinician Colleague Friend Spouse any credential or relationship Privacy Network any social media or messaging clients any digital content general health education banking children online My Policies edit my polices JonathanHare cancel people devices security payments advertising messaging privacy general Users and organizations can link policies directly to their content, and freely share it through standard messaging clients, social media apps and collaboration tools. Content is encrypted end-to-end until recipient is authenticated and authorized, and not revealed to apps or websites used for sharing. Enforces policies on verified identities and relationships of individual people, devices and services…
  • 19. Harnessing HIPAA to enable (rather than block) access by patients and providers… • Nationwide • High Assurance • On Demand • Vendor Neutral • Certified ComplianceRecords Discovery & Access Authorization Identity & HIPAA Trust Authorities Privacy Network Informed Consent & Consumer Opt-In • Enables nationwide patient record discovery and access. • Enforces HIPAA Patient Mandate for patient requests, HIPAA Authorization for provider requests.
  • 20. Payer Infusion Center Oncology Medical Home Clinical Oncologist Skilled Nursing Facility Radiation Treatment Center Home Caregiver Primary Care Provider Patient Claims Records EHR Records Lab Records Pharmacy Records Genomic Data Practice Management Device Data Demographic Data Privacy Network population & practice metrics personalized clinical decision support patient-centered coordination of care records access & secure messaging All-payer, all-patient, all-provider, all-purpose network
  • 21. Providers Data Sources 21 WebShield Inc. Nationwide Secure Sharing, Compliance Verification and Attribute Discovery Apps, Databases Services Patient Data Identity & Compliance Data Proxy Data Proxy Patient Records Attributes Metrics Privacy Network • Cloud-based verification of IT security and HIPAA compliance by neutral trust authorities. • Secure sharing with any organizations or individuals without requiring IT support. • Identity disambiguation across demographic identifiers, patient IDs, insurance IDs, etc. • Nationwide attribute discovery and patient-centered longitudinal record syndication. Payers Data Security Encryption Key Management Security Directory
  • 22. z Data Sources Nationwide Single-Sign-On User Authentication, Authorization & Compliance Providers Patient Data Identity & Compliance Data Proxy Data Proxy User Proxy Identity Syndicate Trust Authorities Privacy Network • Links diverse single-sign-on and identity infrastructure into nationwide identity syndicate. • National scale attribute-based access control and dynamic user / attribute proofing. • Identity assurance and HIPAA compliance verified by neutral trust authorities. Apps, Databases Services Single Sign-On OpenID Connect, OAuth2, SAML2, LDAP, etc. Payers