SlideShare a Scribd company logo
Trust and Governance in
Health and Social Care
Prof William J Buchanan
Twitter: @billatnapier
Web: http://asecuritysite.com
http://thecyberacademy.org
Changing face of health care
2
Barriers to Information Sharing
Records are
often static
Different
systems/
formatting
used for data
Limited/
difficult access
methods …
lack of trust
Lack of
integration
between health
and social
care
Lack of
integration with
carers, trusted
people and
families
Requirements
for 24/7 support
with real-time
response
Data often
aggregated
and context is
often lost
Strong demand
to consume
health/social
care data
Lack of
information
sharing across the
public sector
Poor access
control to data
Societal
Technical
Information Sharing
Risk Assessors
Health Care
Data
Social Care
Data
Education
Data
Police
Data
Child at
Risk
Records:
Child’s Action Plan
Risk Assessors:
Posted Concerns
Attendance Records
Health Problems
Crime Trace
Named Person
Trust Access to Action Plan
for the Required Time Limit
Health Care
Data
Social Care
Data
Education
Data
Police
Data
Strong Governance
Infrastructure
Health/
Social Care
Records:
Personal Health Record
Risk Assessors:
Frailty Index
Early Warning Score
Appointments Missed
Named Person (GP)
Possible Trust Access to parts of
the Electronic Health Record
Rights granted
Information Sharing
Human
Trust
Digital
Trust
Identity
Rights Health/Social
Services
Strong
Governance
Education
Health Care
Police/Law
Enforcement
Social Care
Translation of rights
Translation of identities
Strong Governance Policy
Infinite
possiblities
Primary
Health Care
(role-based)
Secondary
Health Care
(role-based)
Assisted Living (Circle of
Trust)
Family might ask: Who are the
people responsible the action plan?
GP might ask: How often does the team
meet to discuss the child?
Social Care might ask: When is the
next formal review of the case?
Trust Model
Data source 1
Data source 2
Data source 3
Trusted Platform
Symphonic Trust
Prof William J Buchanan
Twitter: @billatnapier
Web: http://asecuritysite.com
http://thecyberacademy.org
Translation Gateway
Governance Policy
Health and Social Car
Domain
Governance
Policy
Translation
Gateway
Domain Ontology,
Roles, and Well-
managed Services
Exposed
Data eleme
Law Enforcement
Domain
Domain
Ontology, Roles,
and Services
Exposed
Data elements
Human Readable Policy
defined for access
(based on role,
relationship and identity)
Roles
Federated Identity Attribute,
and Relationship
Management
[Unit]
[Dept]
Domain Ontology
Governance and Trust
Police/Law
Enforcement
Social Care
Governance Policy
Translation
Gateway
Governance and Trust
Police/Law
Enforcement
Social Care
Governance Policy
Translation
Gateway
Governance
model
Translator of roles,
services, and rights
Governance Policy
Translation
Gateway
Automated generation
Information
Sharing Policy
Document
Real-time
implementation
ENU e-Health Cloud Architecture
12
Service Claims
Policy Syntax
14
London Data Sharing
Prof William J Buchanan
Twitter: @billatnapier
Web: http://asecuritysite.com
http://thecyberacademy.org
London Digital Programme
• London Digital Programme – As part of Healthy
London initiative, the Health and Social Care
ecosystem in London is piloting new ways to
provide a data sharing environment to allow the
7,000 diverse organisation involved in patient care
to access patient records. Symphonic Software is
delivering the key governance layer to this
important programme to ensure that any data
access meets with data controller agreements,
which codify the inter-organisational rules for
patient data access, and also allowing citizens to
express their own data sharing preferences.
Scope
Ref: London Data Sharing Partnership, Mike Park
Dimensions of Integrated Care
Ref: London Data Sharing Partnership, Mike Park
Activated Citizen
Ref: London Data Sharing Partnership, Mike Park
Digital enabled care
Ref: London Data Sharing Partnership, Mike Park
London Data Sharing
London Digital Program
Ref: London Data Sharing Partnership, Mike Park
Sharing Agreements
Prof William J Buchanan
Twitter: @billatnapier
Web: http://asecuritysite.com
http://thecyberacademy.org
Background
• Five years academic research motivated by Caldicott
Report
• Software to improve patient care through
trusted data sharing:
• Across organisation & application boundaries
• Using trust-based access models
• Protecting patient information
• With built-in information governance
• Patient consent and preference
• Aligning IT and service delivery in data security
Common Authorisation Layer
Symphonic Trust:
• Interoperability
• Accelerated Service
Delivery
• Holistic view
• Dynamic Access
Management
Implementing Data Sharing
• Capture landscape
• Who – “users” of the ecosystem
• What – to-be-shared data and resources
• Policies – Data Sharing Agreements
• Define Policies & Data Ownership
• Organisation
• Patient Consent
• Management Reporting
• Rights
• Usage
• Policy Change
Define who has access
• Different domains
• Different organisational structures
• Capture End points and synchronisation
Define data and services
• Different domains
• Different technologies
• Define endpoints and access methods
Attribute as a service
• Resolve rules “on-the-fly”
Define identity providers
• Different identity providers
• Define “trust”
• Different provisioning policies
Define policy documents
• Relate IT access methods to business policy
• Data Sharing Agreements
Store policies
• Centralise policy management
Define basic policy
• Business User driven (Data Controller)
• API suite for policy management by user apps
Define advanced policy
• Capture advanced policy requirements
• Time, Geo, device type, IP Address etc
Management Reporting
• Full set of management reports
• User Entitlements
• Access reporting
• Permits
• Denies
• Policy Changes
• Information “obligations” on access; SMS, email,
etc
• Meets compliance and regulatory needs
• Aligned to Data Sharing Agreements
Trust and Governance in
Health and Social Care
Prof William J Buchanan
Twitter: @billatnapier
Web: http://asecuritysite.com
http://thecyberacademy.org

More Related Content

What's hot

MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15
MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15
MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15mihinpr
 
Panel: Understanding Michigan's HIE Landscape
Panel: Understanding Michigan's HIE LandscapePanel: Understanding Michigan's HIE Landscape
Panel: Understanding Michigan's HIE Landscapemihinpr
 
MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15
MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15
MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15mihinpr
 
Health IT and Public Policy Issues Dr. Rich Hodge
Health IT and Public Policy Issues Dr. Rich HodgeHealth IT and Public Policy Issues Dr. Rich Hodge
Health IT and Public Policy Issues Dr. Rich Hodgemihinpr
 
Dr. Jack Shere - Traceability Advancement Updates
Dr. Jack Shere - Traceability Advancement UpdatesDr. Jack Shere - Traceability Advancement Updates
Dr. Jack Shere - Traceability Advancement UpdatesJohn Blue
 
BlueButton on FHIR - HxRefactored 2016
BlueButton on FHIR - HxRefactored 2016BlueButton on FHIR - HxRefactored 2016
BlueButton on FHIR - HxRefactored 2016Mark Scrimshire
 
CMS BlueButton on FHIR at Cinderblocks3
CMS BlueButton on FHIR at Cinderblocks3 CMS BlueButton on FHIR at Cinderblocks3
CMS BlueButton on FHIR at Cinderblocks3 Mark Scrimshire
 
$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA BreachInfinisource
 
Opportunities for provision of electronic administrative health services thro...
Opportunities for provision of electronic administrative health services thro...Opportunities for provision of electronic administrative health services thro...
Opportunities for provision of electronic administrative health services thro...Glob@l Libraries - Bulgaria Program
 
Pitt-09-08-08.pdf
Pitt-09-08-08.pdfPitt-09-08-08.pdf
Pitt-09-08-08.pdfmelias11
 
Cooperative ACO's Must Lead to Cooperative Security Measures
Cooperative ACO's Must Lead to Cooperative Security MeasuresCooperative ACO's Must Lead to Cooperative Security Measures
Cooperative ACO's Must Lead to Cooperative Security MeasuresCompliancy Group
 
MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15mihinpr
 
Christopher Fincken
Christopher FinckenChristopher Fincken
Christopher FinckenLucia Garcia
 
Panel: Achieving Interoperability Dr. John Loonsk & Janet King
Panel: Achieving Interoperability Dr. John Loonsk & Janet KingPanel: Achieving Interoperability Dr. John Loonsk & Janet King
Panel: Achieving Interoperability Dr. John Loonsk & Janet Kingmihinpr
 
Linking Systems to Strategy - Information Systems Evolution in ProCare
Linking Systems to Strategy - Information Systems Evolution in ProCareLinking Systems to Strategy - Information Systems Evolution in ProCare
Linking Systems to Strategy - Information Systems Evolution in ProCareHealth Informatics New Zealand
 
Cyber physical system for healthcare
Cyber physical system for healthcareCyber physical system for healthcare
Cyber physical system for healthcareJUGAL GANDHI
 
RHINO Forum Kickoff: iHRIS Open Source HR Information Solutions
RHINO Forum Kickoff: iHRIS Open Source HR Information SolutionsRHINO Forum Kickoff: iHRIS Open Source HR Information Solutions
RHINO Forum Kickoff: iHRIS Open Source HR Information SolutionsRoutine Health Information Network
 
Information Governance Environment - Beverly Carter
Information Governance Environment - Beverly Carter Information Governance Environment - Beverly Carter
Information Governance Environment - Beverly Carter Health Innovation Wessex
 

What's hot (20)

MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15
MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15
MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15
 
Panel: Understanding Michigan's HIE Landscape
Panel: Understanding Michigan's HIE LandscapePanel: Understanding Michigan's HIE Landscape
Panel: Understanding Michigan's HIE Landscape
 
MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15
MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15
MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15
 
Health IT and Public Policy Issues Dr. Rich Hodge
Health IT and Public Policy Issues Dr. Rich HodgeHealth IT and Public Policy Issues Dr. Rich Hodge
Health IT and Public Policy Issues Dr. Rich Hodge
 
Dr. Jack Shere - Traceability Advancement Updates
Dr. Jack Shere - Traceability Advancement UpdatesDr. Jack Shere - Traceability Advancement Updates
Dr. Jack Shere - Traceability Advancement Updates
 
BlueButton on FHIR - HxRefactored 2016
BlueButton on FHIR - HxRefactored 2016BlueButton on FHIR - HxRefactored 2016
BlueButton on FHIR - HxRefactored 2016
 
CMS BlueButton on FHIR at Cinderblocks3
CMS BlueButton on FHIR at Cinderblocks3 CMS BlueButton on FHIR at Cinderblocks3
CMS BlueButton on FHIR at Cinderblocks3
 
#soteSlush: Jari Porrasmaa
#soteSlush: Jari Porrasmaa#soteSlush: Jari Porrasmaa
#soteSlush: Jari Porrasmaa
 
$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA Breach
 
Opportunities for provision of electronic administrative health services thro...
Opportunities for provision of electronic administrative health services thro...Opportunities for provision of electronic administrative health services thro...
Opportunities for provision of electronic administrative health services thro...
 
Pitt-09-08-08.pdf
Pitt-09-08-08.pdfPitt-09-08-08.pdf
Pitt-09-08-08.pdf
 
Cooperative ACO's Must Lead to Cooperative Security Measures
Cooperative ACO's Must Lead to Cooperative Security MeasuresCooperative ACO's Must Lead to Cooperative Security Measures
Cooperative ACO's Must Lead to Cooperative Security Measures
 
MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15
 
Christopher Fincken
Christopher FinckenChristopher Fincken
Christopher Fincken
 
Panel: Achieving Interoperability Dr. John Loonsk & Janet King
Panel: Achieving Interoperability Dr. John Loonsk & Janet KingPanel: Achieving Interoperability Dr. John Loonsk & Janet King
Panel: Achieving Interoperability Dr. John Loonsk & Janet King
 
Linking Systems to Strategy - Information Systems Evolution in ProCare
Linking Systems to Strategy - Information Systems Evolution in ProCareLinking Systems to Strategy - Information Systems Evolution in ProCare
Linking Systems to Strategy - Information Systems Evolution in ProCare
 
Cyber physical system for healthcare
Cyber physical system for healthcareCyber physical system for healthcare
Cyber physical system for healthcare
 
RHINO Forum Kickoff: iHRIS Open Source HR Information Solutions
RHINO Forum Kickoff: iHRIS Open Source HR Information SolutionsRHINO Forum Kickoff: iHRIS Open Source HR Information Solutions
RHINO Forum Kickoff: iHRIS Open Source HR Information Solutions
 
#soteSlush: Jaakko Korhonen - ODA
#soteSlush: Jaakko Korhonen - ODA#soteSlush: Jaakko Korhonen - ODA
#soteSlush: Jaakko Korhonen - ODA
 
Information Governance Environment - Beverly Carter
Information Governance Environment - Beverly Carter Information Governance Environment - Beverly Carter
Information Governance Environment - Beverly Carter
 

Viewers also liked

Using Big Data to Create Engagement Agility
Using Big Data to Create Engagement Agility Using Big Data to Create Engagement Agility
Using Big Data to Create Engagement Agility Napier University
 
Incident Response: SIEM Part II
Incident Response: SIEM Part IIIncident Response: SIEM Part II
Incident Response: SIEM Part IINapier University
 
SIMD 2016 - Alistair McAlpine
SIMD 2016 - Alistair McAlpineSIMD 2016 - Alistair McAlpine
SIMD 2016 - Alistair McAlpineNapier University
 
Incident Response: Network Forensics
Incident Response: Network ForensicsIncident Response: Network Forensics
Incident Response: Network ForensicsNapier University
 
Incident response: Introduction
Incident response: IntroductionIncident response: Introduction
Incident response: IntroductionNapier University
 
Incident Response: Tunnelling
Incident Response: TunnellingIncident Response: Tunnelling
Incident Response: TunnellingNapier University
 
Big Data Big Picture - Professor Derek Bell
Big Data Big Picture - Professor Derek BellBig Data Big Picture - Professor Derek Bell
Big Data Big Picture - Professor Derek BellNapier University
 
Venturefest 2016 Cyber Security Innovation
Venturefest 2016 Cyber Security InnovationVenturefest 2016 Cyber Security Innovation
Venturefest 2016 Cyber Security InnovationNapier University
 
e-Frality - Adrian Smales and Brian Brown (CM2000)
e-Frality - Adrian Smales and Brian Brown (CM2000)e-Frality - Adrian Smales and Brian Brown (CM2000)
e-Frality - Adrian Smales and Brian Brown (CM2000)Napier University
 
CSN09112: Introduction to Computer Security
CSN09112: Introduction to Computer SecurityCSN09112: Introduction to Computer Security
CSN09112: Introduction to Computer SecurityNapier University
 
Blockchain and Health - James Little-john
Blockchain and Health - James Little-johnBlockchain and Health - James Little-john
Blockchain and Health - James Little-johnNapier University
 
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre  Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre Napier University
 
Population Health Management - Angus McCann
Population Health Management - Angus McCannPopulation Health Management - Angus McCann
Population Health Management - Angus McCannNapier University
 
LIquidity and Validity - Jan Gill
LIquidity and Validity - Jan GillLIquidity and Validity - Jan Gill
LIquidity and Validity - Jan GillNapier University
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat DetectionNapier University
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 

Viewers also liked (20)

Using Big Data to Create Engagement Agility
Using Big Data to Create Engagement Agility Using Big Data to Create Engagement Agility
Using Big Data to Create Engagement Agility
 
Incident Response: SIEM Part II
Incident Response: SIEM Part IIIncident Response: SIEM Part II
Incident Response: SIEM Part II
 
SIMD 2016 - Alistair McAlpine
SIMD 2016 - Alistair McAlpineSIMD 2016 - Alistair McAlpine
SIMD 2016 - Alistair McAlpine
 
Incident Response: Network Forensics
Incident Response: Network ForensicsIncident Response: Network Forensics
Incident Response: Network Forensics
 
Incident response: Introduction
Incident response: IntroductionIncident response: Introduction
Incident response: Introduction
 
Incident Response: Tunnelling
Incident Response: TunnellingIncident Response: Tunnelling
Incident Response: Tunnelling
 
Big Data Big Picture - Professor Derek Bell
Big Data Big Picture - Professor Derek BellBig Data Big Picture - Professor Derek Bell
Big Data Big Picture - Professor Derek Bell
 
Venturefest 2016 Cyber Security Innovation
Venturefest 2016 Cyber Security InnovationVenturefest 2016 Cyber Security Innovation
Venturefest 2016 Cyber Security Innovation
 
e-Frality - Adrian Smales and Brian Brown (CM2000)
e-Frality - Adrian Smales and Brian Brown (CM2000)e-Frality - Adrian Smales and Brian Brown (CM2000)
e-Frality - Adrian Smales and Brian Brown (CM2000)
 
CSN09112: Introduction to Computer Security
CSN09112: Introduction to Computer SecurityCSN09112: Introduction to Computer Security
CSN09112: Introduction to Computer Security
 
Untuk penggiat Cyber Security dan Sertifikasi dari isaca csx-update-18_apr - ...
Untuk penggiat Cyber Security dan Sertifikasi dari isaca csx-update-18_apr - ...Untuk penggiat Cyber Security dan Sertifikasi dari isaca csx-update-18_apr - ...
Untuk penggiat Cyber Security dan Sertifikasi dari isaca csx-update-18_apr - ...
 
Blockchain and Health - James Little-john
Blockchain and Health - James Little-johnBlockchain and Health - James Little-john
Blockchain and Health - James Little-john
 
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre  Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
 
Incident Response: SIEM
Incident Response: SIEMIncident Response: SIEM
Incident Response: SIEM
 
Population Health Management - Angus McCann
Population Health Management - Angus McCannPopulation Health Management - Angus McCann
Population Health Management - Angus McCann
 
LIquidity and Validity - Jan Gill
LIquidity and Validity - Jan GillLIquidity and Validity - Jan Gill
LIquidity and Validity - Jan Gill
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat Detection
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 

Similar to Trust and Governance in Health and Social Care

MiHIN Direct Webinar for EHR Intelligence v10 11 12-14
MiHIN Direct Webinar for EHR Intelligence v10 11 12-14MiHIN Direct Webinar for EHR Intelligence v10 11 12-14
MiHIN Direct Webinar for EHR Intelligence v10 11 12-14mihinpr
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007Richard Moore
 
Security & Privacy - Lecture E
Security & Privacy - Lecture ESecurity & Privacy - Lecture E
Security & Privacy - Lecture ECMDLearning
 
Drupal and the Future of Healthcare
Drupal and the Future of HealthcareDrupal and the Future of Healthcare
Drupal and the Future of HealthcareAchieve Internet
 
Digital Revolution in Healthcare System
Digital Revolution in Healthcare SystemDigital Revolution in Healthcare System
Digital Revolution in Healthcare SystemAkash Goyal
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010James Williams
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityNoreen Whysel
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?M2SYS Technology
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
Healthcare Information Exchange.pdf
Healthcare Information Exchange.pdfHealthcare Information Exchange.pdf
Healthcare Information Exchange.pdfLarisaAlbanians
 
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.iFour Technolab Pvt. Ltd.
 
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...WSO2
 
Direct Boot Camp 2 0 Federal Agency requirements for exchange via direct
Direct Boot Camp 2 0 Federal Agency requirements for exchange via directDirect Boot Camp 2 0 Federal Agency requirements for exchange via direct
Direct Boot Camp 2 0 Federal Agency requirements for exchange via directBrian Ahier
 
Trusted! Quest for data-driven and fair health solutions
Trusted! Quest for data-driven and fair health solutions Trusted! Quest for data-driven and fair health solutions
Trusted! Quest for data-driven and fair health solutions Sitra / Hyvinvointi
 

Similar to Trust and Governance in Health and Social Care (20)

MiHIN Direct Webinar for EHR Intelligence v10 11 12-14
MiHIN Direct Webinar for EHR Intelligence v10 11 12-14MiHIN Direct Webinar for EHR Intelligence v10 11 12-14
MiHIN Direct Webinar for EHR Intelligence v10 11 12-14
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007
 
Sustainability of HIEs under CyberSecurity
Sustainability of HIEs under CyberSecuritySustainability of HIEs under CyberSecurity
Sustainability of HIEs under CyberSecurity
 
Security & Privacy - Lecture E
Security & Privacy - Lecture ESecurity & Privacy - Lecture E
Security & Privacy - Lecture E
 
Drupal and the Future of Healthcare
Drupal and the Future of HealthcareDrupal and the Future of Healthcare
Drupal and the Future of Healthcare
 
Digital Revolution in Healthcare System
Digital Revolution in Healthcare SystemDigital Revolution in Healthcare System
Digital Revolution in Healthcare System
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
 
Healthcare Information Exchange.pdf
Healthcare Information Exchange.pdfHealthcare Information Exchange.pdf
Healthcare Information Exchange.pdf
 
Dave Taylor
Dave TaylorDave Taylor
Dave Taylor
 
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
 
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
 
Direct Boot Camp 2 0 Federal Agency requirements for exchange via direct
Direct Boot Camp 2 0 Federal Agency requirements for exchange via directDirect Boot Camp 2 0 Federal Agency requirements for exchange via direct
Direct Boot Camp 2 0 Federal Agency requirements for exchange via direct
 
Trusted! Quest for data-driven and fair health solutions
Trusted! Quest for data-driven and fair health solutions Trusted! Quest for data-driven and fair health solutions
Trusted! Quest for data-driven and fair health solutions
 
Professional Choices
Professional ChoicesProfessional Choices
Professional Choices
 
An Evidence Informed Vision for a Public Health Data System in Canada
An Evidence Informed Vision for a Public Health Data System in CanadaAn Evidence Informed Vision for a Public Health Data System in Canada
An Evidence Informed Vision for a Public Health Data System in Canada
 

More from Napier University

10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and PandasNapier University
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneNapier University
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-WattNapier University
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergNapier University
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinNapier University
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Napier University
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeNapier University
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarNapier University
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiNapier University
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Napier University
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraNapier University
 

More from Napier University (20)

Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
Networks
NetworksNetworks
Networks
 
Memory, Big Data and SIEM
Memory, Big Data and SIEMMemory, Big Data and SIEM
Memory, Big Data and SIEM
 
What is Cyber Data?
What is Cyber Data?What is Cyber Data?
What is Cyber Data?
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
 
1. Cyber and Intelligence
1. Cyber and Intelligence1. Cyber and Intelligence
1. Cyber and Intelligence
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan Delatinne
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 
ARTiFACTS, Emma Boswood
ARTiFACTS, Emma BoswoodARTiFACTS, Emma Boswood
ARTiFACTS, Emma Boswood
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
 
Keynote, Naseem Naqvi
Keynote, Naseem Naqvi Keynote, Naseem Naqvi
Keynote, Naseem Naqvi
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael Prabucki
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
 

Recently uploaded

The Docs PPG - 30.01.2024.pptx..........
The Docs PPG - 30.01.2024.pptx..........The Docs PPG - 30.01.2024.pptx..........
The Docs PPG - 30.01.2024.pptx..........TheDocs
 
Master the Art of Yoga with Joga Yoga Training
Master the Art of Yoga with Joga Yoga TrainingMaster the Art of Yoga with Joga Yoga Training
Master the Art of Yoga with Joga Yoga TrainingJoga Yoga Training
 
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)Chris Shade
 
Integrated Mother and Neonate Childwood Illness Health Care
Integrated Mother and Neonate Childwood Illness  Health CareIntegrated Mother and Neonate Childwood Illness  Health Care
Integrated Mother and Neonate Childwood Illness Health CareASKatoch1
 
Deepfake Detection_Using Machine Learning .pptx
Deepfake Detection_Using Machine Learning .pptxDeepfake Detection_Using Machine Learning .pptx
Deepfake Detection_Using Machine Learning .pptxmahalsuraj389
 
PhRMA Vaccines Deck_05-15_2024_FINAL.pptx
PhRMA Vaccines Deck_05-15_2024_FINAL.pptxPhRMA Vaccines Deck_05-15_2024_FINAL.pptx
PhRMA Vaccines Deck_05-15_2024_FINAL.pptxBlake100757
 
Dehradun ❤CALL Girls 8901183002 ❤ℂall Girls IN Dehradun ESCORT SERVICE❤
Dehradun ❤CALL Girls  8901183002 ❤ℂall  Girls IN Dehradun ESCORT SERVICE❤Dehradun ❤CALL Girls  8901183002 ❤ℂall  Girls IN Dehradun ESCORT SERVICE❤
Dehradun ❤CALL Girls 8901183002 ❤ℂall Girls IN Dehradun ESCORT SERVICE❤aunty1x2
 
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...aunty1x1
 
Navigating Healthcare with Telemedicine
Navigating Healthcare with  TelemedicineNavigating Healthcare with  Telemedicine
Navigating Healthcare with TelemedicineIris Thiele Isip-Tan
 
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...aunty1x1
 
Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...
Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...
Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...ananyagirishbabu1
 
Antibiotic Stewardship by Anushri Srivastava.pptx
Antibiotic Stewardship by Anushri Srivastava.pptxAntibiotic Stewardship by Anushri Srivastava.pptx
Antibiotic Stewardship by Anushri Srivastava.pptxAnushriSrivastav
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...rajkumar669520
 
Navigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and BeyondNavigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and BeyondAboud Health Group
 
Contact Now 89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...
Contact Now  89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...Contact Now  89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...
Contact Now 89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...aunty1x2
 
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdfDemystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdfSasikiranMarri
 
Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...
Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...
Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...GQ Research
 
PT MANAGEMENT OF URINARY INCONTINENCE.pptx
PT MANAGEMENT OF URINARY INCONTINENCE.pptxPT MANAGEMENT OF URINARY INCONTINENCE.pptx
PT MANAGEMENT OF URINARY INCONTINENCE.pptxdrtabassum4
 
Virtual Health Platforms_ Revolutionizing Patient Care.pdf
Virtual Health Platforms_ Revolutionizing Patient Care.pdfVirtual Health Platforms_ Revolutionizing Patient Care.pdf
Virtual Health Platforms_ Revolutionizing Patient Care.pdfsmartcare
 
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptxBOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptxAnushriSrivastav
 

Recently uploaded (20)

The Docs PPG - 30.01.2024.pptx..........
The Docs PPG - 30.01.2024.pptx..........The Docs PPG - 30.01.2024.pptx..........
The Docs PPG - 30.01.2024.pptx..........
 
Master the Art of Yoga with Joga Yoga Training
Master the Art of Yoga with Joga Yoga TrainingMaster the Art of Yoga with Joga Yoga Training
Master the Art of Yoga with Joga Yoga Training
 
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
 
Integrated Mother and Neonate Childwood Illness Health Care
Integrated Mother and Neonate Childwood Illness  Health CareIntegrated Mother and Neonate Childwood Illness  Health Care
Integrated Mother and Neonate Childwood Illness Health Care
 
Deepfake Detection_Using Machine Learning .pptx
Deepfake Detection_Using Machine Learning .pptxDeepfake Detection_Using Machine Learning .pptx
Deepfake Detection_Using Machine Learning .pptx
 
PhRMA Vaccines Deck_05-15_2024_FINAL.pptx
PhRMA Vaccines Deck_05-15_2024_FINAL.pptxPhRMA Vaccines Deck_05-15_2024_FINAL.pptx
PhRMA Vaccines Deck_05-15_2024_FINAL.pptx
 
Dehradun ❤CALL Girls 8901183002 ❤ℂall Girls IN Dehradun ESCORT SERVICE❤
Dehradun ❤CALL Girls  8901183002 ❤ℂall  Girls IN Dehradun ESCORT SERVICE❤Dehradun ❤CALL Girls  8901183002 ❤ℂall  Girls IN Dehradun ESCORT SERVICE❤
Dehradun ❤CALL Girls 8901183002 ❤ℂall Girls IN Dehradun ESCORT SERVICE❤
 
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
 
Navigating Healthcare with Telemedicine
Navigating Healthcare with  TelemedicineNavigating Healthcare with  Telemedicine
Navigating Healthcare with Telemedicine
 
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
 
Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...
Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...
Cell structure slideshare.pptx Unlocking the Secrets of Cells: Structure, Fun...
 
Antibiotic Stewardship by Anushri Srivastava.pptx
Antibiotic Stewardship by Anushri Srivastava.pptxAntibiotic Stewardship by Anushri Srivastava.pptx
Antibiotic Stewardship by Anushri Srivastava.pptx
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
 
Navigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and BeyondNavigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and Beyond
 
Contact Now 89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...
Contact Now  89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...Contact Now  89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...
Contact Now 89011**83002 Dehradun ℂall Girls By Full Service ℂall Girl In De...
 
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdfDemystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
 
Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...
Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...
Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...
 
PT MANAGEMENT OF URINARY INCONTINENCE.pptx
PT MANAGEMENT OF URINARY INCONTINENCE.pptxPT MANAGEMENT OF URINARY INCONTINENCE.pptx
PT MANAGEMENT OF URINARY INCONTINENCE.pptx
 
Virtual Health Platforms_ Revolutionizing Patient Care.pdf
Virtual Health Platforms_ Revolutionizing Patient Care.pdfVirtual Health Platforms_ Revolutionizing Patient Care.pdf
Virtual Health Platforms_ Revolutionizing Patient Care.pdf
 
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptxBOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
 

Trust and Governance in Health and Social Care

  • 1. Trust and Governance in Health and Social Care Prof William J Buchanan Twitter: @billatnapier Web: http://asecuritysite.com http://thecyberacademy.org
  • 2. Changing face of health care 2
  • 3. Barriers to Information Sharing Records are often static Different systems/ formatting used for data Limited/ difficult access methods … lack of trust Lack of integration between health and social care Lack of integration with carers, trusted people and families Requirements for 24/7 support with real-time response Data often aggregated and context is often lost Strong demand to consume health/social care data Lack of information sharing across the public sector Poor access control to data Societal Technical
  • 5. Risk Assessors Health Care Data Social Care Data Education Data Police Data Child at Risk Records: Child’s Action Plan Risk Assessors: Posted Concerns Attendance Records Health Problems Crime Trace Named Person Trust Access to Action Plan for the Required Time Limit Health Care Data Social Care Data Education Data Police Data Strong Governance Infrastructure Health/ Social Care Records: Personal Health Record Risk Assessors: Frailty Index Early Warning Score Appointments Missed Named Person (GP) Possible Trust Access to parts of the Electronic Health Record Rights granted
  • 6. Information Sharing Human Trust Digital Trust Identity Rights Health/Social Services Strong Governance Education Health Care Police/Law Enforcement Social Care Translation of rights Translation of identities Strong Governance Policy Infinite possiblities Primary Health Care (role-based) Secondary Health Care (role-based) Assisted Living (Circle of Trust) Family might ask: Who are the people responsible the action plan? GP might ask: How often does the team meet to discuss the child? Social Care might ask: When is the next formal review of the case?
  • 7. Trust Model Data source 1 Data source 2 Data source 3 Trusted Platform
  • 8. Symphonic Trust Prof William J Buchanan Twitter: @billatnapier Web: http://asecuritysite.com http://thecyberacademy.org
  • 9. Translation Gateway Governance Policy Health and Social Car Domain Governance Policy Translation Gateway Domain Ontology, Roles, and Well- managed Services Exposed Data eleme Law Enforcement Domain Domain Ontology, Roles, and Services Exposed Data elements Human Readable Policy defined for access (based on role, relationship and identity) Roles Federated Identity Attribute, and Relationship Management [Unit] [Dept] Domain Ontology
  • 10. Governance and Trust Police/Law Enforcement Social Care Governance Policy Translation Gateway
  • 11. Governance and Trust Police/Law Enforcement Social Care Governance Policy Translation Gateway Governance model Translator of roles, services, and rights Governance Policy Translation Gateway Automated generation Information Sharing Policy Document Real-time implementation
  • 12. ENU e-Health Cloud Architecture 12
  • 15. London Data Sharing Prof William J Buchanan Twitter: @billatnapier Web: http://asecuritysite.com http://thecyberacademy.org
  • 16. London Digital Programme • London Digital Programme – As part of Healthy London initiative, the Health and Social Care ecosystem in London is piloting new ways to provide a data sharing environment to allow the 7,000 diverse organisation involved in patient care to access patient records. Symphonic Software is delivering the key governance layer to this important programme to ensure that any data access meets with data controller agreements, which codify the inter-organisational rules for patient data access, and also allowing citizens to express their own data sharing preferences.
  • 17. Scope Ref: London Data Sharing Partnership, Mike Park
  • 18. Dimensions of Integrated Care Ref: London Data Sharing Partnership, Mike Park
  • 19. Activated Citizen Ref: London Data Sharing Partnership, Mike Park
  • 20. Digital enabled care Ref: London Data Sharing Partnership, Mike Park
  • 21. London Data Sharing London Digital Program Ref: London Data Sharing Partnership, Mike Park
  • 22. Sharing Agreements Prof William J Buchanan Twitter: @billatnapier Web: http://asecuritysite.com http://thecyberacademy.org
  • 23. Background • Five years academic research motivated by Caldicott Report • Software to improve patient care through trusted data sharing: • Across organisation & application boundaries • Using trust-based access models • Protecting patient information • With built-in information governance • Patient consent and preference • Aligning IT and service delivery in data security
  • 24. Common Authorisation Layer Symphonic Trust: • Interoperability • Accelerated Service Delivery • Holistic view • Dynamic Access Management
  • 25. Implementing Data Sharing • Capture landscape • Who – “users” of the ecosystem • What – to-be-shared data and resources • Policies – Data Sharing Agreements • Define Policies & Data Ownership • Organisation • Patient Consent • Management Reporting • Rights • Usage • Policy Change
  • 26. Define who has access • Different domains • Different organisational structures • Capture End points and synchronisation
  • 27. Define data and services • Different domains • Different technologies • Define endpoints and access methods
  • 28. Attribute as a service • Resolve rules “on-the-fly”
  • 29. Define identity providers • Different identity providers • Define “trust” • Different provisioning policies
  • 30. Define policy documents • Relate IT access methods to business policy • Data Sharing Agreements
  • 31. Store policies • Centralise policy management
  • 32. Define basic policy • Business User driven (Data Controller) • API suite for policy management by user apps
  • 33. Define advanced policy • Capture advanced policy requirements • Time, Geo, device type, IP Address etc
  • 34. Management Reporting • Full set of management reports • User Entitlements • Access reporting • Permits • Denies • Policy Changes • Information “obligations” on access; SMS, email, etc • Meets compliance and regulatory needs • Aligned to Data Sharing Agreements
  • 35. Trust and Governance in Health and Social Care Prof William J Buchanan Twitter: @billatnapier Web: http://asecuritysite.com http://thecyberacademy.org

Editor's Notes

  1. 12
  2. 14
  3. 23