Good Health Network
Controlling Your Identity Safe Guarding Your Privacy Trusted Solutions for Identity Management Authentication and Access Control October 2009
Market Demand for Trusted Identities GHN – Credentials Service Provider INDUSTRY NEEDS FOR e-AUTHENTICATION IDENTITY SERVICE HealthCare Industry Telemedicine, e-Visits, Secure Communications Health Information Networks – Consent Management Corporate America and Technology Vendors High security access and for confidential data sharing Employee access and audit control for compliance Telecommunication Industry Hand held devices: PDA, Cell phones Financial Industry Credit, debit and data cards; e-transactions and trades
It’s all about Authentication of Your ID CREDIT CARD: in-hand purchases One Factor Authentication - Credit/Debit Cards - PIN or Zip Code
Purchase Types - Withdraw Money - Buy Goods or Services
e-COMMERCE: Purchasing & Data Sharing It’s about your Identity, proving who you are electronically with Multi-Factor Authentication Something You KNOW Something You HAVE Something You ARE
Consumer Identities Are Mobile and In Many Forms
GHN’s Trusted Credentialing Solution A Sequential Validation e-Process
Proving Who You Are Electronically ID vetting phase
GHN’s Trusted Solution ID Vetting Phase
Secure Internet Connectivity to Sharing Emergency Medical Data Your Authenticated ID Consent Documents
Secure Data Links INTERNET SECURITY
Trusted Consumer Data Repository Physician Hospital Governance
SECURITY VPN Electronic Health Record’s
ER Personal Health Records
er-Personal Health Record Demonstration Project
Stimulus Funds for Health IT Security, Privacy & Authentication Health Information Exchange (HIE) States to receive $560 Million to install a secure HIE network • Deploy a standards-based secure infrastructure to securely share patients protected health information in 2010 • Strong emphasis on Privacy and Security
Regional Extensions to Train and Educate • 70 not-for-profits to receive $590 Million starting early 2010 to train and educate doctors/staff on the Privacy, Security, Value of electronic health records and sharing that health data with patients
States to Receive $7.2 Billion in Broadband Funds
ID Theft on the Rise with Internet Need for an e-AUTHENTIFICATED IDENTITY Increasing activities…… • e-Commerce; On-Line Banking • High Speed Bandwidth • Mobile Computing – Remote Access • Hot Spots – Enterprise Authentification • File Sharing – Mobil Signatures • Wireless/Remote Devices • Use of Digital Devices and Cell Phones • Need for Secure Communications • Requirement for Consent Management Caution – Increases in…… • Un-trusted Networks • Identity Theft
Think About Tomorrow
How to selectively share information
How will you electronically: - Protect your Identity and Privacy? - Control and Share Personal - Sensitive Information? Establishing Preferences to Share Personal Data
Mandated Requirements
for H I E’s
CONSUMER PREFERENCES..…..coming in 2010: • You MUST Prove who you are electronically – Need to ‘Opt In’ to Securely Share Protected Health Information (PHI) – Will enhance Privacy, Security and Public Trust • CONSUMERS will Authorize Access, Grant Permissions and Circumstances on sharing PHI – Can your PHI be shared during an emergency or regional disaster? – What PHI should not be shared ? – Do you have a signed Consent or Advanced Directive such as a DNR or Organ Donor form?
Creating Trusted Preferences Who Can See What Data and When EVENT:
DESCRIPTION, ACTION DATA TYPE:
• Enrollment & ID Vetting……….
• User ID conformation and attribute profile generated
Creating Trusted Preferences Who Can See What Data and When EVENT:
DESCRIPTION, ACTION, DATA TYPE:
• Enrollment & ID Vetting……….
• User ID conformation and attribute profile generated
• Secure Message envelope created………………………….
• User Originates, Designates recipient, selects restricted data and Authorizes Message
Creating Trusted Preferences Who Can See What Data and When EVENT:
DESCRIPTION, ACTION, DATA TYPE:
• Enrollment & ID Vetting……….
• User ID conformation and attribute profile generated
• Secure Message envelope created………………………….
• User Originates, Designates recipient, selects restricted data and Authorizes Message
• Physicians and care givers Trading Partners & Customers Family/Friends/Social Networks
• Recipient name, title, email address Organization name, date and time limits, Data Use Restrictions and Access Controls
Creating Trusted Preferences Who Can See What Data and When EVENT:
DESCRIPTION, ACTION, DATA TYPE:
• User Authorizes Consents to • Personal Data Types with Preferences share Sensitive Data based on - Emergency & Personal Health Data expressed Personal - AIDS, HIV OR Mental Health Data Preferences and possibly - Substance OR Child Abuse conditioned on a specific event such as an emergency - Advanced Directives - Genetic Data OR Personal Confidential Information - Financial & sensitive corporate data - Marketing & Education material
• Electronic Communications
e-Verification and Auditing
Application Documents Actual Examples Consumer Preference Document Authenticated ID Document
18
Sources & Uses
Source: $2,500,000 - $3,000,000 - Series D Preferred Convertible - Voting Stock
Uses: Working Capital - Staff / Overhead - Enhance Product Security - Technology Upgrade - Certification - Product Commercialization - Marketing / Business Development - Launch three to five pilot projects
Patent - National Involvement Prototype Value Created • PATENT PENDING re Creation of Health Information Database and Secure Access System, Process and Methods incorporating various forms of security including, voice, fingerprint, digital signatures (Patent Attorneys: Allen, Dyer, Doppelt, Milbrath & Gilchrist, PA)
• NATIONALLY INVOLVED for 15 years in Security and Privacy Standards related to healthcare, currently co-chair a Consumer Preference work group and have Strategic and Trusted relationships nationally with market leaders in multiple industries
• FUNCTIONAL PROTOTYPE application ready to be commercialized for pilot testing…..has generated revenue
20
Thank You
GHN’s Authenticated ID A Trusted Management Solution Jim Kragh kragh@ghnet.us 407-629-0304 ext 105