Authenticated Medical Identity

Page 1

Good Health Network

Controlling Your Identity Safe Guarding Your Privacy Trusted Solutions for Identity Management Authentication and Access Control October 2009


Market Demand for Trusted Identities GHN – Credentials Service Provider INDUSTRY NEEDS FOR e-AUTHENTICATION IDENTITY SERVICE HealthCare Industry Telemedicine, e-Visits, Secure Communications Health Information Networks – Consent Management Corporate America and Technology Vendors High security access and for confidential data sharing Employee access and audit control for compliance Telecommunication Industry Hand held devices: PDA, Cell phones Financial Industry Credit, debit and data cards; e-transactions and trades


It’s all about Authentication of Your ID CREDIT CARD: in-hand purchases One Factor Authentication - Credit/Debit Cards - PIN or Zip Code

Purchase Types - Withdraw Money - Buy Goods or Services

e-COMMERCE: Purchasing & Data Sharing It’s about your Identity, proving who you are electronically with Multi-Factor Authentication Something You KNOW Something You HAVE Something You ARE


Consumer Identities Are Mobile and In Many Forms


GHN’s Trusted Credentialing Solution A Sequential Validation e-Process


Proving Who You Are Electronically ID vetting phase


GHN’s Trusted Solution ID Vetting Phase


Secure Internet Connectivity to Sharing Emergency Medical Data Your Authenticated ID Consent Documents

Secure Data Links INTERNET SECURITY

Trusted Consumer Data Repository Physician Hospital Governance

SECURITY VPN Electronic Health Record’s

ER Personal Health Records


er-Personal Health Record Demonstration Project


Stimulus Funds for Health IT Security, Privacy & Authentication Health Information Exchange (HIE) States to receive $560 Million to install a secure HIE network • Deploy a standards-based secure infrastructure to securely share patients protected health information in 2010 • Strong emphasis on Privacy and Security

Regional Extensions to Train and Educate • 70 not-for-profits to receive $590 Million starting early 2010 to train and educate doctors/staff on the Privacy, Security, Value of electronic health records and sharing that health data with patients

States to Receive $7.2 Billion in Broadband Funds


ID Theft on the Rise with Internet Need for an e-AUTHENTIFICATED IDENTITY Increasing activities…… • e-Commerce; On-Line Banking • High Speed Bandwidth • Mobile Computing – Remote Access • Hot Spots – Enterprise Authentification • File Sharing – Mobil Signatures • Wireless/Remote Devices • Use of Digital Devices and Cell Phones • Need for Secure Communications • Requirement for Consent Management Caution – Increases in…… • Un-trusted Networks • Identity Theft


Think About Tomorrow

How to selectively share information

How will you electronically: - Protect your Identity and Privacy? - Control and Share Personal - Sensitive Information? Establishing Preferences to Share Personal Data


Mandated Requirements

for H I E’s

CONSUMER PREFERENCES..…..coming in 2010: • You MUST Prove who you are electronically – Need to ‘Opt In’ to Securely Share Protected Health Information (PHI) – Will enhance Privacy, Security and Public Trust • CONSUMERS will Authorize Access, Grant Permissions and Circumstances on sharing PHI – Can your PHI be shared during an emergency or regional disaster? – What PHI should not be shared ? – Do you have a signed Consent or Advanced Directive such as a DNR or Organ Donor form?


Creating Trusted Preferences Who Can See What Data and When EVENT:

DESCRIPTION, ACTION DATA TYPE:

• Enrollment & ID Vetting……….

• User ID conformation and attribute profile generated


Creating Trusted Preferences Who Can See What Data and When EVENT:

DESCRIPTION, ACTION, DATA TYPE:

• Enrollment & ID Vetting……….

• User ID conformation and attribute profile generated

• Secure Message envelope created………………………….

• User Originates, Designates recipient, selects restricted data and Authorizes Message


Creating Trusted Preferences Who Can See What Data and When EVENT:

DESCRIPTION, ACTION, DATA TYPE:

• Enrollment & ID Vetting……….

• User ID conformation and attribute profile generated

• Secure Message envelope created………………………….

• User Originates, Designates recipient, selects restricted data and Authorizes Message

• Physicians and care givers Trading Partners & Customers Family/Friends/Social Networks

• Recipient name, title, email address Organization name, date and time limits, Data Use Restrictions and Access Controls


Creating Trusted Preferences Who Can See What Data and When EVENT:

DESCRIPTION, ACTION, DATA TYPE:

• User Authorizes Consents to • Personal Data Types with Preferences share Sensitive Data based on - Emergency & Personal Health Data expressed Personal - AIDS, HIV OR Mental Health Data Preferences and possibly - Substance OR Child Abuse conditioned on a specific event such as an emergency - Advanced Directives - Genetic Data OR Personal Confidential Information - Financial & sensitive corporate data - Marketing & Education material

• Electronic Communications

e-Verification and Auditing


Application Documents Actual Examples Consumer Preference Document Authenticated ID Document

18


Sources & Uses

Source: $2,500,000 - $3,000,000 - Series D Preferred Convertible - Voting Stock

Uses: Working Capital - Staff / Overhead - Enhance Product Security - Technology Upgrade - Certification - Product Commercialization - Marketing / Business Development - Launch three to five pilot projects


Patent - National Involvement Prototype Value Created • PATENT PENDING re Creation of Health Information Database and Secure Access System, Process and Methods incorporating various forms of security including, voice, fingerprint, digital signatures (Patent Attorneys: Allen, Dyer, Doppelt, Milbrath & Gilchrist, PA)

• NATIONALLY INVOLVED for 15 years in Security and Privacy Standards related to healthcare, currently co-chair a Consumer Preference work group and have Strategic and Trusted relationships nationally with market leaders in multiple industries

• FUNCTIONAL PROTOTYPE application ready to be commercialized for pilot testing…..has generated revenue

20


Thank You

GHN’s Authenticated ID A Trusted Management Solution Jim Kragh kragh@ghnet.us 407-629-0304 ext 105


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.