SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
M2SYS Healthcare Solutions
Free Online Learning Podcasts
Podcast length – 38:56
Topic: “Establishing a Trusted Identity in Cyberspace”
Background on NSTIC, Creating an Identity “Ecosystem,” The Impact of
Identity Theft, Right to Privacy, Value of Standards Based Patient ID in
Healthcare, NSTIC and the ONC, Interoperability, Trusted ID Reducing
Medical ID Theft, NSTIC Pilot Projects
Jim Shiere, Senior Advisor with the National Strategy for Trusted
Identities in Cyberspace (NSTIC)
and
Topics Covered in Podcast:
NSTIC Mission & Objectives – What is an Identity Ecosystem?
Processes & Structure to Meet NSTIC Goals
Trusted Identities – Why is Now the Right Time?
Balance Between Identities and Privacy
Value of a Trusted Identity for Patients in Healthcare
Identity Theft Implications
Topics Covered in Podcast (continued):
NSTIC and the ONC – Working Together to Created Trusted
Identities for Patients
The Value of A Standardized Biometric Patient Identification
Solution
Trusted Identity Impact on Medical Identity Theft
NSTIC Pilot Projects
NSTIC – National Strategy for Trusted Identities in Cyberspace
• Launched by the White House in 2011
• Main goal is to establish an “identity ecosystem”
• Individuals can voluntarily choose from a single or multiple digital
identities of their choice to conduct business on the Internet anywhere
at anytime
• Based on 4 fundamental guiding principles:
• Interoperability – If you choose an identity (Google for example) – you
have the opportunity to interoperably use it anywhere. Helps alleviate
the problem of creating a user name and password for each new site
you visit. Idea is to create one credential to be used anywhere.
• Security & Resiliency – Single factor authentication (e.g. – passwords)
are “hopelessly” broken and increasingly are a vector of attack – 60% of
network intrusions are a result of bad password management. NSTIC
envisions a way to replace the password with better
methods
NSTIC Mission & Objectives – What is a “Trusted
Identity?”
NSTIC Mission & Objectives – What is a “Trusted
Identity?” (continued)
• Multi-factor authentication seen as a more secure identity
• Privacy – How can we foster the creation of an identity ecosystem that
presents privacy enhancing options to individuals?
• Current interoperable sign on credentials don’t allow for a clear
understanding of what privacy controls are in place to protect
information
• NSTIC looking to enshrine better privacy policies to foster more
control over personal information
• Usability – any online, interoperable credential solution should be easy
to use and convenient
Processes and Structure
• What is NSTIC doing to foster the vision of an identity ecosystem?
• Thrust #1: Funding – providing pilot project funding to private company
projects who are innovating and launching initiatives to help advance
the principles of an identity ecosystem and catalyze the market for
these solutions
Processes & Structure to Meet NSTIC Goals
• Pilot Example – American Association of Motor Vehicle Administration
(AAMVA) and the INOVA Healthcare System (based in Virginia)
• Pilot basis – How can INOVA patients access their online records
using a Google or Microsoft account for login to avoid having to
create a new account. The AAMVA will automatically proof your
identity so INOVA can grant authorization.
• NSTIC has awarded over $17 in funding to the private sector and
several states for pilots
• Thrust #2: Lead federal government – rallying the government sector to
be early adopters to the “identity ecosystem”
• Example – “Federal Cloud Credential Exchange” – government is
deploying a platform to accept third party credentialing to access
government services. Idea is to move more government services
online in a cost effective and efficient way but still follow security
and privacy guidelines.
Processes & Structure to Meet NSTIC Goals
• Expect to hear more in the coming months about which
government agencies will be deploying the trusted identity
initiative
• Thrust #3: Facilitating private sector led groups – referred to as “The
Identity Ecosystem Steering Group” (IDSG) to convene the private sector
to establish a framework of rules, policies and standards which will
provide the policy foundation for how the private sector can leverage
the identity ecosystem
• NSTIC provided grant funding to support the group for the first two
years, the group has since transformed into an independent entity
• If individuals or business are looking to play a larger role in the
initiative, participation in the IDSG is a great place to engage
(www.idecosystem.org) – open to all (businesses, individuals, non-
profits, etc.)
• Many IDSG stakeholders groups exist that cover a range of topics
(state and local governments, privacy, etc.)
Trusted Identities – Why is Now the Right Time?
• The “hopelessly broken” nature of user names and passwords
• Increasingly a vector of attack for criminals to access sensitive
information to enable identity theft and other forms of fraud
• NSTIC’s goals are aimed to provide more usable and secure identity
credentialing solutions to provide a safer way to do business online and
build consumer trust
• NSTIC envisions a better way forward to authenticate ourselves online
by playing more of a “facilitator” role and support entities
• Ultimately, it’s the private sector that will step up and provide tools and
tech for more secure online transactions
• There needs to be a more open and comprehensive study and
discussion on the issue of privacy and how it impacts the creation of an
identity ecosystem
• Urgency exists to solidify a national strategy – now is the right time
Identity Theft Implications
• The proliferation of data available on individuals to provide better
products and services online has fueled the rise in ID theft – in other
words, the quest to improve product and service quality seeded the
growth of ID theft cases
• NSTIC has stepped in to help change the thought process of online
individual information and shift the focus to privacy and protection
• NSTIC asks the question – if you are sharing information online for
business transactions, why is it necessary to share anything other
than basic information necessary to complete the transaction?
• NSTIC is focusing on the concept of “data minimization”
• Identity theft erodes consumer trust in online transactions
• NSTIC believes it can build a better set of online identity tools to
minimize risk and increase privacy
Balance Between Identities and Privacy
• Privacy remains a fundamental guiding principle of the national strategy
for online trusted identities
• NSTIC is focused on ensuring that privacy advocates have a seat at the
table to help mold the online identity initiative and how the identity
ecosystem will evolve
• Another way NSTIC is promoting privacy enhancing solutions is through
the Federal Cloud Credential Exchange (FCCX) which enshrines the fair
information practice princples – learn more at:
www.nist.gov/nstic/fccx.html
Did you know?
A copy of NSTIC’s strategy is available online. You
can access a copy by following this link:
www.whitehouse.gov/sites/default/files/rss_vie
wer/NSTICstrategy_051511.pdf
• At heart of NSTIC and Office of the National Coordinator for Health
Information Technology (NSTIC) collaboration is looking at how NSTIC’s
drive to establish trusted identities (identities that provide security and
privacy – both important in the context of HIPAA)
• Identity ecosystem that NSTIC envisions allows patients to have
voluntary access to identity credentials with stronger privacy and
security enhancing features
• This fits into the ONC strategy of open access to health data with more
secure, safe, and privacy enhancing tools
• Viewing, downloading and exchange of health data information is
enabled through a trusted identity ecosystem
• Patients want the assurance that their private health data is being
adequately protected during the access and exchange process
• Trusted identities help to advance the goal of true interoperability
• ONC is actively engaged in the IDSG and follow several pilots closely
(INNOVA)
Value of a Trusted Identity for Patients in Healthcare
How the ONC and NSTIC are Working Together
The Value of A Standardized Biometric Patient
Identification Solution
• NSTIC’s role isn’t to point to specific methods of authentication for the
market – instead their role is a facilitator of pilot projects, opening
dialog, and ensuring all stakeholders have a seat at the table
• NSTIC focuses on allowing private entities to factor in identity
management technologies as part of the overall solution
• Most people understand the value of standards based identity
management approaches – fundamentally important for the overall
identity management ecosystem moving forward (enshrined in NSTIC
interoperability principles)
• Overall, patient identification standards based solutions are getting a
close look as a piece of the overall identity ecosystem
Most Effective Security Technologies to Protect
Patient Data Access
• The shift from paper to electronic health records necessitates a shift
change in how to effectively protect patient data
• Patient data information used to be limited and siloed – the advent of
EHR’s, HIEs, Meaningful Use mandates, and an increased interest in
leveraging the power of big data to perform population management
has increased the availability of electronic information that is easier to
transport (and steal)
• Critical that a security protocol be in established & observed to:
• Validate a patient’s identity & ensure they are who they say they are
both in person and online (e.g. – patient portals)
• Biometrics for patient identification is increasing and a viable tool to
verify a patient’s identity with near 100% accuracy – can also be used at
each touch point along the continuum of care to authenticate identity
before service/procedure is rendered
Trusted Identity Impact on Medical Identity Theft
• NSTIC is specifically coordinating its efforts to establish a trusted identity
precisely to help stem the rising tide of medical ID theft
• Medical identity theft looming crisis demands better ways for patients to
access health data online especially in the wake of increased adoption of
electronic health records (EHRs)
• NSTIC timing was ideal for the healthcare industry as the struggles to
protect identities increases
• NSTIC provides a set of tools and fosters an ecosystem that enables
patient trust
• ONC’s vision of open, secure, and private access to health data is
manifested in NSTIC’s initiatives with an improved approach to identity
• Pilots within federal government provide valuable case studies to help
advance trusted identities in healthcare
• Expect to see continued dialog and collaboration between ONC and
NSTIC to stem medical ID theft with more secure trusted identities
NSTIC Pilot Projects
INNOVA
• Pilot premise is to help enable more convenient yet secure ways for
patients to log in and access their health data online
• Prior to patients logging into a portal for access to health data, a
customized list of questions only the patient would know the answers to
is provided by the Virginia MVA
• Establishes much stricter security protocols for online healthcare data
access
• Provides a much more authoritative resource for verifying patient
identities
• Creating growing interest in healthcare for access to a powerful set of
tools to better verify patient identities while creating convenience and
fostering privacy
Thank you to Jim for his time and
knowledge on this podcast!
Please follow NSTIC on Twitter
(@nsticnpo) and visit their Web site at:
www.nist.gov/nstic@nstic or check out
their blog at: www.nist.gov/blog.html
John Trader
Director of Communications
M2SYS Healthcare Solutions
1050 Crown Pointe Pkwy.
Suite 850
Atlanta, GA 30338
jtrader@m2sys.com
770-821-1734
www.m2sys.com/healthcare
Podcast home page: http://www.m2sys.com/healthcare/healthcare-biometrics-
podcasts/
: twitter.com/rightpatient
: facebook.com/rightpatient
: linkedin.com/company/m2sys-technology
Contact Information

Contenu connexe

Tendances

Cuando Ostrom se encuentra con blockchain: explorando las potencialidades de ...
Cuando Ostrom se encuentra con blockchain: explorando las potencialidades de ...Cuando Ostrom se encuentra con blockchain: explorando las potencialidades de ...
Cuando Ostrom se encuentra con blockchain: explorando las potencialidades de ...David Rozas
 
Blockchain for Healthcare
Blockchain for HealthcareBlockchain for Healthcare
Blockchain for HealthcareCitiusTech
 
Blockchain in Healthcare
Blockchain in Healthcare Blockchain in Healthcare
Blockchain in Healthcare Alex Tsado
 
Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in HealthcareBirthVenue
 
Transformation of Continuity Through Technology
Transformation of Continuity Through TechnologyTransformation of Continuity Through Technology
Transformation of Continuity Through TechnologyHeather Blanchard
 
Blockchain for Fraud Prevention
Blockchain for Fraud PreventionBlockchain for Fraud Prevention
Blockchain for Fraud PreventionIanTellam
 
Blockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical RecordsBlockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical RecordseHealth Forum
 
Top 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityTop 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityBlockchain Council
 
My Data - A Nordic Model for human-centered personal data management and proc...
My Data - A Nordic Model for human-centered personal data management and proc...My Data - A Nordic Model for human-centered personal data management and proc...
My Data - A Nordic Model for human-centered personal data management and proc...Joonas Pekkanen
 
Policy Perspectives on Fintech
Policy Perspectives on FintechPolicy Perspectives on Fintech
Policy Perspectives on FintechRandeep Sudan
 
Blockchain for healthcare
Blockchain for healthcareBlockchain for healthcare
Blockchain for healthcareThanvilahari
 
IoT Guildford Meetup#26: GDPR, IoT and Transparency
IoT Guildford Meetup#26: GDPR, IoT and TransparencyIoT Guildford Meetup#26: GDPR, IoT and Transparency
IoT Guildford Meetup#26: GDPR, IoT and TransparencyMicheleNati
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHellmuth Broda
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Technology for Courts in Singapour - Jennifer Marie
Technology for Courts in Singapour - Jennifer MarieTechnology for Courts in Singapour - Jennifer Marie
Technology for Courts in Singapour - Jennifer MarieOECD Governance
 
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Towards Blockchain-Based Secure Data Management for Remote Patient MonitoringTowards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Towards Blockchain-Based Secure Data Management for Remote Patient MonitoringMd Jobair Hossain Faruk
 
Evaluation and Innovative Solution for Wellstar Health System
Evaluation and Innovative Solution for Wellstar Health SystemEvaluation and Innovative Solution for Wellstar Health System
Evaluation and Innovative Solution for Wellstar Health SystemMd Jobair Hossain Faruk
 

Tendances (20)

Cuando Ostrom se encuentra con blockchain: explorando las potencialidades de ...
Cuando Ostrom se encuentra con blockchain: explorando las potencialidades de ...Cuando Ostrom se encuentra con blockchain: explorando las potencialidades de ...
Cuando Ostrom se encuentra con blockchain: explorando las potencialidades de ...
 
Blockchain for Healthcare
Blockchain for HealthcareBlockchain for Healthcare
Blockchain for Healthcare
 
Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015
Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015
Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015
 
Blockchain in Healthcare
Blockchain in Healthcare Blockchain in Healthcare
Blockchain in Healthcare
 
Mobilization +
Mobilization +Mobilization +
Mobilization +
 
Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in Healthcare
 
Transformation of Continuity Through Technology
Transformation of Continuity Through TechnologyTransformation of Continuity Through Technology
Transformation of Continuity Through Technology
 
Blockchain in healthcare
Blockchain in healthcareBlockchain in healthcare
Blockchain in healthcare
 
Blockchain for Fraud Prevention
Blockchain for Fraud PreventionBlockchain for Fraud Prevention
Blockchain for Fraud Prevention
 
Blockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical RecordsBlockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical Records
 
Top 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityTop 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare security
 
My Data - A Nordic Model for human-centered personal data management and proc...
My Data - A Nordic Model for human-centered personal data management and proc...My Data - A Nordic Model for human-centered personal data management and proc...
My Data - A Nordic Model for human-centered personal data management and proc...
 
Policy Perspectives on Fintech
Policy Perspectives on FintechPolicy Perspectives on Fintech
Policy Perspectives on Fintech
 
Blockchain for healthcare
Blockchain for healthcareBlockchain for healthcare
Blockchain for healthcare
 
IoT Guildford Meetup#26: GDPR, IoT and Transparency
IoT Guildford Meetup#26: GDPR, IoT and TransparencyIoT Guildford Meetup#26: GDPR, IoT and Transparency
IoT Guildford Meetup#26: GDPR, IoT and Transparency
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' Data
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Technology for Courts in Singapour - Jennifer Marie
Technology for Courts in Singapour - Jennifer MarieTechnology for Courts in Singapour - Jennifer Marie
Technology for Courts in Singapour - Jennifer Marie
 
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Towards Blockchain-Based Secure Data Management for Remote Patient MonitoringTowards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
 
Evaluation and Innovative Solution for Wellstar Health System
Evaluation and Innovative Solution for Wellstar Health SystemEvaluation and Innovative Solution for Wellstar Health System
Evaluation and Innovative Solution for Wellstar Health System
 

Similaire à National Association for Trusted Identities in Cyberspace - Establishing Trusted Identities in Cyberspace

Responses to Questions Posed by Ms. Melissa Hathaway During He.docx
Responses to Questions Posed by Ms. Melissa Hathaway During He.docxResponses to Questions Posed by Ms. Melissa Hathaway During He.docx
Responses to Questions Posed by Ms. Melissa Hathaway During He.docxronak56
 
The Pulse of Liquid Health Data
The Pulse of Liquid Health DataThe Pulse of Liquid Health Data
The Pulse of Liquid Health DataBrian Ahier
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
Implementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcareImplementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcarePistoia Alliance
 
NSTIC draft charter february 2012
NSTIC draft charter february 2012NSTIC draft charter february 2012
NSTIC draft charter february 2012Jamie Clark
 
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012Collaborative Health Consortium
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007Richard Moore
 
Reputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageReputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageTogar Simatupang
 
INFORMATION SYSTEMS PROJECT MANAGEMENT(COLLEN AND THE GROUP)
INFORMATION SYSTEMS PROJECT MANAGEMENT(COLLEN AND THE GROUP)INFORMATION SYSTEMS PROJECT MANAGEMENT(COLLEN AND THE GROUP)
INFORMATION SYSTEMS PROJECT MANAGEMENT(COLLEN AND THE GROUP)Collen Tshebo
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityNoreen Whysel
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCloudIDSummit
 
Technologies and Innovation – Ethics
Technologies and Innovation – EthicsTechnologies and Innovation – Ethics
Technologies and Innovation – EthicsLee Schlenker
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG UpdateIan Glazer
 
Developing the Informatics Workforce for Scotland's Health and Social Care
Developing the Informatics Workforce for Scotland's Health and Social CareDeveloping the Informatics Workforce for Scotland's Health and Social Care
Developing the Informatics Workforce for Scotland's Health and Social CareCILIPScotland
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOM2SYS Technology
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxMuhammadAbdullah311866
 

Similaire à National Association for Trusted Identities in Cyberspace - Establishing Trusted Identities in Cyberspace (20)

Responses to Questions Posed by Ms. Melissa Hathaway During He.docx
Responses to Questions Posed by Ms. Melissa Hathaway During He.docxResponses to Questions Posed by Ms. Melissa Hathaway During He.docx
Responses to Questions Posed by Ms. Melissa Hathaway During He.docx
 
The Pulse of Liquid Health Data
The Pulse of Liquid Health DataThe Pulse of Liquid Health Data
The Pulse of Liquid Health Data
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
Implementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcareImplementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcare
 
NSTIC draft charter february 2012
NSTIC draft charter february 2012NSTIC draft charter february 2012
NSTIC draft charter february 2012
 
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007
 
Reputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageReputation based model for decision making in the digital age
Reputation based model for decision making in the digital age
 
INFORMATION SYSTEMS PROJECT MANAGEMENT(COLLEN AND THE GROUP)
INFORMATION SYSTEMS PROJECT MANAGEMENT(COLLEN AND THE GROUP)INFORMATION SYSTEMS PROJECT MANAGEMENT(COLLEN AND THE GROUP)
INFORMATION SYSTEMS PROJECT MANAGEMENT(COLLEN AND THE GROUP)
 
An Evidence Informed Vision for a Public Health Data System in Canada
An Evidence Informed Vision for a Public Health Data System in CanadaAn Evidence Informed Vision for a Public Health Data System in Canada
An Evidence Informed Vision for a Public Health Data System in Canada
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
 
Technologies and Innovation – Ethics
Technologies and Innovation – EthicsTechnologies and Innovation – Ethics
Technologies and Innovation – Ethics
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG Update
 
Developing the Informatics Workforce for Scotland's Health and Social Care
Developing the Informatics Workforce for Scotland's Health and Social CareDeveloping the Informatics Workforce for Scotland's Health and Social Care
Developing the Informatics Workforce for Scotland's Health and Social Care
 
Sustainability of HIEs under CyberSecurity
Sustainability of HIEs under CyberSecuritySustainability of HIEs under CyberSecurity
Sustainability of HIEs under CyberSecurity
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 

Plus de M2SYS Technology

The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementM2SYS Technology
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingM2SYS Technology
 
4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee ProductivityM2SYS Technology
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionM2SYS Technology
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™M2SYS Technology
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?M2SYS Technology
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsM2SYS Technology
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsM2SYS Technology
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareM2SYS Technology
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringM2SYS Technology
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryM2SYS Technology
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...M2SYS Technology
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business M2SYS Technology
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionM2SYS Technology
 

Plus de M2SYS Technology (16)

The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce Management
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in Banking
 
4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration Solution
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric Solutions
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces Costs
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in Healthcare
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast Summary
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 

Dernier

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Dernier (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

National Association for Trusted Identities in Cyberspace - Establishing Trusted Identities in Cyberspace

  • 1. M2SYS Healthcare Solutions Free Online Learning Podcasts Podcast length – 38:56 Topic: “Establishing a Trusted Identity in Cyberspace” Background on NSTIC, Creating an Identity “Ecosystem,” The Impact of Identity Theft, Right to Privacy, Value of Standards Based Patient ID in Healthcare, NSTIC and the ONC, Interoperability, Trusted ID Reducing Medical ID Theft, NSTIC Pilot Projects Jim Shiere, Senior Advisor with the National Strategy for Trusted Identities in Cyberspace (NSTIC) and
  • 2. Topics Covered in Podcast: NSTIC Mission & Objectives – What is an Identity Ecosystem? Processes & Structure to Meet NSTIC Goals Trusted Identities – Why is Now the Right Time? Balance Between Identities and Privacy Value of a Trusted Identity for Patients in Healthcare Identity Theft Implications
  • 3. Topics Covered in Podcast (continued): NSTIC and the ONC – Working Together to Created Trusted Identities for Patients The Value of A Standardized Biometric Patient Identification Solution Trusted Identity Impact on Medical Identity Theft NSTIC Pilot Projects
  • 4. NSTIC – National Strategy for Trusted Identities in Cyberspace • Launched by the White House in 2011 • Main goal is to establish an “identity ecosystem” • Individuals can voluntarily choose from a single or multiple digital identities of their choice to conduct business on the Internet anywhere at anytime • Based on 4 fundamental guiding principles: • Interoperability – If you choose an identity (Google for example) – you have the opportunity to interoperably use it anywhere. Helps alleviate the problem of creating a user name and password for each new site you visit. Idea is to create one credential to be used anywhere. • Security & Resiliency – Single factor authentication (e.g. – passwords) are “hopelessly” broken and increasingly are a vector of attack – 60% of network intrusions are a result of bad password management. NSTIC envisions a way to replace the password with better methods NSTIC Mission & Objectives – What is a “Trusted Identity?”
  • 5. NSTIC Mission & Objectives – What is a “Trusted Identity?” (continued) • Multi-factor authentication seen as a more secure identity • Privacy – How can we foster the creation of an identity ecosystem that presents privacy enhancing options to individuals? • Current interoperable sign on credentials don’t allow for a clear understanding of what privacy controls are in place to protect information • NSTIC looking to enshrine better privacy policies to foster more control over personal information • Usability – any online, interoperable credential solution should be easy to use and convenient Processes and Structure • What is NSTIC doing to foster the vision of an identity ecosystem? • Thrust #1: Funding – providing pilot project funding to private company projects who are innovating and launching initiatives to help advance the principles of an identity ecosystem and catalyze the market for these solutions
  • 6. Processes & Structure to Meet NSTIC Goals • Pilot Example – American Association of Motor Vehicle Administration (AAMVA) and the INOVA Healthcare System (based in Virginia) • Pilot basis – How can INOVA patients access their online records using a Google or Microsoft account for login to avoid having to create a new account. The AAMVA will automatically proof your identity so INOVA can grant authorization. • NSTIC has awarded over $17 in funding to the private sector and several states for pilots • Thrust #2: Lead federal government – rallying the government sector to be early adopters to the “identity ecosystem” • Example – “Federal Cloud Credential Exchange” – government is deploying a platform to accept third party credentialing to access government services. Idea is to move more government services online in a cost effective and efficient way but still follow security and privacy guidelines.
  • 7. Processes & Structure to Meet NSTIC Goals • Expect to hear more in the coming months about which government agencies will be deploying the trusted identity initiative • Thrust #3: Facilitating private sector led groups – referred to as “The Identity Ecosystem Steering Group” (IDSG) to convene the private sector to establish a framework of rules, policies and standards which will provide the policy foundation for how the private sector can leverage the identity ecosystem • NSTIC provided grant funding to support the group for the first two years, the group has since transformed into an independent entity • If individuals or business are looking to play a larger role in the initiative, participation in the IDSG is a great place to engage (www.idecosystem.org) – open to all (businesses, individuals, non- profits, etc.) • Many IDSG stakeholders groups exist that cover a range of topics (state and local governments, privacy, etc.)
  • 8. Trusted Identities – Why is Now the Right Time? • The “hopelessly broken” nature of user names and passwords • Increasingly a vector of attack for criminals to access sensitive information to enable identity theft and other forms of fraud • NSTIC’s goals are aimed to provide more usable and secure identity credentialing solutions to provide a safer way to do business online and build consumer trust • NSTIC envisions a better way forward to authenticate ourselves online by playing more of a “facilitator” role and support entities • Ultimately, it’s the private sector that will step up and provide tools and tech for more secure online transactions • There needs to be a more open and comprehensive study and discussion on the issue of privacy and how it impacts the creation of an identity ecosystem • Urgency exists to solidify a national strategy – now is the right time
  • 9. Identity Theft Implications • The proliferation of data available on individuals to provide better products and services online has fueled the rise in ID theft – in other words, the quest to improve product and service quality seeded the growth of ID theft cases • NSTIC has stepped in to help change the thought process of online individual information and shift the focus to privacy and protection • NSTIC asks the question – if you are sharing information online for business transactions, why is it necessary to share anything other than basic information necessary to complete the transaction? • NSTIC is focusing on the concept of “data minimization” • Identity theft erodes consumer trust in online transactions • NSTIC believes it can build a better set of online identity tools to minimize risk and increase privacy
  • 10. Balance Between Identities and Privacy • Privacy remains a fundamental guiding principle of the national strategy for online trusted identities • NSTIC is focused on ensuring that privacy advocates have a seat at the table to help mold the online identity initiative and how the identity ecosystem will evolve • Another way NSTIC is promoting privacy enhancing solutions is through the Federal Cloud Credential Exchange (FCCX) which enshrines the fair information practice princples – learn more at: www.nist.gov/nstic/fccx.html Did you know? A copy of NSTIC’s strategy is available online. You can access a copy by following this link: www.whitehouse.gov/sites/default/files/rss_vie wer/NSTICstrategy_051511.pdf
  • 11. • At heart of NSTIC and Office of the National Coordinator for Health Information Technology (NSTIC) collaboration is looking at how NSTIC’s drive to establish trusted identities (identities that provide security and privacy – both important in the context of HIPAA) • Identity ecosystem that NSTIC envisions allows patients to have voluntary access to identity credentials with stronger privacy and security enhancing features • This fits into the ONC strategy of open access to health data with more secure, safe, and privacy enhancing tools • Viewing, downloading and exchange of health data information is enabled through a trusted identity ecosystem • Patients want the assurance that their private health data is being adequately protected during the access and exchange process • Trusted identities help to advance the goal of true interoperability • ONC is actively engaged in the IDSG and follow several pilots closely (INNOVA) Value of a Trusted Identity for Patients in Healthcare How the ONC and NSTIC are Working Together
  • 12. The Value of A Standardized Biometric Patient Identification Solution • NSTIC’s role isn’t to point to specific methods of authentication for the market – instead their role is a facilitator of pilot projects, opening dialog, and ensuring all stakeholders have a seat at the table • NSTIC focuses on allowing private entities to factor in identity management technologies as part of the overall solution • Most people understand the value of standards based identity management approaches – fundamentally important for the overall identity management ecosystem moving forward (enshrined in NSTIC interoperability principles) • Overall, patient identification standards based solutions are getting a close look as a piece of the overall identity ecosystem
  • 13. Most Effective Security Technologies to Protect Patient Data Access • The shift from paper to electronic health records necessitates a shift change in how to effectively protect patient data • Patient data information used to be limited and siloed – the advent of EHR’s, HIEs, Meaningful Use mandates, and an increased interest in leveraging the power of big data to perform population management has increased the availability of electronic information that is easier to transport (and steal) • Critical that a security protocol be in established & observed to: • Validate a patient’s identity & ensure they are who they say they are both in person and online (e.g. – patient portals) • Biometrics for patient identification is increasing and a viable tool to verify a patient’s identity with near 100% accuracy – can also be used at each touch point along the continuum of care to authenticate identity before service/procedure is rendered
  • 14. Trusted Identity Impact on Medical Identity Theft • NSTIC is specifically coordinating its efforts to establish a trusted identity precisely to help stem the rising tide of medical ID theft • Medical identity theft looming crisis demands better ways for patients to access health data online especially in the wake of increased adoption of electronic health records (EHRs) • NSTIC timing was ideal for the healthcare industry as the struggles to protect identities increases • NSTIC provides a set of tools and fosters an ecosystem that enables patient trust • ONC’s vision of open, secure, and private access to health data is manifested in NSTIC’s initiatives with an improved approach to identity • Pilots within federal government provide valuable case studies to help advance trusted identities in healthcare • Expect to see continued dialog and collaboration between ONC and NSTIC to stem medical ID theft with more secure trusted identities
  • 15. NSTIC Pilot Projects INNOVA • Pilot premise is to help enable more convenient yet secure ways for patients to log in and access their health data online • Prior to patients logging into a portal for access to health data, a customized list of questions only the patient would know the answers to is provided by the Virginia MVA • Establishes much stricter security protocols for online healthcare data access • Provides a much more authoritative resource for verifying patient identities • Creating growing interest in healthcare for access to a powerful set of tools to better verify patient identities while creating convenience and fostering privacy
  • 16. Thank you to Jim for his time and knowledge on this podcast! Please follow NSTIC on Twitter (@nsticnpo) and visit their Web site at: www.nist.gov/nstic@nstic or check out their blog at: www.nist.gov/blog.html
  • 17. John Trader Director of Communications M2SYS Healthcare Solutions 1050 Crown Pointe Pkwy. Suite 850 Atlanta, GA 30338 jtrader@m2sys.com 770-821-1734 www.m2sys.com/healthcare Podcast home page: http://www.m2sys.com/healthcare/healthcare-biometrics- podcasts/ : twitter.com/rightpatient : facebook.com/rightpatient : linkedin.com/company/m2sys-technology Contact Information