SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Block Chain
Health Records Management
The Secure Health Records management Service
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
Records management?
• Records management (RM), also known as records and information
management or RIM, is the professional practice of managing the
records of an organization throughout their life cycle, from the time
they are created to their eventual disposal. This includes identifying,
classifying, storing, securing, retrieving, tracking and destroying or
permanently preserving records.
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
The facts?
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
The medical/health care sector now leads all sectors in the
number of records compromised to date in 2016.
The sector has posted 36.1% (217) of all data breaches so
far this year.
The number of records exposed in these breaches totaled more
than 12 million, or about 59.2% of the total so far in 2016.
Patient Concerns
• concerns about inappropriate releases of information from individual
organizations
• concerns about the systemic flows of information throughout the
health care and related industries
• concerns about loss of medical records caused by threats from a
modern digital world like ransomware
• Concerns about the false security of “anonymised data” when applied
to the world of big data
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
Patient Centric Principles
• All health records owned exclusively by the patient
• All health records under the exclusive control of the patient
• All health records created by any health provider must provide the original
health records to the patient nominated Records Management System, all
local copies must be destroyed by the health provider
• All health records must be encrypted at rest and in transit under a
mandatory security policy
• All health records management systems must fail safe
• No patient health records must be accessible to or by any Records
Management System or operations personal
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
The Digital World
• Creating and capturing health records, and associated metadata, into
recordkeeping systems
• Storing and securing health records, including planning for disasters
• Preserving health records for as long as they are required;
• Providing and restriction of access to health records
• Disposing of health records in an approved manner
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
Threats to Digital Health Records
• Protecting health records from ransomware and other digital threats
• Protecting health records from unauthorized disclosure, theft,
alteration or destruction
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
Why do we need secure
Health Records Management
• The medical/health care sector now leads all sectors in the number of
records compromised to date in 2016. The sector has posted 36.1% (217)
of all data breaches so far this year. The number of records exposed in
these breaches totaled more than 12 million, or about 59.2% of the total so
far in 2016.
• The business sector accounts for nearly 2.5 million exposed records in 264
incidents. That represents 43.9% of the incidents, and 11.8% of the
exposed records.
• The government/military sector has suffered 38 data breaches so far this
year, representing about 27.1% of the total number of records exposed and
6.3% of the incidents. More than 5.7 million records have been
compromised in the government/military sector to date in 2016.
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
Characteristics
• known level of assurance and hence risk
• sits publicly on the internet (secrecy is not required to underpin security)
• does not rely on any network security, VPN or firewalls
• all data access is based upon well known and operational tested KMS
• all access follows the well known compartmented security mode of operation
• assume a BYOD as default environment, does not rely on controlled end points
• supports industry standard CMS
• support for custom meta data
• support storage of arbitrary sized and content types within each record
• all access to be enforced via Hardware based Security modules
• mandatory security policy requiring all data is encrypted in transit and at rest
• system will fail safe
• support for industry standard records management dictionaries.
• No centralized access control
• Immune to Ransomware
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
Meta Data
• Metadata is generally categorized into four or five groupings based on the
information the metadata captures, as described below:
• Descriptive Metadata: Metadata that describes the intellectual content of a resource and
used for the indexing, discovery and identification of a digital resource.
• Administrative Metadata: Metadata that includes management information about the digital
resource, such as ownership and rights management.
• Structural Metadata: Metadata that is used to display and navigate digital resources and
describes relationships between multiple digital files, such as page order in a digitized book.
• Technical Metadata: Metadata that describes the features of the digital file, such as
resolution, pixel dimension and hardware. The information is critical for migration and long-
term sustainability of the digital resource.
• Preservation Metadata: Metadata that specifically captures information that helps facilitate
management and access to digital files over time. This inherently includes descriptive,
administrative, structural, and technical metadata elements that focus on the provenance,
authenticity, preservation activity, technical environment, and rights management of an
object.
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
ACID Properties of a Record
• A- Atomicity: requires that each transaction be "all or nothing": if one part of the transaction fails, then the
entire transaction fails, and the store state is left unchanged. An atomic system must guarantee atomicity in
each and every situation, including power failures, errors, and crashes. To the outside world, a committed
record appears (by its effects on the contained records) to be indivisible ("atomic"), and an aborted record
does not happen.;
• C- Consistency: property ensures that any transaction will bring the record from one valid state to another.
Any data written must be valid according to all defined rules. This does not guarantee correctness of the
transaction, merely that any programming errors cannot result in the violation of any defined rules. The RMS
is effectively a "write once" data store, and hence only has a single state. Data destruction is achieved via
destruction of the record key, the RMS will always remain immutable set of records under all operational use
cases.
• I- Isolation: property ensures that the concurrent execution of transactions results in a system state that
would be obtained if transactions were executed serially, i.e., one after the other. Providing isolation is the
main goal of concurrency control. as the effects of an incomplete transaction might not even be visible to
another transaction. A block chain by definition enforces serial ability of all records, combined with
immutability ensures isolation between records.
• D- Durability: property ensures that once a transaction has been committed, it will remain so, even in the
event of power loss, crashes, or errors. Persistence of data across physically dispersed locations enhances
durability, of the immutable RMS.
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
Ransom-ware Defeated
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
Finally a solution which
protects against ransom ware
( its an immutable record),
with zero additional costs or
change to data workflows.
Enterprise Solution
• Distributed denial-of-service (DDOS)
• All solutions include protection from distributed denial-of-service as part of
the service fabric.
• Resiliency
• All solutions include the ability to manage traffic with throttling to withstand
the operational traffic spikes.
• Hardware Secured
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
De-centralised Access Control
• Based on a decentralized Key Management system, there is no
centralized keys ever.
• Support for wide range of record recovery use cases, including mobile
platform recovery.
• In the health records use case, the individuals personal RMS is
completely under the exclusive control of the individual, there is no
"big brother" control and no unauthorized access possible
• Records Management System, and all operators have zero access to
any record encryption keys, there is no single point of records
compromise
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
The Global secure, messaging and record
distribution system, has been designed to provide a
universal secure solution for all digital health
records world wide.
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
The Block Chain Health Records
• Block Chain Technology +
• Network Stack +
• HSM protected Keys +
• Cryptographic Protocols
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
Health Records Privacy
• All parties Identified via Secure Identities (SIN)
• Supports P2P, P2MP EC P384-AES256 encryption
• Need to know, enforced by distributed Key Management System, not
centralized access control lists
• All records encrypted at rest
• Fail safe design
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
Application Datagram Protocol (ADP)
• Runs on top of any type of network
• Short Packets of data called datagrams
• Operates in a
“self contained independent entity of data carrying sufficient
information to be delivered to the destination without reliance on
previous exchanges between this source and destination”
• Connectionless, no session management, or Schannel/VPN required.
• Supports stateless, datagram encryption via Content Messaging
Syntax (CMS), Suite B and EC Public keys
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
Availability
• Available as a licensed private cloud solution
• Private cloud owned and operated by Individual or organization
• Optional Managed Private Cloud
• SDK for client end application integration
• Suitable for PC and global mobile platforms
4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.

Weitere ähnliche Inhalte

Was ist angesagt?

What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity Blockchain Council
 
Global Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupGlobal Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupMaeva Ghonda
 
Cybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrencyCybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrencyTony Martin-Vegue
 
Blockchain in Insurance 101
Blockchain in Insurance 101Blockchain in Insurance 101
Blockchain in Insurance 101Peter Ing
 
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiDeja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiScott Strang
 
Technology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentationTechnology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentationVinod Kumar Nerella
 
Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?Jody Ranck
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studiesInnoTech
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technologyMercy Akinseinde
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
 
Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?ITU
 
Information governance and blockchain
Information governance and blockchainInformation governance and blockchain
Information governance and blockchainMetataxis
 
Blockchain in Trade Finance - 101 Blockchains
Blockchain in Trade Finance - 101 BlockchainsBlockchain in Trade Finance - 101 Blockchains
Blockchain in Trade Finance - 101 Blockchains101 Blockchains Academy
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsDr. Nikolaus Lipusch
 
How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work Blockchain Council
 
How Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-UsersHow Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-UsersWSO2
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technologyRinshi Singh
 
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonosThe KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonosLaurent Henocque
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?ITU
 

Was ist angesagt? (20)

What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity
 
Global Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupGlobal Cybersecurity Blockchain Group
Global Cybersecurity Blockchain Group
 
Cannabis Technology
Cannabis TechnologyCannabis Technology
Cannabis Technology
 
Cybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrencyCybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrency
 
Blockchain in Insurance 101
Blockchain in Insurance 101Blockchain in Insurance 101
Blockchain in Insurance 101
 
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiDeja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
 
Technology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentationTechnology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentation
 
Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
 
Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?
 
Information governance and blockchain
Information governance and blockchainInformation governance and blockchain
Information governance and blockchain
 
Blockchain in Trade Finance - 101 Blockchains
Blockchain in Trade Finance - 101 BlockchainsBlockchain in Trade Finance - 101 Blockchains
Blockchain in Trade Finance - 101 Blockchains
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain Ecosystems
 
How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work
 
How Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-UsersHow Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-Users
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonosThe KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?
 

Andere mochten auch

The History of Blockchain - From Bitcoin to Shared Ledgers
The History of Blockchain - From Bitcoin to Shared LedgersThe History of Blockchain - From Bitcoin to Shared Ledgers
The History of Blockchain - From Bitcoin to Shared LedgersEmily Vaughn
 
Block Chain Record Management
Block Chain Record ManagementBlock Chain Record Management
Block Chain Record ManagementCharles Moore
 
Introduction to bitcoin
Introduction to bitcoinIntroduction to bitcoin
Introduction to bitcoinWolf McNally
 
Distributed ledger technology: beyond block chain
Distributed ledger technology: beyond block chainDistributed ledger technology: beyond block chain
Distributed ledger technology: beyond block chainbis_foresight
 
Block chain 101 what it is, why it matters
Block chain 101  what it is, why it mattersBlock chain 101  what it is, why it matters
Block chain 101 what it is, why it mattersPaul Brody
 
Bitcoin - the Basics
Bitcoin - the BasicsBitcoin - the Basics
Bitcoin - the BasicsVesa Linja-aho
 
How does a blockchain work?
How does a blockchain work?How does a blockchain work?
How does a blockchain work?Deloitte UK
 
State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016CoinDesk
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureMelanie Swan
 
Bitcoin: The Internet of Money
Bitcoin: The Internet of MoneyBitcoin: The Internet of Money
Bitcoin: The Internet of Moneywinklevosscap
 
norstella blockchain en
norstella blockchain ennorstella blockchain en
norstella blockchain enVestforsk.no
 
Food as Distributed Commons: Cryptocurrencies as Slow Money
Food as Distributed Commons: Cryptocurrencies as Slow MoneyFood as Distributed Commons: Cryptocurrencies as Slow Money
Food as Distributed Commons: Cryptocurrencies as Slow MoneyEvelyn Rodriguez
 
Null 14 may_lesser_known_attacks_by_ninadsarang
Null 14 may_lesser_known_attacks_by_ninadsarangNull 14 may_lesser_known_attacks_by_ninadsarang
Null 14 may_lesser_known_attacks_by_ninadsarangNinad Sarang
 
Will Software eat your CEO?
Will Software eat your CEO?Will Software eat your CEO?
Will Software eat your CEO?Fabernovel
 
GAFAnomics
GAFAnomicsGAFAnomics
GAFAnomicsBhavikd7
 
Adblock, enquĂŞte sur un dĂŠtracteur de performance digitale
Adblock, enquĂŞte sur un dĂŠtracteur de performance digitaleAdblock, enquĂŞte sur un dĂŠtracteur de performance digitale
Adblock, enquĂŞte sur un dĂŠtracteur de performance digitaleFabernovel
 
Hot off the Crowd – FABERNOVEL's watch based on crowdfunding and crowdsourcin...
Hot off the Crowd – FABERNOVEL's watch based on crowdfunding and crowdsourcin...Hot off the Crowd – FABERNOVEL's watch based on crowdfunding and crowdsourcin...
Hot off the Crowd – FABERNOVEL's watch based on crowdfunding and crowdsourcin...Fabernovel
 
Le Futur des Ressources Humaines - Demain plus de DRH ?
Le Futur des Ressources Humaines - Demain plus de DRH ? Le Futur des Ressources Humaines - Demain plus de DRH ?
Le Futur des Ressources Humaines - Demain plus de DRH ? Fabernovel
 

Andere mochten auch (20)

The History of Blockchain - From Bitcoin to Shared Ledgers
The History of Blockchain - From Bitcoin to Shared LedgersThe History of Blockchain - From Bitcoin to Shared Ledgers
The History of Blockchain - From Bitcoin to Shared Ledgers
 
Block Chain Record Management
Block Chain Record ManagementBlock Chain Record Management
Block Chain Record Management
 
Introduction to bitcoin
Introduction to bitcoinIntroduction to bitcoin
Introduction to bitcoin
 
Distributed ledger technology: beyond block chain
Distributed ledger technology: beyond block chainDistributed ledger technology: beyond block chain
Distributed ledger technology: beyond block chain
 
Block chain 101 what it is, why it matters
Block chain 101  what it is, why it mattersBlock chain 101  what it is, why it matters
Block chain 101 what it is, why it matters
 
Bitcoin - the Basics
Bitcoin - the BasicsBitcoin - the Basics
Bitcoin - the Basics
 
How does a blockchain work?
How does a blockchain work?How does a blockchain work?
How does a blockchain work?
 
State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the Future
 
Bitcoin: The Internet of Money
Bitcoin: The Internet of MoneyBitcoin: The Internet of Money
Bitcoin: The Internet of Money
 
norstella blockchain en
norstella blockchain ennorstella blockchain en
norstella blockchain en
 
Btcs Corporate Presentation
Btcs Corporate PresentationBtcs Corporate Presentation
Btcs Corporate Presentation
 
Food as Distributed Commons: Cryptocurrencies as Slow Money
Food as Distributed Commons: Cryptocurrencies as Slow MoneyFood as Distributed Commons: Cryptocurrencies as Slow Money
Food as Distributed Commons: Cryptocurrencies as Slow Money
 
Null 14 may_lesser_known_attacks_by_ninadsarang
Null 14 may_lesser_known_attacks_by_ninadsarangNull 14 may_lesser_known_attacks_by_ninadsarang
Null 14 may_lesser_known_attacks_by_ninadsarang
 
Will Software eat your CEO?
Will Software eat your CEO?Will Software eat your CEO?
Will Software eat your CEO?
 
GAFAnomics
GAFAnomicsGAFAnomics
GAFAnomics
 
Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
 
Adblock, enquĂŞte sur un dĂŠtracteur de performance digitale
Adblock, enquĂŞte sur un dĂŠtracteur de performance digitaleAdblock, enquĂŞte sur un dĂŠtracteur de performance digitale
Adblock, enquĂŞte sur un dĂŠtracteur de performance digitale
 
Hot off the Crowd – FABERNOVEL's watch based on crowdfunding and crowdsourcin...
Hot off the Crowd – FABERNOVEL's watch based on crowdfunding and crowdsourcin...Hot off the Crowd – FABERNOVEL's watch based on crowdfunding and crowdsourcin...
Hot off the Crowd – FABERNOVEL's watch based on crowdfunding and crowdsourcin...
 
Le Futur des Ressources Humaines - Demain plus de DRH ?
Le Futur des Ressources Humaines - Demain plus de DRH ? Le Futur des Ressources Humaines - Demain plus de DRH ?
Le Futur des Ressources Humaines - Demain plus de DRH ?
 

Ähnlich wie Block chain health record

Electronic Document and Record Management (EDRMS)
Electronic Document and Record Management (EDRMS) Electronic Document and Record Management (EDRMS)
Electronic Document and Record Management (EDRMS) 6PM Solutions
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityGreat Bay Software
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
apidays LIVE New York 2021 - Security Design Patterns that Protect Sensitive ...
apidays LIVE New York 2021 - Security Design Patterns that Protect Sensitive ...apidays LIVE New York 2021 - Security Design Patterns that Protect Sensitive ...
apidays LIVE New York 2021 - Security Design Patterns that Protect Sensitive ...apidays
 
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...MaryJWilliams2
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfalexguzman510050
 
F&S Award and Report
F&S Award and Report F&S Award and Report
F&S Award and Report Su Ahmad
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageIaetsd Iaetsd
 
Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Blancco
 
Trustworthy Records Retention
Trustworthy Records Retention Trustworthy Records Retention
Trustworthy Records Retention Arwa
 
ARMS Inc. Information Management presentation
ARMS Inc. Information Management presentationARMS Inc. Information Management presentation
ARMS Inc. Information Management presentationYogican
 
Thales e-Security corporate presentation
Thales e-Security corporate presentationThales e-Security corporate presentation
Thales e-Security corporate presentationThales e-Security
 
The Buyers Guide to RMIS (Risk Management Information System)
The Buyers Guide to RMIS (Risk Management Information System)The Buyers Guide to RMIS (Risk Management Information System)
The Buyers Guide to RMIS (Risk Management Information System)MuhammadArisandyPrat
 
An Introduction to Asset Recovery
An Introduction to Asset RecoveryAn Introduction to Asset Recovery
An Introduction to Asset Recoverymylespilkington
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage DetectionIJERA Editor
 
Replacing Tape Backup with Cloud-Enabled Solutions by Index Engines
Replacing Tape Backup with Cloud-Enabled Solutions by Index EnginesReplacing Tape Backup with Cloud-Enabled Solutions by Index Engines
Replacing Tape Backup with Cloud-Enabled Solutions by Index EnginesAmazon Web Services
 

Ähnlich wie Block chain health record (20)

Electronic Document and Record Management (EDRMS)
Electronic Document and Record Management (EDRMS) Electronic Document and Record Management (EDRMS)
Electronic Document and Record Management (EDRMS)
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
apidays LIVE New York 2021 - Security Design Patterns that Protect Sensitive ...
apidays LIVE New York 2021 - Security Design Patterns that Protect Sensitive ...apidays LIVE New York 2021 - Security Design Patterns that Protect Sensitive ...
apidays LIVE New York 2021 - Security Design Patterns that Protect Sensitive ...
 
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
 
Ief information day 2017
Ief information day 2017Ief information day 2017
Ief information day 2017
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
F&S Award and Report
F&S Award and Report F&S Award and Report
F&S Award and Report
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files
 
Trustworthy Records Retention
Trustworthy Records Retention Trustworthy Records Retention
Trustworthy Records Retention
 
ARMS Inc. Information Management presentation
ARMS Inc. Information Management presentationARMS Inc. Information Management presentation
ARMS Inc. Information Management presentation
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
Thales e-Security corporate presentation
Thales e-Security corporate presentationThales e-Security corporate presentation
Thales e-Security corporate presentation
 
Data Security
Data SecurityData Security
Data Security
 
The Buyers Guide to RMIS (Risk Management Information System)
The Buyers Guide to RMIS (Risk Management Information System)The Buyers Guide to RMIS (Risk Management Information System)
The Buyers Guide to RMIS (Risk Management Information System)
 
An Introduction to Asset Recovery
An Introduction to Asset RecoveryAn Introduction to Asset Recovery
An Introduction to Asset Recovery
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Replacing Tape Backup with Cloud-Enabled Solutions by Index Engines
Replacing Tape Backup with Cloud-Enabled Solutions by Index EnginesReplacing Tape Backup with Cloud-Enabled Solutions by Index Engines
Replacing Tape Backup with Cloud-Enabled Solutions by Index Engines
 

KĂźrzlich hochgeladen

pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...Call Girls Noida
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabadgragmanisha42
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknowgragteena
 
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...gurkirankumar98700
 
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130  Available With RoomVIP Kolkata Call Girl New Town 👉 8250192130  Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Roomdivyansh0kumar0
 
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Call Girls Service Chandigarh Ayushi
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Memriyagarg453
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxAyush Gupta
 
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Modelsindiancallgirl4rent
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipurgragmanisha42
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Miss joya
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012Call Girls Service Gurgaon
 
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171Call Girls Service Gurgaon
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...indiancallgirl4rent
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...Gfnyt.com
 
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaRussian Call Girls in Ludhiana
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 

KĂźrzlich hochgeladen (20)

pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
 
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
 
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130  Available With RoomVIP Kolkata Call Girl New Town 👉 8250192130  Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
 
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
 
#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi
#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi
#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptx
 
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
 
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
 
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 

Block chain health record

  • 1. Block Chain Health Records Management The Secure Health Records management Service 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 2. Records management? • Records management (RM), also known as records and information management or RIM, is the professional practice of managing the records of an organization throughout their life cycle, from the time they are created to their eventual disposal. This includes identifying, classifying, storing, securing, retrieving, tracking and destroying or permanently preserving records. 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 3. The facts? 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD. The medical/health care sector now leads all sectors in the number of records compromised to date in 2016. The sector has posted 36.1% (217) of all data breaches so far this year. The number of records exposed in these breaches totaled more than 12 million, or about 59.2% of the total so far in 2016.
  • 4. Patient Concerns • concerns about inappropriate releases of information from individual organizations • concerns about the systemic flows of information throughout the health care and related industries • concerns about loss of medical records caused by threats from a modern digital world like ransomware • Concerns about the false security of “anonymised data” when applied to the world of big data 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 5. Patient Centric Principles • All health records owned exclusively by the patient • All health records under the exclusive control of the patient • All health records created by any health provider must provide the original health records to the patient nominated Records Management System, all local copies must be destroyed by the health provider • All health records must be encrypted at rest and in transit under a mandatory security policy • All health records management systems must fail safe • No patient health records must be accessible to or by any Records Management System or operations personal 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 6. The Digital World • Creating and capturing health records, and associated metadata, into recordkeeping systems • Storing and securing health records, including planning for disasters • Preserving health records for as long as they are required; • Providing and restriction of access to health records • Disposing of health records in an approved manner 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 7. Threats to Digital Health Records • Protecting health records from ransomware and other digital threats • Protecting health records from unauthorized disclosure, theft, alteration or destruction 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 8. Why do we need secure Health Records Management • The medical/health care sector now leads all sectors in the number of records compromised to date in 2016. The sector has posted 36.1% (217) of all data breaches so far this year. The number of records exposed in these breaches totaled more than 12 million, or about 59.2% of the total so far in 2016. • The business sector accounts for nearly 2.5 million exposed records in 264 incidents. That represents 43.9% of the incidents, and 11.8% of the exposed records. • The government/military sector has suffered 38 data breaches so far this year, representing about 27.1% of the total number of records exposed and 6.3% of the incidents. More than 5.7 million records have been compromised in the government/military sector to date in 2016. 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 9. Characteristics • known level of assurance and hence risk • sits publicly on the internet (secrecy is not required to underpin security) • does not rely on any network security, VPN or firewalls • all data access is based upon well known and operational tested KMS • all access follows the well known compartmented security mode of operation • assume a BYOD as default environment, does not rely on controlled end points • supports industry standard CMS • support for custom meta data • support storage of arbitrary sized and content types within each record • all access to be enforced via Hardware based Security modules • mandatory security policy requiring all data is encrypted in transit and at rest • system will fail safe • support for industry standard records management dictionaries. • No centralized access control • Immune to Ransomware 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 10. Meta Data • Metadata is generally categorized into four or five groupings based on the information the metadata captures, as described below: • Descriptive Metadata: Metadata that describes the intellectual content of a resource and used for the indexing, discovery and identification of a digital resource. • Administrative Metadata: Metadata that includes management information about the digital resource, such as ownership and rights management. • Structural Metadata: Metadata that is used to display and navigate digital resources and describes relationships between multiple digital files, such as page order in a digitized book. • Technical Metadata: Metadata that describes the features of the digital file, such as resolution, pixel dimension and hardware. The information is critical for migration and long- term sustainability of the digital resource. • Preservation Metadata: Metadata that specifically captures information that helps facilitate management and access to digital files over time. This inherently includes descriptive, administrative, structural, and technical metadata elements that focus on the provenance, authenticity, preservation activity, technical environment, and rights management of an object. 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 11. ACID Properties of a Record • A- Atomicity: requires that each transaction be "all or nothing": if one part of the transaction fails, then the entire transaction fails, and the store state is left unchanged. An atomic system must guarantee atomicity in each and every situation, including power failures, errors, and crashes. To the outside world, a committed record appears (by its effects on the contained records) to be indivisible ("atomic"), and an aborted record does not happen.; • C- Consistency: property ensures that any transaction will bring the record from one valid state to another. Any data written must be valid according to all defined rules. This does not guarantee correctness of the transaction, merely that any programming errors cannot result in the violation of any defined rules. The RMS is effectively a "write once" data store, and hence only has a single state. Data destruction is achieved via destruction of the record key, the RMS will always remain immutable set of records under all operational use cases. • I- Isolation: property ensures that the concurrent execution of transactions results in a system state that would be obtained if transactions were executed serially, i.e., one after the other. Providing isolation is the main goal of concurrency control. as the effects of an incomplete transaction might not even be visible to another transaction. A block chain by definition enforces serial ability of all records, combined with immutability ensures isolation between records. • D- Durability: property ensures that once a transaction has been committed, it will remain so, even in the event of power loss, crashes, or errors. Persistence of data across physically dispersed locations enhances durability, of the immutable RMS. 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 12. Ransom-ware Defeated 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD. Finally a solution which protects against ransom ware ( its an immutable record), with zero additional costs or change to data workflows.
  • 13. Enterprise Solution • Distributed denial-of-service (DDOS) • All solutions include protection from distributed denial-of-service as part of the service fabric. • Resiliency • All solutions include the ability to manage traffic with throttling to withstand the operational traffic spikes. • Hardware Secured 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 14. De-centralised Access Control • Based on a decentralized Key Management system, there is no centralized keys ever. • Support for wide range of record recovery use cases, including mobile platform recovery. • In the health records use case, the individuals personal RMS is completely under the exclusive control of the individual, there is no "big brother" control and no unauthorized access possible • Records Management System, and all operators have zero access to any record encryption keys, there is no single point of records compromise 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 15. The Global secure, messaging and record distribution system, has been designed to provide a universal secure solution for all digital health records world wide. 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 16. The Block Chain Health Records • Block Chain Technology + • Network Stack + • HSM protected Keys + • Cryptographic Protocols 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 17. Health Records Privacy • All parties Identified via Secure Identities (SIN) • Supports P2P, P2MP EC P384-AES256 encryption • Need to know, enforced by distributed Key Management System, not centralized access control lists • All records encrypted at rest • Fail safe design 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 18. Application Datagram Protocol (ADP) • Runs on top of any type of network • Short Packets of data called datagrams • Operates in a “self contained independent entity of data carrying sufficient information to be delivered to the destination without reliance on previous exchanges between this source and destination” • Connectionless, no session management, or Schannel/VPN required. • Supports stateless, datagram encryption via Content Messaging Syntax (CMS), Suite B and EC Public keys 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 19. Availability • Available as a licensed private cloud solution • Private cloud owned and operated by Individual or organization • Optional Managed Private Cloud • SDK for client end application integration • Suitable for PC and global mobile platforms 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.