1 / 11

Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC)

Cross Sector Digital Identity Initiative. Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC). March 12, 2014.

sai
Télécharger la présentation

Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cross Sector Digital Identity Initiative Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC) March 12, 2014 Work described in this presentation was supported by the National Strategy for Trusted Identities in Cyberspace (NSTIC) National Program Office and the National Institute of Standards and Technology (NIST). The views in this presentation do not necessarily reflect the official policies of the NIST or NSTIC, nor does mention by trade names, commercial practices, or organizations imply endorsement by the U.S. Government. Building a community for safe identity exchange

  2. CSDII Consortium Private and public sector Individuals, Relying Parties, Identity Providers, Identity Proofers, Attribute Verifiers, Attribute Providers, Credential Service Providers, and Privacy Enhancing Technology Providers to include:

  3. Components Secure Linking Process

  4. Architecture

  5. Capabilities Evolve Trust Framework & UX

  6. Use Cases • Patient Access to Electronic Health Record • Social IDP • Verified Attributes (for patient matching) • Two Factor Authentication • Provider Access to Health System • Strong identity proofed Credential • Multi-Factor Authentication

  7. Barriers and Lessons Learned • Regulatory • Protected Patient Demographic Data Usage • HIPAA Compliance • Meaningful Use • Perception • Security • Data Breach • Liability • External and Internal Views

  8. Barriers and Lessons Learned • Technical • Integration with EHR • Network Access • Security Protocols • Process Flow • Patient Enrollment • Data Collection • Streamlining Access

  9. How does Healthcare Factor In? • Stringent Data Privacy • Sets Bar High • Promotes Privacy Lens in Solution Development • Triggers Regulatory Questions • Identity Proofing • Streamline Enrollment • Augment Existing Mechanisms • Market Adoption • Promotes Reusable Patterns • Tests Interoperability • Consumer (Patient) Education

  10. Next Steps • Pilot Launch in April (Period of Performance: 6 months) • Patient Access Use Case • Provider Access Use Case • Prepare for Commercial Marketplace

  11. Michael P Farnsworth Jr CTO, Binary Structures Corporation mikef@binarystructures.com 804.334.1911

More Related