Dashboard eHealth services: actual mockup

Slides:



Advertisements
Similar presentations
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Advertisements

Public Key Infrastructure and Applications
© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
Research and Innovation Participant Portal Concept for electronic-only grant management in Horizon 2020 Peter HÄRTWICH
EHealth: some challenges Frank Robben General manager eHealth-platform Sint-Pieterssteenweg 375 B-1040 Brussels
eHealth Platform: Progress and Prospects
Workshop on registered electronic mail policies and implementations (ETT 57074) Ankara, –
PenalNet Secure e-communications in Criminal Law Practice Antonio Ruiz-Giménez de Aguilar, CEO of PenalNet.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
Opening Presentation of Notary Reqs 8/5/2004 Tobias Gondrom.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Page 1 Issues in and perspectives on electronic authentication of health professionals Pascal POITEVIN Marketing and Communication manager GIP-CPS e-Health.
Crossroads Bank for Social Security & eHealth platform How federal institutions support Belgian social and health care sector.
The Crossroads Bank for Social Security, a model for the health care sector ? Frank Robben General manager Crossroads Bank for Social Security Sint-Pieterssteenweg.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
Making the Services Directive Work Dublin 6 March 2014 Services Directive and why it matters.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
How can I trust the rest of Europe ? Requirements and a possible organisation with regard to epSOS and eHealth Frank Robben General manager eHealth platform.
Identity Conference: modernization of health processes in Belgium 14/05/2014 Frank Robben General manager of the eHealth platform Quai de Willebroeck 38.
Nationwide Health Information Network: Conditions for Trusted Exchange Request For Information (RFI) Steven Posnack, MHS, MS, CISSP Director, Federal Policy.
The possible support of the Crossroads Bank for Social Security (CBSS) and the eHealth platform to a Belgian Longitudinal Health Information System Frank.
EHealth/mHealth Gisele Roesems Deputy Head of Unit Health and Well-Being DG CONNECT EUROPEAN COMMISSION 2 nd International Conference on Health Informatics.
Cryptography, Authentication and Digital Signatures
Electronic identity management for eGovernment Conceptual framework and objectives Frank Robben General manager Crossroads Bank for Social Security Strategic.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
Some identification needs related to workers’ mobility eGovernment – eIDM ad hoc group meeting 4-5 May 2006 CBSS Crossroads Bank for Social Security Frank.
EHealth-platform: state of affairs and
1 European eGovernment Awards 2007 European eGovernment Awards 2007 Workshop for Finalists July, Brussels LIMOSA Belgium Reference project number.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
DIGITAL SIGNATURE.
How the eHealth platform can be of use for eLifeSciences Frank Robben General Manager eHealth platform Sint-Pieterssteenweg 375 B-1040 Brussels
The German eID and eIDAS
eIDAS: current state of play and the Luxembourgish approach
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
OASIS Digital Signature Services and ETSI standards Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales.
01/09/17 Architecture.
Training for developers of X-Road interfaces
The Citizen in the centre in EU, Bratislava November,2005
Efficient and secure transborder exchange of patient data
Cross-sector and user-centric AAI
TeleTrusT Initiatives for PKI Solutions
INDUSTRY WORKSHOP STORK OVERVIEW 2nd Industry Group – 26 June, 2009
Electronic Transactions & Authentication
e-Health Platform End 2 End encryption
THE STEPS TO MANAGE THE GRID
Public Key Infrastructure (PKI)
Information Governance and Data Privacy: A World of Risk
S/MIME T ANANDHAN.
Digital Signature.
Public private partnership concerning user and access management (UAM): the vision of the federal
12 E-Commerce Overview.
Digital Signatures and Forms
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
The Once-Only Principle Project
Pooja programmer,cse department
Confidentiality and Privacy Controls
TRACES Trade Control and Expert System Electronic sanitary certificates using qualified electronic signature Brussels 15th September 2016.
CEF eID SMO The use of eID in eHealth
Website authentication E-registered delivery
Electronic Payment Security Technologies
31st Conference of European Civil-Law Notaries Interconnection and Quality Salla Saastamoinen, Director of the Directorate for Civil and commercial.
Reiniger LLC.
eHealth/mHealth Gisele Roesems
Presentation transcript:

Dashboard eHealth services: actual mockup

12/02/2019

12/02/2019

12/02/2019

Efficient and secure transborder exchange of patient data

12/02/2019 A

Basic requirements Correct identification of the patient 12/02/2019 Basic requirements Correct identification of the patient Correct routing of the information request Privacy and information security management user & access management end-to-end encryption Interoperability technical semantic

10 Basic services eHealth-platform 12/02/2019 10 Basic services eHealth-platform Coordination of electronic sub-processes Portal Integrated user and access management Logging management System for end-to-end encryption eHealthBox Timestamping Encoding and anonymization Consultation of the National Identification Registers Reference directory (metahub)

Identification of the patient 12/02/2019 Identification of the patient Obligatory use of social security identification number (SSIN) in Belgian health sector Procedures are available in order to guarantee unicity of SSIN SSIN is available on electronic identity card or ISI+-card Link register is available in order to link the Belgian SSIN with identification numbers in other countries

Routing: hubs & metahub system 12/02/2019 Routing: hubs & metahub system 5 hubs 3 technical implementations All Belgian hospitals connected

Routing: hubs & metahub system 12/02/2019 Routing: hubs & metahub system 3. Retrieve data from hub A A 1: Where can we find data? 2: In hub A and C 4: All data available 3: Retrieve data from hub C C B

Routing: extramural data 12/02/2019 Routing: extramural data A InterMed BruSafe C B

User & access management (UAM) 12/02/2019 User & access management (UAM) reliable exchange of personal data requires sufficient certainty about the identity of the data subjects (cf supra) adequate access control requires sufficient certainty about identity of the users authentication of the identity of the users verification of relevant characteristics of the users verification of relevant relationships between the users and the data subjects verification of relevant mandates of the users

UAM: objectives to be reached 12/02/2019 UAM: objectives to be reached be able to (electronically) identify all relevant entities (physical persons, companies, applications, machines, …) know the relevant characteristics of the entities know the relevant relationships between entities know that an entity has been mandated by another entity to perform a legal action know the authorizations of the entities in a sufficiently certain and secure way in as much relations as possible (C2C, C2B, C2G, B2B, B2G, …) using open interoperability standards

UAM: policy enforcement model 12/02/2019 UAM: policy enforcement model

UAM: policy enforcement model 12/02/2019 UAM: policy enforcement model

First step: eIDAS regulation 12/02/2019 First step: eIDAS regulation regulation (EU) No 910/2014 of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market overall objective: strengthen EU single market by boosting trust and convenience in secure and seamless cross-border electronic transactions 3 means increasing the effectiveness of public and private online services, electronic business and electronic commerce in the European Union, by eliminating (legal and technical) obstacles for the functioning of the internal market => choice for a regulation enhance trust in electronic transactions , in particular cross-border transactions, by providing a common foundation for secure electronic interaction between citizens, businesses and public authorities => high level of security and better information (EU trust mark) enhance legal certainty within the use of electronic identification means and trust services regulation => direct effect on Belgian law

eIDAS regulation: overall content 12/02/2019 eIDAS regulation: overall content mandatory mutual recognition of some electronic identification means electronic trust services scope electronic signatures, including validation and preservation services electronic seals, including validation and preservation services time stamping electronic registered service delivery website authentication horizontal principles: security requirements, trusted lists, EU trust mark, prior authorisation, qualified services, liability, data protection, supervision, international aspects non-discrimination of electronic documents vis-à-vis paper documents as evidence in legal proceedings does not regulate mutual recognition of proof of characteristics or relationships !

Belgian law on electronic identification 12/02/2019 Belgian law on electronic identification Belgian law on electronic identification of 18 July 2017 completes the eIDAS Regulation some provisions: each Belgian public sector body determines the required assurance level for access to its services and informs DG DT about this DG DT determines the assurance level of the schemes to be notified to the European Commission, after consulting the Colleges of Presidents of the federal public services, the social security institutions and the federal public utility institutions DG DT is charged with offering electronic notification services within the federal authentication service (FAS) DG DT passes a minimum set of person identification data to the node of another MS (retrieved from by SSIN), when a user wants access to an online service in that other MS

End-to-end encryption 12/02/2019 End-to-end encryption 2 methods in the case of a known recipient: use of an asymmetric encryption system (2 keys) in the case of an unknown recipient: use of symmetric encryption (the information is encrypted and stored outside the eHealth platform; the decryption key can only be obtained through the eHealth platform) need for agreements in an international context

Asymmetric end-to-end encryption 12/02/2019 Asymmetric end-to-end encryption Healthcare actor Person or entity eHealth platform Internet 1 3 Connector or other software to generate key pair Authenticates sender 4 2 Identification certificate Stores public key Identificatieoncertificate Sends public key Web service Register key 2 Public keys repository Stores private key in a secure way

Asymmetric end-to-end encryption 12/02/2019 Asymmetric end-to-end encryption eHealth platform Message originator Internet Identification certificate 1 Web service Ask public key Identification certificate 2 Asks for public key Authenticates sender Send message Any protocol 3 4 Sends public key Encrypts message Identification certificate Public keys repository Message recipient Stored private key 5 Decrypts message

Symmetric end-to-end encryption 12/02/2019 Symmetric end-to-end encryption Key Management / Depot Symmetric key Encrypted with public key of user 1 Encrypted with public key of user 2 Symmetric key 2 sends key 5 receives key User 1 Originator 1 asks for key User 2 Recipient 4 justifies right to obtain key 4 justifies right to obtain message 3 sends encrypted message Encrypted with public key of Message depot 5 receives message Encrypted with public key of User 2 Message encrypted with symmetric key Messages Depot Message encrypted with symmetric key Message encrypted with symmetric key

Interoperability technical semantic preferably structured messages 12/02/2019 Interoperability technical preferably structured messages use of international standards semantic preferably common coding system with embedded translation into different languages

Thank you ! Any questions ?