powering care coordination through mobility (mhealth summit 2012 wipjam)

7
HEALTHCARE. CONNECTED & PROTECTED Powering Care Coordination Through Mobility mHealth Summit 2012

Upload: wipjam

Post on 30-Oct-2014

458 views

Category:

Documents


5 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Powering Care Coordination Through Mobility (mHealth Summit 2012 WIPJam)

Powering Care Coordination Through Mobility

mHealth Summit 2012

Page 2: Powering Care Coordination Through Mobility (mHealth Summit 2012 WIPJam)

HEALTHCARE. CONNECTED & PROTECTED

Healthcare. Connected and Protected

Diversinet’s scalable mobile health solutions offer an innovative enterprise-

level platform approach to achieve interoperability, security and agility.

2

Page 3: Powering Care Coordination Through Mobility (mHealth Summit 2012 WIPJam)

HEALTHCARE. CONNECTED & PROTECTED 3

Secure Connected & Personalized Care Solutions

Security and Privacy

Agile Platform for App Development &

Integration

Interoperable mApplications

Diversinet leads the healthcare industry with a secure enterprise mobile healthcare platform and integrated

solutions. Which address some of the key challenges in mobile health

Page 4: Powering Care Coordination Through Mobility (mHealth Summit 2012 WIPJam)

HEALTHCARE. CONNECTED & PROTECTED 4

Mobile Security in a BYOD World

Authentication - Who Am I and Who Am I Talking to? People / Complexity- Passwords, 2 Factor

(1-way / 2 way)

Privacy - Encryption (Who do you trust?) –> Provenance

Device Management – the Ground Up View Issues

Beyond Security - Data Provenance Combination of Clinical + Extra Clinical Determinants of Health

Page 5: Powering Care Coordination Through Mobility (mHealth Summit 2012 WIPJam)

HEALTHCARE. CONNECTED & PROTECTED

Bi-Lateral AuthenticationPin # Client Access

Data Destroyed After Failed Attempts

Data is Encrypted

Client Bound to Mobile

OTP Generated on Every Session

Our Core Security Model

Dynamic Authentication & Encryption

Mobile Authenticates To The Server

Server Authenticates To The Device

SSL Pipe

Encrypted Data Exchange

Data Encrypted In Storage

Tamper Proof Audit Logs

Crypto libraries are FIPS 140-2 validated

MobiPublisher ServersMobiSecure Clients

5

The HIT Policy Committee, which advises HHS/ONC, voted Sept. 6, 2012 to accept recommendations from its Privacy and Security Tiger Team to require

multi-factor authentication for remote access to patient information for Stage 3 of the HITECH Act EHR Meaningful Use incentive program.

Page 6: Powering Care Coordination Through Mobility (mHealth Summit 2012 WIPJam)

HEALTHCARE. CONNECTED & PROTECTED

Mobile Application Interoperability

mPHR+

•Download PHR data•Share data securely•Secure Messaging

Profile/Preferences

•Health Profile•Care Goals•Preferences•Determinants of Health

Biometrics

•Weight•BP•Pulse•Glucose•Others

Secure - Write Once Deliver Across All Mobile Platforms

CONTENT:Care Pathways,

Care Plans,Patient Education

DATA SOURCES:EHRHIE

Blue Button Medical Devices

7

Sta

nd

ard

In

terf

aces

(WS

I &

CC

D)

Mobisecure (Provisioning and Security)Mobisecure (Provisioning and Security)

Configuration Manager

Analytic Portal

Mobile Content Manager

Messenger

Interoperable Mobile Apps

Preventive Screening

Mood Tracker

My Care Plan

Medication

Adherence

NewApps

mobiSurvey Manager

mobiMessenger

Soap

Soap

Soap

Soap

& Web Portal

Page 7: Powering Care Coordination Through Mobility (mHealth Summit 2012 WIPJam)

HEALTHCARE. CONNECTED & PROTECTED

Example of the Importance of mobile app interoperability

8

Review of Patient Generated Health Data

• Mood tracker shows decline

• Medication Adherence inconsistent

• Eating patterns, physical activity, sleep, anxiety and depression data on decline

ADH

ERENCE