top of page

With confidentiality requirements and security concerns, Data Services are an important and perhaps the most complicated part of the System. There are lots of different kinds of data, which have with different types of access controls based on different Roles within and across Systems.

 

  • General Public Information (accessible to the Public on a general scan of a person or other Object)

  • Personal Information (accessible to the owner of the account and their approved administrators (may be added controls and/or information if a guardian, call center, or social advocacy group is involved)

  • Monitoring/Test Data (Medical, Fitness, Security, and Control) for raw data, analysis, and reporting (for device companies, Doctors, individuals, guardians, etc.)

  • Event and Alert Monitoring (designed to be accessible by type)“

  • In Healthcare Network” Information (accessible under the “In Healthcare Network” rules)

  • “Out of Network” Information (any provided access to “Out of Network“ Healthcare groups and their rules)

  • Device Support Data (restrictions on information accessible by the individual, lease holder, manufacturer, and support provider)

  • Personal Service Provider Data (restrictions on information accessible by the individual, approver, guardian, service provider, dispatcher)

  • Call Center Information (access for workers and supervisory staff)

  • General Data used by Analysis Groups (organizations getting generic information to analyze and trend CDC, WHO, System Improvement Processes)

  • Volunteer Data (access for information for individuals with agencies, and information between agencies)

  • Emergency Information (derived from accounts ) for Postal APP, “At Risk” APP, Volunteer APP, and Disaster/Outage Service Management (stored on the Server, Contingency Planning Servers, workers and volunteer phones/tablets)

Data Acces Services

Input and collected data is temporarily or permanently stored in a number of locations that need to be controlled or managed

  • General Monitoring, Control, and Treatment Devices

  • Control Devices (PCs, Smartphones, Tablets)

  • Individual Servers (HIPAA and non-HIPAA)Cloud Servers (HIPAA and non-HIPAA)

 

The System uses several different methods to populate, protect, access, and manage data. These include “Authenticated”, “Registered”, “Push”, and “Pull” methods.

  • The “Access” method, is a standard login/password authentication into the System that provides specific privileges/access to different parts of the individual System and Accounts within it.

  • The “Registration” method, uses well defined Object/Interfaces, which once they are “Registered” they can communicate and update between each other. These are primarily used for services, applications, and devices within and between Systems.

  • The “Push” method, is fairly simple, where certain events, alarms, and data, can be set up to be automatically or manually transferred to a specified individual, application/service, device, etc. where they only get the data that they are set up to receive.

  • The “Pull’ method is were an individual or role within a System or Cross Systems wants to access (or Pull) data from a System. This is an initiated action. This method requires setting up identity, authentication, and access methods to populate, protect, access, and manage data. This is primarily setup through Access Control Lists (ACLs).

 

Some examples of Authenticated Access:

  • Access to a System and/or Account within that System on a Phone/PC/Tablet APP based on their username and assigned roles for that username

  • Access to a System and/or Account within that System on the Web based on their username and assigned roles for that username

 

Some examples of “Registration” access

  • A device is registered with a System (as well as possibly an account) and the device can update data it collects for an individual which will be kept in a special location different from other data, and the individual can do updates on the device

  • A Personal Service Provider needs to update information or billing from themselves, and the client needs to update their profile for them

  • An Application needs to access certain data to be able to do analysis and presentations for an account and System

 

Some examples of “Push” Data to Individuals, Roles, Systems, Services, Devices:

  • Scheduling Data to set up or remind

  • Errors, Events, and/or Alarms from devices 

  • Analysis of Data received that might require an alert or event

  • Triggered events (e.g. an event that has, or has not occurred)

  • Sending and responding to Alerts through txt

  • A Medical Report

  • A question to a Health Professional

  • Preparation for a Medical examination

 

Some Examples of “Pull” Data from Individuals, Roles, Systems, Services, Devices

  • Getting the Public Identity Profile from an Individual through a RFID or Camera Scan

  • A person wants to access information about an account within their System

  • A Medical Professional or Insurance wants to Pull certain data from one System to another

 

Additional information on how the data and the different methods are setup and used are in an available white paper. Click Here to see Preliminary Paper

bottom of page