The card would then be encrypted and stored in the holder’s digital wallet. Digital identity technologies would provide a way of requesting a digital health insurance card from the issuer (from Assurance Maladie in France, for example). Let’s take the example of accessing a medical file. The advantage of digital identity lies in the tamper-proof verification process triggered when an organization requests access to the data contained in the digital wallet. This digital wallet, much like its physical counterpart, contains data in the form of verifiable credentials, which may include digital versions of your driver’s license, diplomas or medical records. ![]() ![]() Users access a mobile application – their “citizen’s digital wallet” – to carry out this transaction. The fundamental principle of digital identity is that users own their sensitive data (known as verifiable data) and only share it with specific organizations when necessary. Regaining data sovereignty through digital identity What’s more, the information is stored on centralized servers that are vulnerable to hacking. No notification is sent if the file is accessed without the patient’s authorization or explicit consent to any updates made. From this point onwards, the patient loses full control of their medical file and sensitive data. This interaction is then recorded in the patient’s digital file. A verifier (the hospital), which requests proof of identity when the patient arrives for treatment, and verifies the validity of this proof with the issuer.Īfter successful verification, the patient can be treated.The holder (the individual), who holds this ID card and keeps it in their digital wallet.A trusted identity issuer (such as Assurance Maladie in France or Régie de l’Assurance Maladie in Quebec), which creates and issues health insurance cards, such as the Carte Vitale.Let’s take the example of creating a medical record for a new patient to illustrate the three essential roles in establishing this bond of trust. This “triangle of trust” is essential to ensure reliable interaction. The patient produces a form of physical ID, which is validated at source to confirm its authenticity and verify that it has been issued to the right individual. Trust is established by identifying the patient on arrival. There is no intermediary between patient and healthcare professional. The triangle of trustĭiscretion and confidentiality are the hallmarks of a face-to-face consultation with your doctor. This shortcoming is in part down to the lack of a true digital identity, as highlighted in a recent white paper on digital identity published by the Digital Identity Lab of Canada. And with loss of control comes loss of trust. Although protecting this data is regulated by the GDPR in Europe and Bill 25 in Quebec, the architecture that is inherent to the digital world means that we lose control over most of our sensitive data. The incidents mentioned above highlight the main issues surrounding access to your data, personal data security and trust in the digital age. The shift to digital technology, accelerated by the Covid-19 pandemic, poses a number of challenges for personal data protection. In France, nine out of ten doctors say they use digital technology to share medical information with patients or colleagues. The mother of a teenager who took his own life in November 2020 was horrified to discover that 11 people had accessed her son’s medical file in the three years since his death. Unfortunately, this is not an isolated case. In Quebec, one public figure’s medical file was accessed more than ten times in the last three years, even though she hadn’t set foot in the health facility for more than a decade. Medical data is vulnerable, and not just to cyberattacks. These facilities hold large quantities of sensitive data that cybercriminals can sell for a high price. Hospitals are involved in around a third of all personal data leaks. This is why cybercriminals target the healthcare sector in particular. ![]() Getting hold of your personal information can lead to identity theft and fraudulent use of credit cards, for example. Sensitive data is a prime target for cybercriminals.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |