– A partnership between Donor Concierge and ALTR will use blockchain technology to protect health data and patient privacy for FRTYL, a service that links fertility agencies and clinics with parents seeking infertility treatments.
The ALTR data security platform allows FRTYL to store and retrieve data, and to make it anonymous to use it as a reliable resource that protects the identity and authenticity of all the participants involved, they explained companies.
The centralized database of FRTYL offers a deposit of surrogates and over 15,000 sheep donors so that they can be matched to the expected parents. Sensitive information that resides in the database includes the history of family health, the history of sexual health, the use of drugs and alcohol, the previous history of the egg donation cycle and the personal information about the genetic carrier.
"There is so much sensitive information on donors and surrogates in the fertility field of third parties that we believe that safety is extremely important.In addition to HIPAA compliance, we are interested in working with ALTR because it is the only company that offers blockchain technology. for data, "said Donor Concierge founder Gail Sexton Anderson. HealthITSecurity.com.
He noted that only 2 out of the 70 donor agencies that the FRTYL spoke with thought, HIPAA compliance was important.
ALTR said its technology is the first commercial software package that applies blockchain to data security. The technology provides an interoperable network infrastructure that ensures control over how patient data is viewed or used and by whom.
"We can create an immutable register or record of all the activities that take place within a company application … This is a normative force." If you want to know everything that has happened inside a &. Application, we can deliver it from our platform, "explained Dave Sikora, CEO of ALTR.
"We will take data from a database, break up that data and spread it around the blockchains so we can reassemble the data on scale and with low latency If the bad guys break into the database, what they see is useless for them because the data is extracted from the database and spread across the blockchain network, "he said HealthITSecurity.com.
"To meet HIPAA requirements, you need to be able to protect your data from internal and external threats." FRTYL employees do not have access to very sensitive data but can work on application, "he said.
The EHNAC (Electronic Healthcare Network Accreditation Commission) has also taken note of the security implications of blockchain technology. EHNAC Executive Director Lee Barrett said HealthITSecurity.com this blockchain will play a key role in the Trusted Exchange Framework and in the Common Agreement (TEFCA) of the ONC.
The draft agreement includes a common set of principles for trusted exchange and minimum conditions for trusted exchange. This was designed to bridge the gap between supplier and patient information systems and enable interoperability between networks of different health information, the ONC explained.
Blockchain will become a component technology of any trusted exchange framework, and blockchain-based systems have the potential to reduce costs and the friction of current intermediaries, Barrett said.
"Interoperability across the mission, the way it is exploited in these trusted exchange frameworks, makes the blockchain a truly excellent technology to exploit as part of any trusted exchange structure," he said.
Blockchain is an important enabling technology for the exchange of trust for TEFCA, and the ONC will probably focus on blockchain to help support the 21st Century Cures Act, he said.
"As we start looking for a common agreement, it becomes an enabling technology to do all of this," continued Barrett. "If you look at the blockchain, you are really focusing on data integrity, decentralization and disintermediation of trust and reduced transaction costs."
"If we consider the definition of blockchain as a distributed system for registration, storing transaction records is basically an immutable record that can not really be changed," Barrett explained.
"There are peer-to-peer transactions that are going through the various networks, all these different exchanges, whether it's personal or HIE clinical records [health information exchange] records, are exploiting cryptographic techniques that are then implemented throughout the exchange, "he concluded.