Remove tag identity-authentication
article thumbnail

Our passwords, ourselves -- the nightmare of authentication

Aging in Place Technology Watch

Signing on to my bank account on a computer – there is that two-factor authentication (2FA) thing again. And that’s after your password is accepted – and your identity is verified after you checked 'I'm not a robot' box. Back to 2-factor authentication. category tags: computers, broadband, and social networking , smartphones

111
111
article thumbnail

Did you miss one? Five Aging and Health Tech blog posts March 2023

Aging in Place Technology Watch

Here are four other blog posts from March to think about: Our passwords, ourselves - the nightmare of authentication. Signing on to my bank account on a computer – there is that two-factor authentication (2FA) thing again. Signing on to my bank account on a computer – there is that two-factor authentication (2FA) thing again.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2023 Market Overview (3 of 4) Advice to Vendors --It's Service, not Products

Aging in Place Technology Watch

For safety-oriented apps and sites that include the role of the senior, it’s critical to verify identity among provider and user roles. Two-factor authentication will likely be required as part of all online apps, including financial and health-related services. Technologies must be well-supported and intuitive.

article thumbnail

GDPR on FHIR

Healthcare Exchange Standards

Provides a pattern for OAuth scopes IHE - Internet User Authorization - defines a set of OAuth token attributes HEART -- a mechanism for externalized Consent to be managed and Authorization decisions made Identity -- various FHIR resources are tied to identities that can be used in Policy (e.g.

FHIR 56
article thumbnail

Telehealth and Cybersecurity: Is Your Crisis Solution Putting You at Risk?

GlobalMed

The black market price tag of stolen protected health information (PHI) can go for $60 a record, compared to roughly $1 for a credit card or social security number. Multi-factor authentication (MFA). Privileged Identity Management (PIM) and Privileged Access Management (PAM) – East and West focus. Vulnerability scanning.

article thumbnail

electronic Privacy Consent -- Patient choice

Healthcare Exchange Standards

Data metadata Facility/Hospital/Organization Episode of care Location of care Diagnostic Order and results Publication date/time Identity of a Document/Resource Privacy/Security tags Related to the User Context User Identity User Authentication strength User Role PurposeOfUse Organization user is from Thus one could say: Allow All users at Organization (..)

FHIR 40
article thumbnail

FHIR Security and Privacy - tutorial outline

Healthcare Exchange Standards

We encourage the use of Federated Identity for Authentication Most likely OAuth 2. These tags are used in an "Attribute Based Access Control" scheme. With messaging, you should be able to use http security, it is just not as obvious. We encourage use of HTTPS. Servers should enforce this as appropriate to their environment.

FHIR 40