SlideShare a Scribd company logo
THE IMMUNOLOGICAL MODEL FOR ACCESS CONTROL TO CDA Mike Mair and Stephen Chu New Zealand  Acupulco 22.10.2004
The Clinical Data Architecture (CDA) is proposed as a common currency for electronic healthcare.  It might also be complemented by a single global technique for access control.  Gunnar Klein (who chairs CEN 251 and ISOTC/215 WG4 Security)  recently said:  ‘ Do not expect quick solutions to the dream for a universal shared record which takes privacy concerns seriously’ He suggests that security is the ‘forgotten requirement for interoperability.’
In order to fulfill the dream of a universal shared record standard, there must also be a shared technique for discriminating legitimate from illegitimate sharing.  That technique must be endlessly customizable because of the great diversity of access practices in global healthcare.  It also needs to ‘work on’ a shared definition of data.
A New Zealand team prepared an Access Proposal to WG1 of ISOTC/215. We called for the creation of a universal healthcare packet, which we termed the ‘attestable unit’.  It was paired with an ‘access lock’ for a universal access mechanism.  This was modeled on the ‘bifunctional’ immunoglobulin family of molecules of immunological science.
In the immune system … .a single class of molecules, the immunoglobulin, exhibits bi-functionality in that each molecule has a ‘recognition’ end and a ‘business’ end. The recognition end which is highly variable, targets antigen, which is usually but not always material foreign to the organism. The ‘business end’, which is not variable, determines what action the molecule performs when the template match to antigen is made.
The ‘effector’ end of the IGG molecule  The recognition ends of the IGG
IGM, the IGG pentameter
The universal role for immunoglobulin In the body the immunoglobulin molecule is pervasive Acts as a transmitter, a hormone, an activator, a switch,  it can be extremely specific in its target, or very general Nature has implemented a single design,  If we can get a universal access control process for the CDA, could it do the same for health informatics?
Detachable Header
The ‘access lock’ concept for the attestable unit was to act as a pointer to the attestable unit.  We suggested that a ‘search object’ should activate it.  We evoked dual key cryptography for the actual retrieval of the unit.  The data would remain with the system of origin, along with the audit trail of the 5 WH of instances of access to the data ISOTC/215  Seoul 2000: Access Proposal
 
“ At the presentation to WG1 meeting in March 2001, Seoul, Korea, I mentioned that the CDA might function as the attestable unit, and the access lock might derive from a ‘detachable header’ for the CDA. “
The Health Event Summary derived originally from the Australian ‘Health Connect’ organization  It is a summary ‘package’ of healthcare data in standard format to be created with every ‘health event’, and is planned as a ‘shortcut’ to interoperability of healthcare data.  Its implementation was one of the recommendations of the NZ Ministry of Health ‘Wave’ project ( Working to Add Value to Electronic Medicine)
The Clinical Document Architecture The CDA is designed to be just such an attestable global unit of healthcare. Its definition includes: Persistence  Wholeness Stewardship  Potential for authentication.
“ For communications over public media, cryptographic techniques for source/recipient authentication and secure transport of encapsulated documents may be required, and should be addressed with commercially available tools outside the scope of this standard.” Bob Dolin, CDA release 1 Is Access Control ‘out of scope’ for the CDA?
We are proposing an extension of the standard to cover those areas Globalization and international travel are inevitable and increasing trends.  CDAs as integral components of a universal shared EHR system will reside within an increasingly distributed environment.  The immunoglobulin model for access control suggests a mechanism to address information access security issues in such a distributed environment.
 
checkDocInfo( )   - object operation/method defined for the CDA Header/Access Object to get the meta-data information about the document as part of the matching function required to determine whether there is a match between the document requestor wants and the CDA header stored   checkServeTarget( )   - also object operation/method defined for the CDA Header/Access Object to get the patient identified by the requestor for the CDA document required is the target patient for whom the CDA header (in the regional server list) was created for getOriginatingOrgNetID( )  is an operation/method defined for the the CDA Header/Access Object stored on the regional server. This operation will interrogate the CDA Header List stored in the regional server which should hold the Network ID/address of where the original attestable CDA data/documents are held - the Provider Organisation that created and stores the data/document, or the regional server itself.
Access process proposal An 'Access-Lock' Object is created when the clinician creates attestable clinical data and specifies the data's access right level(s).  This can be done at the clinical interview, directly on the instructions of the patient, although it is likely that ‘default’ access behaviour will apply in most implementations unless specifically countermanded.  The ‘lock’ object is stored with the data on the provider system .
matchReq&DataAccessRole( )   - an object operation defined for the 'Access Lock' object to detemine whether the 'Role for Access' supplied by the 'Request Object' is of the legal role for access the data for which the 'Role for Access' attribute has been defined.
Access Process Proposal The CDA header is ‘detachable’ as in the suggestion from Finland,  The body can be ‘virtual’, that is only the header need actually be created at the time of data creation, which can be on any system whatsoever A copy of the CDA header plus referent to the data  is also sent to the regional server.
Stage One There is a ‘Login’ stage to gain access to the regional network, which includes presentation of a digital certificate.  with ‘role’ and ‘ID’ information. This is ‘core role’ only, and login enables attribute certificates to be generated binding the identity to the core role.
Stage Two A request/search object is constructed which contains this user role information, along with the ‘id’ of the target patient, and an ‘index’ of the information required.  It also contains the public key of the requestor’s institution. It is used to search the ‘CDA header lists’ on the network of regional servers role for access is a complex(defined locally) of original or delegated attribute certificates and a grain filter
 
Stage Three When a match is made, including the access lock role match, the searcher gets access to the referent of the stored or virtual CDA.  The digital signature/certificate and public key certificate enclosed within the (SOAP) envelope authenticate the identity of the requestor and the public key that he/she sends with the request.
Regional Server data store List of CDA Headers (or Access Objects) Provider Server data store Match found Locates CDA document source Attestable Unit Document  information Encounter data Service actors Service targets Clinical digest Attestable Unit Document  information Encounter data Service actors Service targets Clinical digest Which may be on its own data store
Regional Server data store List of CDA Headers (or Access Objects) Provider Server data store Locates CDA document source Encrpytion key transfer Attestable Unit Document  information Encounter data Service actors Service targets Clinical digest Access approved
Stage Four The holder of the CDA data/document can then use the public key from the sender to encrypt the data/document, which can then only be decrypted by the requestor, ensuring confidentiality and integrity of the data transmitted across the Internet.
SSL SOAP security SOAP Envelope Digital signature Public key certificate SOAP encryption Role-base access control SSL SSL Regional (SOAP) Server Data store Regional (SOAP) Server Data store Requestor Data store Provider (originating Organization) Secure Socket  Layer (SSL) Security Cleint/Server authentication Supporting SOAP encryption 2  CDA   request in SOAP envelope 3  Route request to  neigbour if necessary 3  Get complete CDA from  Provider if request and access role matched 1  Request to neighbour server CDA Document in SOAP Envelop SOAP Security
If the regional server that received the request for the CDA document cannot find a match on its CDA header list, it will pass on the request to a neighboring server, which will pass onto the next ...... until a match is found and the procedure of the previous paragraph will be performed, or it returns a ‘no find’ result. NB: This model assumes continuous ‘on line’ availability of data from providers.
Role Words Role words in a language, like most other words, are language specific. Is ‘Verstehen’ the same as ‘Understanding’ Is ‘Spirituel’ the same as ‘Spiritual’ Most role words simply do NOT translate The ‘Chess’ analogy for language: Saussure The concept of ‘autopoiesis’ : Varela
Roles as self defining ‘autopoietic’ sets
The ROLE Ontology – Role, Task, and Model ROLE TASK MODEL acts on defines performs
ROLE ENGINEERING
 
 
 
 
ACCESS PROCESS ACTIVITY DIAGRAM
 
 
 
 
 
 
 
CROSS BORDER ROLE MANAGMENT Where there has been policy bridging and a role inventory for mapping , this can simply be applied Where no such work has been done, we suggest that proxy role key search object is assigned by an authority in the host realm. All other aspects of the process deliver interoperable results.
Provider  Regional Network  Requestor Retrieving CDAs from the network……. … ..they might cling to the search, like termites
The ‘end dream….’ A single pervasive device, the CDA A simple shared access process endlessly customizable,  can act as a stand alone, a component, an EHR extract (GEHR),  a ‘fix for now’, a stage in a global evolution Just let it go, release it in global healthcare facilitate the emergence of implicate order give Gaia an immune system, maybe she will heal...

More Related Content

PPT
Cda accesscontrol-final2 (1)
PPT
Privacy preserving secure data exchange in mobile P2P
PDF
77201924
PDF
Privacy preserving detection of sensitive data exposure
PPT
Recording and Reasoning Over Data Provenance in Web and Grid Services
PDF
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
PDF
Privacy preserving detection of sensitive data exposure
PDF
Architecture authorization-constrained
Cda accesscontrol-final2 (1)
Privacy preserving secure data exchange in mobile P2P
77201924
Privacy preserving detection of sensitive data exposure
Recording and Reasoning Over Data Provenance in Web and Grid Services
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Privacy preserving detection of sensitive data exposure
Architecture authorization-constrained

What's hot (19)

PDF
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
PPTX
Michael Poremba, Director, Data Architecture at Practice Fusion
PDF
Blockchain & Healthcare | Strategy, Implications and Implementation
PDF
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
PDF
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
PDF
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
PDF
Scalable policy-aware Linked Data architecture for prIvacy, transparency and ...
PDF
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
PDF
Design an active verification mechanism for certificates revocation in OCSP f...
PDF
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
PDF
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...
PPTX
Solving the Disconnected Data Problem in Healthcare Using MongoDB
PPTX
Codemash-2017
PDF
H1803035056
PDF
Privacy Preserving Location Query Service
PPTX
Remote Procedure Call over DDS - London Connext DDS Conference
PDF
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
PPT
Over the rim version 3
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
Michael Poremba, Director, Data Architecture at Practice Fusion
Blockchain & Healthcare | Strategy, Implications and Implementation
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
Scalable policy-aware Linked Data architecture for prIvacy, transparency and ...
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
Design an active verification mechanism for certificates revocation in OCSP f...
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
Scalable and secure sharing of personal health records in cloud computing usi...
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...
Solving the Disconnected Data Problem in Healthcare Using MongoDB
Codemash-2017
H1803035056
Privacy Preserving Location Query Service
Remote Procedure Call over DDS - London Connext DDS Conference
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
Over the rim version 3
Ad

Viewers also liked (20)

PDF
Seguridad de la_informacion
PPS
Cartade Sarah
PPTX
D a u r a i r
PDF
อังกฤษ
DOCX
Configuracion de una vpn site to site en router cisco y endian firewall linux
PDF
Blancos moviles
PPTX
Tracking improved RTBs in farmers fields using next generation sequencing markers
PDF
Community%20 film%20 %20sheet1
PDF
The Pipeline And The Top Line
PPT
DragonBall Z
PDF
Achpr gabon eng
PDF
Conference Prep Session
PPT
15.htmlเพิ่มเติม
PPS
五個快樂常規
PPTX
CMC3S Spring 2013 Dave Sobecki Critical Thinking
PDF
Ilo argentina text
PDF
Code of care 28 oktober mors_
PDF
Enron Management Network
PDF
Cumplimiento legislativo mayo 2012
Seguridad de la_informacion
Cartade Sarah
D a u r a i r
อังกฤษ
Configuracion de una vpn site to site en router cisco y endian firewall linux
Blancos moviles
Tracking improved RTBs in farmers fields using next generation sequencing markers
Community%20 film%20 %20sheet1
The Pipeline And The Top Line
DragonBall Z
Achpr gabon eng
Conference Prep Session
15.htmlเพิ่มเติม
五個快樂常規
CMC3S Spring 2013 Dave Sobecki Critical Thinking
Ilo argentina text
Code of care 28 oktober mors_
Enron Management Network
Cumplimiento legislativo mayo 2012
Ad

Similar to Acupulco cda access (2) (20)

PPT
Reduced acupulco cda access for bellagio
PPT
Acupulco cda access v3-1
DOC
The empty box
PDF
In light of Cloud Computing System CDA Generation and Integration for Health ...
PDF
Mapping CDA Documents for Health Information Exchange from Multiple Hospitals...
PPT
Clinical Document Architecture Implementations - Lessons Learnt to Date
PDF
iEHR.eu IHIC 2012 Paper
PPTX
Connected Care Standard for transfer of care and shared care applications
PPT
Metadata Power Team
PPT
IHE Cross-Enterprise Document Sharing (XDS)
PPT
Health Information Exchange Workgroup 110310
PDF
HL7 3.0 Clinical Interoperability to Improve Quality and the point of care EH...
PPT
HINZ_2012_CDA_Implementations_Leasons_Learnt.ppt
PPT
NI day 1
PPTX
Dissecting the Reference Architecture for Interoperability
PPTX
Dissecting the Reference Architecture for Interoperability
PPTX
CyberSecurity Medical Devices
PPT
PDF
IRJET- A Review on Secured CDA Generation Based on Cloud Computing System
DOCX
What explains why certain services were covered and others were not .docx
Reduced acupulco cda access for bellagio
Acupulco cda access v3-1
The empty box
In light of Cloud Computing System CDA Generation and Integration for Health ...
Mapping CDA Documents for Health Information Exchange from Multiple Hospitals...
Clinical Document Architecture Implementations - Lessons Learnt to Date
iEHR.eu IHIC 2012 Paper
Connected Care Standard for transfer of care and shared care applications
Metadata Power Team
IHE Cross-Enterprise Document Sharing (XDS)
Health Information Exchange Workgroup 110310
HL7 3.0 Clinical Interoperability to Improve Quality and the point of care EH...
HINZ_2012_CDA_Implementations_Leasons_Learnt.ppt
NI day 1
Dissecting the Reference Architecture for Interoperability
Dissecting the Reference Architecture for Interoperability
CyberSecurity Medical Devices
IRJET- A Review on Secured CDA Generation Based on Cloud Computing System
What explains why certain services were covered and others were not .docx

More from eyetech (18)

DOC
Timeless
PPT
Ranzo2010cataract audit
PPT
Over the rim version 2
DOC
Access report final iso format 29 mar 2000
DOC
Revised electronic medical record data model
DOC
Model of the text generator
DOC
Mirth measurement
DOC
The eye in the control of attention
PPT
Sydney 2002 plenary final
PPT
Sight, truth and videotape final 12.8.05
PPT
Health leaders conference (2)
PPT
Dunedin accessppt
PPT
Melody of the text2
PPT
Sydney 2002
PPTX
Cataract audit as part of workflow
PPT
April2010cataract audit
PPT
Access standard fppt
PPT
Access standard
Timeless
Ranzo2010cataract audit
Over the rim version 2
Access report final iso format 29 mar 2000
Revised electronic medical record data model
Model of the text generator
Mirth measurement
The eye in the control of attention
Sydney 2002 plenary final
Sight, truth and videotape final 12.8.05
Health leaders conference (2)
Dunedin accessppt
Melody of the text2
Sydney 2002
Cataract audit as part of workflow
April2010cataract audit
Access standard fppt
Access standard

Acupulco cda access (2)

  • 1. THE IMMUNOLOGICAL MODEL FOR ACCESS CONTROL TO CDA Mike Mair and Stephen Chu New Zealand Acupulco 22.10.2004
  • 2. The Clinical Data Architecture (CDA) is proposed as a common currency for electronic healthcare. It might also be complemented by a single global technique for access control. Gunnar Klein (who chairs CEN 251 and ISOTC/215 WG4 Security) recently said: ‘ Do not expect quick solutions to the dream for a universal shared record which takes privacy concerns seriously’ He suggests that security is the ‘forgotten requirement for interoperability.’
  • 3. In order to fulfill the dream of a universal shared record standard, there must also be a shared technique for discriminating legitimate from illegitimate sharing. That technique must be endlessly customizable because of the great diversity of access practices in global healthcare. It also needs to ‘work on’ a shared definition of data.
  • 4. A New Zealand team prepared an Access Proposal to WG1 of ISOTC/215. We called for the creation of a universal healthcare packet, which we termed the ‘attestable unit’. It was paired with an ‘access lock’ for a universal access mechanism. This was modeled on the ‘bifunctional’ immunoglobulin family of molecules of immunological science.
  • 5. In the immune system … .a single class of molecules, the immunoglobulin, exhibits bi-functionality in that each molecule has a ‘recognition’ end and a ‘business’ end. The recognition end which is highly variable, targets antigen, which is usually but not always material foreign to the organism. The ‘business end’, which is not variable, determines what action the molecule performs when the template match to antigen is made.
  • 6. The ‘effector’ end of the IGG molecule The recognition ends of the IGG
  • 7. IGM, the IGG pentameter
  • 8. The universal role for immunoglobulin In the body the immunoglobulin molecule is pervasive Acts as a transmitter, a hormone, an activator, a switch, it can be extremely specific in its target, or very general Nature has implemented a single design, If we can get a universal access control process for the CDA, could it do the same for health informatics?
  • 10. The ‘access lock’ concept for the attestable unit was to act as a pointer to the attestable unit. We suggested that a ‘search object’ should activate it. We evoked dual key cryptography for the actual retrieval of the unit. The data would remain with the system of origin, along with the audit trail of the 5 WH of instances of access to the data ISOTC/215 Seoul 2000: Access Proposal
  • 11.  
  • 12. “ At the presentation to WG1 meeting in March 2001, Seoul, Korea, I mentioned that the CDA might function as the attestable unit, and the access lock might derive from a ‘detachable header’ for the CDA. “
  • 13. The Health Event Summary derived originally from the Australian ‘Health Connect’ organization It is a summary ‘package’ of healthcare data in standard format to be created with every ‘health event’, and is planned as a ‘shortcut’ to interoperability of healthcare data. Its implementation was one of the recommendations of the NZ Ministry of Health ‘Wave’ project ( Working to Add Value to Electronic Medicine)
  • 14. The Clinical Document Architecture The CDA is designed to be just such an attestable global unit of healthcare. Its definition includes: Persistence Wholeness Stewardship Potential for authentication.
  • 15. “ For communications over public media, cryptographic techniques for source/recipient authentication and secure transport of encapsulated documents may be required, and should be addressed with commercially available tools outside the scope of this standard.” Bob Dolin, CDA release 1 Is Access Control ‘out of scope’ for the CDA?
  • 16. We are proposing an extension of the standard to cover those areas Globalization and international travel are inevitable and increasing trends. CDAs as integral components of a universal shared EHR system will reside within an increasingly distributed environment. The immunoglobulin model for access control suggests a mechanism to address information access security issues in such a distributed environment.
  • 17.  
  • 18. checkDocInfo( ) - object operation/method defined for the CDA Header/Access Object to get the meta-data information about the document as part of the matching function required to determine whether there is a match between the document requestor wants and the CDA header stored checkServeTarget( ) - also object operation/method defined for the CDA Header/Access Object to get the patient identified by the requestor for the CDA document required is the target patient for whom the CDA header (in the regional server list) was created for getOriginatingOrgNetID( ) is an operation/method defined for the the CDA Header/Access Object stored on the regional server. This operation will interrogate the CDA Header List stored in the regional server which should hold the Network ID/address of where the original attestable CDA data/documents are held - the Provider Organisation that created and stores the data/document, or the regional server itself.
  • 19. Access process proposal An 'Access-Lock' Object is created when the clinician creates attestable clinical data and specifies the data's access right level(s). This can be done at the clinical interview, directly on the instructions of the patient, although it is likely that ‘default’ access behaviour will apply in most implementations unless specifically countermanded. The ‘lock’ object is stored with the data on the provider system .
  • 20. matchReq&DataAccessRole( ) - an object operation defined for the 'Access Lock' object to detemine whether the 'Role for Access' supplied by the 'Request Object' is of the legal role for access the data for which the 'Role for Access' attribute has been defined.
  • 21. Access Process Proposal The CDA header is ‘detachable’ as in the suggestion from Finland, The body can be ‘virtual’, that is only the header need actually be created at the time of data creation, which can be on any system whatsoever A copy of the CDA header plus referent to the data is also sent to the regional server.
  • 22. Stage One There is a ‘Login’ stage to gain access to the regional network, which includes presentation of a digital certificate. with ‘role’ and ‘ID’ information. This is ‘core role’ only, and login enables attribute certificates to be generated binding the identity to the core role.
  • 23. Stage Two A request/search object is constructed which contains this user role information, along with the ‘id’ of the target patient, and an ‘index’ of the information required. It also contains the public key of the requestor’s institution. It is used to search the ‘CDA header lists’ on the network of regional servers role for access is a complex(defined locally) of original or delegated attribute certificates and a grain filter
  • 24.  
  • 25. Stage Three When a match is made, including the access lock role match, the searcher gets access to the referent of the stored or virtual CDA. The digital signature/certificate and public key certificate enclosed within the (SOAP) envelope authenticate the identity of the requestor and the public key that he/she sends with the request.
  • 26. Regional Server data store List of CDA Headers (or Access Objects) Provider Server data store Match found Locates CDA document source Attestable Unit Document information Encounter data Service actors Service targets Clinical digest Attestable Unit Document information Encounter data Service actors Service targets Clinical digest Which may be on its own data store
  • 27. Regional Server data store List of CDA Headers (or Access Objects) Provider Server data store Locates CDA document source Encrpytion key transfer Attestable Unit Document information Encounter data Service actors Service targets Clinical digest Access approved
  • 28. Stage Four The holder of the CDA data/document can then use the public key from the sender to encrypt the data/document, which can then only be decrypted by the requestor, ensuring confidentiality and integrity of the data transmitted across the Internet.
  • 29. SSL SOAP security SOAP Envelope Digital signature Public key certificate SOAP encryption Role-base access control SSL SSL Regional (SOAP) Server Data store Regional (SOAP) Server Data store Requestor Data store Provider (originating Organization) Secure Socket Layer (SSL) Security Cleint/Server authentication Supporting SOAP encryption 2 CDA request in SOAP envelope 3 Route request to neigbour if necessary 3 Get complete CDA from Provider if request and access role matched 1 Request to neighbour server CDA Document in SOAP Envelop SOAP Security
  • 30. If the regional server that received the request for the CDA document cannot find a match on its CDA header list, it will pass on the request to a neighboring server, which will pass onto the next ...... until a match is found and the procedure of the previous paragraph will be performed, or it returns a ‘no find’ result. NB: This model assumes continuous ‘on line’ availability of data from providers.
  • 31. Role Words Role words in a language, like most other words, are language specific. Is ‘Verstehen’ the same as ‘Understanding’ Is ‘Spirituel’ the same as ‘Spiritual’ Most role words simply do NOT translate The ‘Chess’ analogy for language: Saussure The concept of ‘autopoiesis’ : Varela
  • 32. Roles as self defining ‘autopoietic’ sets
  • 33. The ROLE Ontology – Role, Task, and Model ROLE TASK MODEL acts on defines performs
  • 35.  
  • 36.  
  • 37.  
  • 38.  
  • 40.  
  • 41.  
  • 42.  
  • 43.  
  • 44.  
  • 45.  
  • 46.  
  • 47. CROSS BORDER ROLE MANAGMENT Where there has been policy bridging and a role inventory for mapping , this can simply be applied Where no such work has been done, we suggest that proxy role key search object is assigned by an authority in the host realm. All other aspects of the process deliver interoperable results.
  • 48. Provider Regional Network Requestor Retrieving CDAs from the network……. … ..they might cling to the search, like termites
  • 49. The ‘end dream….’ A single pervasive device, the CDA A simple shared access process endlessly customizable, can act as a stand alone, a component, an EHR extract (GEHR), a ‘fix for now’, a stage in a global evolution Just let it go, release it in global healthcare facilitate the emergence of implicate order give Gaia an immune system, maybe she will heal...