M2SYS Healthcare Solutions and Just Associates Hosting Webinar on Patient Identification

M2SYS Healthcare Solutions is offering a free webinar on patient identification in healthcare

M2SYS Healthcare Solutions and Just Associates offer a free webinar on “Adopting Patient Identification Matching Strategies Across the Enterprise” on April 24th at 11am EDT.

Navigating the patient identification highway in healthcare has never been more complex or more important for the industry. Widely regarded as a critical portal for successful implementation and use of additional health IT tools and platforms, the conundrum of how to achieve accurate patient identification has received renewed attention with the ONC releasing a research report encapsulating recent conclusions from meetings that include stakeholders from all aspects of healthcare. What’s clear is that the industry is at a crossroads.

Hampered by the inability of patient matching technologies to be successfully implemented across the enterprise and searching for answers on how to resolve the serious impediment issue to exchanging health information, the industry is hungry for direction. Additional pressures of the rise in medical identity theft and healthcare fraud along with the ever present need to implement stricter controls to improve patient safety have elevated patient matching to the forefront of issues that can be and must be resolved.

In the spirit of understanding more about the precarious and complex situation that healthcare faces in adopting stricter patient identification and medical data integrity platforms, we are teaming up with Beth Just from Just Associates an expert in Master Patient Index (MPI) and Enterprise EMPI database knowledge and Health Information Management (HIM) expertise – to offer a free webinar on strategies to adopt patient identification solutions across the enterprise.

The free webinar will be held on Thursday April the 24th from 11am – 12pm EDT. To sign up, please visit this Registration Web Link: https://www4.gotomeeting.com/register/356073831 for more details on the webinar and the topics we will cover.

Please share this invitation with a friend or colleague! Hope to see you next week!

What is “Device Fingerprinting” and Why Should You Care?

As consumers, most of us are aware of today’s online privacy concerns. The imminent rise in tracking indivdual movements online to collect and store information about our unique interests is exploding in growth as more companies try to mine data and create a competitive advantage. In addition, data is big money in today’s digital world. The ability to customize ads based on unique characteristics to a target demographic is the equivalent of a gold mine in the advertising industry. Targeted ads increase the likelihood that a consumer will make a purchase instead of the “spray and pray” approach which relies on the hope that the right consumer sees your ad. Unfortunately, a lot of the data collected on online behaviors is done without our knowledge or permission, causing concern about how we can protect ourselves and retain more control over what information, if any, is collected and stored.

Most of us are familiar with the term “cookies” – tiny pieces of data stored about us that merchants can use to understand more about our browsing history. But did you know that disabling cookies in your Web browser doesn’t necessarily mean that you have pulled the plug on the ability of third parties to track your online activities?

A new way for advertisers to capture and record your activities is called “device fingerprinting” which is summed up in the Infographic below. Device fingerprinting uses unique characteristics of a browser environment such as screen dimensions, fonts, and your clock to identify and track you. A knee jerk reaction to this technology may be negative, but device fingerprinting also has its advantages. Listed below is a very informative Infographic on device fingerprinting including it’s advantages and disadvantages and how to protect yourself from it if you don’t wish to be tracked.

 

Cookies
Source: WebDesignDegreeCenter.org

A link to the Infographic can be found here: http://www.webdesigndegreecenter.org/security/

What are your thoughts on device fingerprinting? Does it do more harm than good? Weigh in with your opinions on the comments below.

The Advantages of a Biometric Identification Management System

biometric identification management systems are on the rise

Many business owners are adopting biometric identification management systems to save money, time, and resources and increase security.

The following is a guest post by Ramya Raju, a freelance writer and designer from India.

Biometrics have offered a scalable solution to business owners who are now empowered to circumvent issues like undocumented access, ID swapping, manual badge checks, credential replacements and more.

There have been many developments in the field of biometrics, which means things are more reliable and costs are down. Biometrics offer high level identification management security operations that have several advantages over traditional means and now they are available to you at lower costs.

Accurate Identification

While traditional security systems are reliant on passwords, personal identification numbers (PINs) or smart cards, you can achieve a high level of accuracy with biometrics systems. If you have set up the system correctly, you can use biological characteristics like fingerprints and iris scans, which offer you unique and accurate identification methods. These features cannot be easily duplicated, which means only the authorized person gets access and you get high level of security.

Accountability

Biometric log-ins mean a person can be directly connected to a particular action or an event. In other words, biometrics creates a clear, definable audit trail of transactions or activities. This is especially handy in case of security breaches because you know exactly who is responsible for it. As a result you get true and complete accountability, which cannot be duplicated.

Easy and Safe for Use

The good thing about using biometrics for identificaiton is that modern systems are built and designed to be easy and safe to use. Biometrics technology gives you accurate results with minimal invasiveness as a simple scan or a photograph is usually all that’s required. Moreover the software and hardware can be easily used and you can have them installed without the need for excessive training.

Time Saving

Biometric identification is extremely quick, which is another advantage it has over other traditional security methods. A person can be identified or rejected in a matter of seconds. For those business owners that understand the value of time management the use of this technology can only be beneficial to your office revenue by increasing productivity and reducing costs by eliminating fraud and waste.

User Friendly Systems

You can have biometrics systems installed rather easily and after that, they do their job quickly, reliably and uniformly. You will need only a minimum amount of training to get the system operational and there is no need for expensive password administrators. If you use high quality systems, it will also mean your maintenance costs are reduced to minimize the expenses of maintaining an ongoing system.

Security

Another advantage these systems have is that they can’t be guessed or stolen; hence they will be a long term security solution for your company. The problem with efficient password systems is that there is often a sequence of numbers, letters, and symbols, which makes them difficult to remember on a regular basis. The problem with tokens is that they can be easily stolen or lost – both these traditional methods involve the risk of things being shared. As a result you can’t ever be really sure as to who the real user is. However that won’t be the case with biometric characteristics, and you won’t have to deal with the problem of sharing, duplication, or fraud.

Convenience

It’s considered to be a convenient security solution because you don’t have to remember passwords, or carry extra badges, documents, or ID cards. You are definitely saved the hassle of having to remember passwords frequently or changing cards and badges. People forget passwords and ID cards are lost, which can be a huge nuisance with traditional security methods.

Versatility

There are different types of biometrics scanners available today and they can be used for various applications. They can be used by companies at security checkpoints including entrances, exits, doorways, and more.

Moreover you can make the most out of the biometric solutions to decide who can access certain systems and networks. Companies can also use them to monitor employee time and attendance, which raises accountability.

Scalability

Biometrics systems can be quite flexible and easily scalable. You can use higher versions of sensors and security systems based on your requirements. At the lowest level you can use characteristics that are not very discriminative; however if you are looking for a higher level of security for large scale databases then you can use systems with more discriminable features, or multi-modal applications to increase identification accuracy.

Return on Investment

It’s definitely high because you can avoid fraud including “buddy punching,” besides lowering payroll costs, accurate calculation of work hours, and reduced management time. While the security is improved you can also easily apply consistent policies and procedures at the same time. And all you have to think about is the initial cost of the biometric system.

You can benefit from biometrics systems to a great extent and do away with the need to remember passwords and combinations. Rather than remembering the password for a computer system or a combination to a safe, you can offer unique biometrics information and get access. The job will be done quickly, accurately, with a fast implementation schedule and minimal training.

biometric identification management systems are an effective way to manage identitiesAuthor Bio:

I’m Ramya, a freelance web designer/writer based in India.  I have 8 years of experience in content writing and have worked for top blogs and websites. I’m generally an extrovert; I like photography, anthropology and traveling to different countries to learn the culture and living of the local inhabitants to do travelogues.

Contact:

Ramya

E-mail id: ramyaraju896@gmail.com

Website: http://www.colorcharacter.com/uk/services

Florida Ruling Highlights Continued Urgency to Educate Public on Biometric Technology

biometric identification management technology helps school lunch lines move faster

A student scans their fingerprint in a school lunch line for payment.

You may have heard that the State of Florida recently voted to ban the collection of biometric data from school students. The legislation was a direct response to several Florida school districts capturing student biometric data and using it for various purposes including purchasing lunch in school cafeterias and tracking students on school buses. Ongoing concerns over the protection of student biometric data as well as who has access to it sparked discussion on the use of the technology in schools and prompted legislators to stop it.

One major concern is the storage of biometric information and how secure the system of encryption and verification is. Most, if not all systems work under the principle that it’s not student biometrics that are actually stored, but it is instead a numerical sequence used for verification. The worry is that criminals will find a way to steal a student’s biometric template, reverse engineer it, and then use it to access the current system or another one that relies on the same biometric credential. A legitimate concern since biometrics are quite different from and ID card or token which when lost or comprised, can be replaced. Biometrics on the other hand, are said to be an “irrevocable” attribute since they are based on human physiological characteristics and can’t be “replaced.”

In response to the FL State Legislator’s decision to ban biometrics in schools, Janice Kephart from the Security Identity and Biometrics Association (SIBA) made the following statement:

“I’m concerned this precedent could spill over to other states due to mostly a lack of education on what these systems do or don’t do,” Janice Kephart, the founder of the Secure Identity & Biometrics Association (SIBA) and an outspoken advocate for the use of new authentication technologies said in a recent interview with BiometricUpdate.com. “It’s really concerning.”

After a thorough review of the legislation, Ms. Kephart went on to say that the logic used as the body of the bill was based on “misunderstood science” and essentially penalizes the entire State for the actions of 2 districts who failed to properly notify parents and secure their permission for students to “opt-in” to having their biometric credentials captured. If you read statements from FL lawmakers on the issue, it’s clear that the genesis of their actions seem to be tied more into constituent fear of “Big Brother” and privacy/civil liberty violations then arguments based on fact about how the technology actually works. The use of palm vein biometrics in Pinellas County school lunch lines for example is a clear illustration of how the technology can be misunderstood.

If one were to extrapolate the argument that student biometric data from a palm vein reader could easily be stolen and used by a criminal, the argument seems flawed when you look at the facts about the science. Fujitsu, the company who manufacturers the palm vein device has clearly stated that they use multiple layers of encryption to secure biometric information and don’t even capture an image of the palm vein but instead convert it into a template with a private encryption key. Furthermore, Fujitsu relies on the unique hemoglobin through the bloodstream as a “liveness detection” security measure which again makes the technology virtually impossible to spoof and use another person’s credentials to access a system. Ultimately, is it possible to “steal” someone’s biometric credentials and reverse engineer them to create an image whether it’s fingerprint, palm vein, iris, or another biometric modality. The answer is that anything is possible in this day and age, but the chances of it actually happening are extremely remote. One read at some of the logic behind the FL State legislation and you would think that it’s a piece of cake to recreate a student’s biometric credentials.

Unfortunately, the biometrics industry often falls victim to misperceptions about how the technology actually works and these can be magnified by people who are intent on stopping the inevitable advancement of this technology as a more modern identification platform. As most know, in life perception tends to be 9/10 of reality and this has never been more evident than in biometrics. People who do not completely understand the technology but perceive government as rapidly encroaching on our personal lives and the slow disappearance of personal privacy in our digital world jump on biometrics as just another tool to control our lives. In reality, biometrics is used all over the world and has drastically improved security, saved a countless amount of money, resources, and time for business and governments, and continues to be used in new and creative ways to establish accountability and protect individual privacy.

It’s crystal clear that the biometrics industry has a lot of work left to do when it comes to public education on how the technology works. We hope that biometric vendors take this call to action seriously and embark or continue their push to educate and inform so more rational decisions can be made about the use of this technology in the general public. We need to be taking steps forward in biometrics, not steps back.

After all: Truth is universal. Perception of truth is not.

In what ways do you feel the biometrics industry can better educate the public about the technology?

 

Technology Association of Georgia (TAG) Honors M2SYS as One of the Top 10 Most Innovative Companies in Georgia

M2SYS Technology receives award as one of the top 10 most innovative companies in the State of Georgia

M2SYS Technology was named one of the “Top 10 Most Innovative Companies” in the state of Georgia.

The Technology Association of Georgia (TAG – @TagThink on Twitter) bestowed the honor of naming us as one of the “Top 10 Most Innovative Companies in Georgia” this week! We are excited, humbled, and proud of this distinguishing honor from the TAG team and see it as a direct reflection of our commitment to pioneer innovation in the biometric identification technology industry.

We take a lot of pride in emulating our innovative spirit each and every day – directly reflected in the solutions we develop for the biometric identification management industry. Over the years, the team at M2SYS has been at the forefront of innovation, leading the charge to make biometrics more adaptable to real world conditions by using specific scientific multidisciplinary fields such as human factor engineering as a platform for engineering and design. We have shepherded many new concepts from ideas to reality that broke traditional molds and increased the security and convenience of biometrics as a practical solution to identity management. Here are a few innovation highlights:

  • We built and released Hybrid Biometric Platform™ - a client/server biometric software system that supports several types of biometric devices, including fingerprint, finger vein, palm vein, iris, and facial recognition. Using our patent-pending Bio-Plugin™ integration methodology, end users can implement Hybrid Biometrics™ in a matter of hours and immediately have the ability to deploy the form of biometric technology that best neutralizes varying user, demographic, and environmental conditions.
  • Sensing the need to develop a biometric hardware device that simultaneously captures both multiple biometric credentials in a single scan equipped with some of the most sophisticated liveness detection protection on the market and able to perform both 1:1 and 1:N matching for both fingerprint and finger vein templates in a PC-based environment we designed and built the M2-FuseID™ fused fingerprint and finger vein reader. When coupled with our Hybrid Biometric matching systems, the M2-FuseID™ biometric hardware device allows customers to perform one-to-many matching of millions of fingerprint and finger vein templates in seconds.
  • Identifying an opportunity to build a mobile biometric identification device that has the ability to simultaneously capture fingerprints, iris, and facial images and data from contact and contactless smart cards plus offers a lightweight, ergonomic design that can fit in your hand and slip into your pocket, we engineered the M2-RapidCheck™ multimodal mobile biometric system. A break from the mold, this device works seamlessly with our Automated Biometric Identification System (ABIS) and is compatible with any smart phone or tablet.

We continue to lead and innovate in the field of biometrics and continually push ourselves to design and develop unique, practical solutions that increase security and convenience and help to perpetuate the use of the technology for identification management. Additionally, M2SYS has been an early adopter of using social media to help educate, enlighten, engage, and inform others about the value of biometrics using several platforms, techniques, and methodologies to spread our message. We are proud to be a leader in the field and grateful to be headquartered in what is arguably the “Silicon Valley of the East” – Atlanta, GA. Atlanta is not only a hotbed of technological innovation but it also possess some of the deepest IT talent which we were able to leverage through the years as we continue to build our team of engineers and designers.

Proud of the chance to be recognized as an innovative leader. Excited at our prospects to continue developing some of the most practical and scalable products and solutions in the industry. Humbled to be singled out by TAG as a company worth watching. Grateful for our community and those that support us.

Thanks TAG!