Electronic health card: This is how the sealed cloud protects patients data
The electronic health card has arrived—and it’s causing quite a stir already. Patients are not entitled to an insurance certificate in paper form, even if they want one, according to the decision of the German Federal Social Court (Bundessozialgericht) of January 2020. The plaintiffs had objected to the lack of data security that originates from the use of the digital insurance certificate. However, the court found the electronic health card to be compliant with GDPR. In accordance with the “risk-based approach”, the judges had ruled that the risk of a data incident was subordinate to the practical benefits of the electronic health card.
Electronic health card: The residual risk can be minimized
Risks are part of life. You can let them discourage you, or you can actively work to reduce their likelihood of occurrence. This is also the case with the electronic health card, since even a document printed on paper fails to guarantee complete data security. Instead, it is more characterized by poor functionality.
So instead of turning your back on progress, it is better to deal with the underlying technology in order to be able to pursue optimal security strategies. For example, the insured person can keep all cards with an NFC chip in an RFID security sleeve to protect them against unauthorized access. The insurer, on the other hand, is advised to store its customers’ data in secure cloud storage. The data should always be stored and transmitted in encrypted form to nip criminal efforts and data leaks in the bud.
Confidential computing = optimal protection for patient data
In addition, sensitive patient data should be processed exclusively on sealed servers to provide the best possible protection at all times. However, in order to process data, it must first be decrypted. This is a technical necessity that cannot be circumvented but can be secured with special protective measures. In decrypted form, patient data is vulnerable to manipulation and theft—therefore, it requires special protection.
uniscon’s sealed cloud provides this special protection by transferring data to sealed servers for processing. These servers are in physical cages and are almost completely sealed off from the outside world for the entire duration of data processing. Interfaces and physical access points are absent. This confidential computing approach reliably prevents unauthorized access to the unencrypted data.
Health-related information is one of the most sensitive data types. That’s why it should be protected in the best possible way—without any gaps. This is the kind of data protection that the sealed cloud offers.