{"id":134,"date":"2020-06-12T06:59:18","date_gmt":"2020-06-12T06:59:18","guid":{"rendered":"http:\/\/127.0.0.1:8080\/corporate\/?page_id=134"},"modified":"2023-03-27T16:25:11","modified_gmt":"2023-03-27T16:25:11","slug":"about","status":"publish","type":"page","link":"https:\/\/fedprivacy.com\/?page_id=134","title":{"rendered":"Learn More"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"134\" class=\"elementor elementor-134\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0bc436b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0bc436b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9410e27\" data-id=\"9410e27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-497c93a elementor-widget elementor-widget-heading\" data-id=\"497c93a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Learn More<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3909afc elementor-widget elementor-widget-heading\" data-id=\"3909afc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Improve Record Security by Orders of Magnitude<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e386485 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e386485\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7f72162\" data-id=\"7f72162\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7cdfe74 elementor-widget elementor-widget-text-editor\" data-id=\"7cdfe74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><u style=\"font-style: normal; font-variant-ligatures: none; font-variant-caps: normal; font-weight: 700; font-family: Inter, sans-serif; font-size: 18px;\">How it Works<\/u><br><\/p>\n<p>RBW improves record security and privacy by orders-of-magnitude. In many cases, RBW has potential for a thousandfold+ improvement in record security. It works by restricting access to records based on need-to-know as determined by stage in a case management workflow. It solves the problem of overly broad access to information that is associated with traditional role-based access control.&nbsp; &nbsp;<\/p>\n<p><b><u>An Example<\/u><\/b><\/p>\n<p>To better understand &#8211; imagine a \u201csecure\u201d healthcare application that restricts access so that only doctors can see patient records. At 3:00 AM one morning while treating a patient with a broken arm, Doctor Joe inappropriately accesses the college football coach\u2019s record. Or worse, imagine a federal contractor inappropriately accessing sensitive defense information.&nbsp;<\/p>\n<p>RBW prevents this breach from happening. With RBW, Joe\u2019s access is restricted to the patient\u2019s record that is assigned to him in the workflow. Instead of being able to access (for example) 10,000 patient records 24\/7, Joe is restricted to one patient\u2019s record for one hour. In this example, RBW would provide a 240,000 times improvement in record security!&nbsp;&nbsp;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8b4fc62\" data-id=\"8b4fc62\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9fc4be6 elementor-widget elementor-widget-text-editor\" data-id=\"9fc4be6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-style: normal; font-variant-ligatures: none; font-variant-caps: normal; font-weight: 700; font-family: Inter, sans-serif; font-size: 18px; color: rgb(116, 132, 148);\"><u style=\"font-size: 18px;\">SBIR History<\/u><\/span><br><\/p>\n<p><span style=\"color: #748494;\"><span style=\"font-size: 18px;\">The RBW engine was created in response to a NIST SBIR Phase I award and subsequent Phase II commercialization project.&nbsp;<\/span><\/span><span style=\"font-family: Inter, sans-serif; font-style: normal; font-variant-ligatures: none; font-variant-caps: normal; font-weight: 400; text-transform: inherit; font-size: 18px; color: #748494;\">The project commercialized the National Institute of Technology&#8217;s formerly patented invention<\/span><span style=\"color: #748494;\"><span style=\"font-size: 18px;\">, informally referred to as&nbsp;<\/span><\/span><span style=\"font-family: Inter, sans-serif; font-style: normal; font-variant-ligatures: none; font-variant-caps: normal; font-weight: 400; text-transform: inherit; font-size: 18px; color: #748494;\">role-based workflow<\/span><span style=\"font-family: inherit; font-style: inherit; font-variant-ligatures: inherit; font-variant-caps: inherit; font-weight: inherit; text-transform: inherit; color: #748494;\"><span style=\"font-size: 18px;\">. The end result included:<\/span><\/span><\/p>\n<ul>\n<li><span style=\"font-size: 18px; color: #748494; text-transform: inherit;\">Low-code workflow designer&nbsp;<\/span><\/li>\n<li><span style=\"color: #748494;\"><span style=\"font-size: 18px;\">XML-based workflow definitions<\/span><\/span><\/li>\n<li><span style=\"color: #748494;\"><span style=\"font-size: 18px;\">Web services API<\/span><\/span><\/li>\n<\/ul>\n<div><span style=\"color: #748494;\"><span style=\"font-size: 18px;\">Furthermore, RBW was integrated into the SaaS Maker low-code platform to demonstrate its effectiveness for managing a record privacy for a healthcare organization in Pittsburgh, PA.<\/span><\/span><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1edb2a1 elementor-widget elementor-widget-image\" data-id=\"1edb2a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/i0.wp.com\/fedprivacy.com\/wp-content\/uploads\/2023\/03\/shutterstock_1927127819.jpg?fit=800%2C534&amp;ssl=1\" class=\"attachment-large size-large wp-image-676\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/fedprivacy.com\/wp-content\/uploads\/2023\/03\/shutterstock_1927127819.jpg?w=800&amp;ssl=1 800w, https:\/\/i0.wp.com\/fedprivacy.com\/wp-content\/uploads\/2023\/03\/shutterstock_1927127819.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/fedprivacy.com\/wp-content\/uploads\/2023\/03\/shutterstock_1927127819.jpg?resize=768%2C513&amp;ssl=1 768w, https:\/\/i0.wp.com\/fedprivacy.com\/wp-content\/uploads\/2023\/03\/shutterstock_1927127819.jpg?resize=100%2C67&amp;ssl=1 100w, https:\/\/i0.wp.com\/fedprivacy.com\/wp-content\/uploads\/2023\/03\/shutterstock_1927127819.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/fedprivacy.com\/wp-content\/uploads\/2023\/03\/shutterstock_1927127819.jpg?resize=200%2C134&amp;ssl=1 200w, https:\/\/i0.wp.com\/fedprivacy.com\/wp-content\/uploads\/2023\/03\/shutterstock_1927127819.jpg?resize=450%2C300&amp;ssl=1 450w, https:\/\/i0.wp.com\/fedprivacy.com\/wp-content\/uploads\/2023\/03\/shutterstock_1927127819.jpg?resize=600%2C401&amp;ssl=1 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Learn More Improve Record Security by Orders of Magnitude How it Works RBW improves record security and privacy by orders-of-magnitude. In many cases, RBW has potential for a thousandfold+ improvement in record security. It works by restricting access to records &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"more-link\" href=\"https:\/\/fedprivacy.com\/?page_id=134\"> <span class=\"screen-reader-text\">Learn More<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"nf_dc_page":"","footnotes":""},"class_list":["post-134","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/fedprivacy.com\/index.php?rest_route=\/wp\/v2\/pages\/134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fedprivacy.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fedprivacy.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fedprivacy.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fedprivacy.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=134"}],"version-history":[{"count":6,"href":"https:\/\/fedprivacy.com\/index.php?rest_route=\/wp\/v2\/pages\/134\/revisions"}],"predecessor-version":[{"id":736,"href":"https:\/\/fedprivacy.com\/index.php?rest_route=\/wp\/v2\/pages\/134\/revisions\/736"}],"wp:attachment":[{"href":"https:\/\/fedprivacy.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}