Privacy Protection

<prTag> empowers patients to protect their privacy

Enabling patient privacy is one of the two primary goals of the GPII system.  The system is designed to ensure that it can in no way threaten your privacy; in fact, it provides a means to enable much stronger patient privacy than has ever before been possible.

GPII allows patients to choose between two types of <prTags>.  The first is "open" meaning that information recorded against that tag is not restricted, i.e. is available to all healthcare providers.  The second type of <prTag> is "private" indicating that the patient has chosen to restrict access to information recorded against that tag.

How it works? 

  • Patient empowerment: Through the use of a combination of open and private <prTags> patients can ensure the privacy of their healthcare information according to their own unique needs.
  • Anonymous operation: Private <prTags> support fully anonymous operation.  They can be used to protect various patient-designated portions of a medical record or they can be used to anonymously label sets of medical data for 'public' uses such as research, education, and public health reporting.
  • Privacy unique to an individual: Patients can obtain as few or as many private <prTags> as are needed to implement their specific set of privacy requirements.
  • Privacy evolving over time: Patients' medical situations change over time.  They can use private <prTags> to reflect their changing privacy needs.
  • PHI: The GPII system never generates, sees, stores or transmits any of your protected health information.  Only the providers that you engage will ever see that data.
  • Recovery from errors: A few isolated errors are inevitable when dealing with a topic as complex as privacy.  The GPII system enables you to readily recover whenever a privacy error is discovered.
  • Medical identity theft: This is rapidly becoming a serious problem.  The GPII system ensures that your <prTag>, not your identity, is at risk during information exchange.  If a <prTag> is ever compromised it can be terminated and/or replaced.  In this respect it is like a credit card number.
  • Data breach and identity theft recovery: Because <prTags> can be terminated and replaced by request and at electronic speed, remediation of data breaches and identity theft is fast and efficient.
  • No Social Security Numbers: Use of unique <prTags> means you should never have to expose your SSN for medical purposes.
  • Simple:  Most importantly, <prTags> are simple and easy to understand, which faciliates patients managing their healthcare data as per their wishes.