Data Protection for CareOn




Data Protection for CareOn
Table of Contents
Description
Web
Authentication
Curron Identifier
Data layer
General
Databases
Data protection





Description

The purpose of this document is to describe the data protection and security protocols pertaining the home care services within the CareOn system.
We will describe how web security is supported, user authentication and how data layers are set up to hide personal data.
Curron uses recognized security and data handling protocol. Curron relies on methods from Microsoft.

Web

The CareOn.is web uses HTTPS (HTTP over SSL). The RSA 2048-bit certificate ensures that server-user communication is encrypted.
All CareOn.is communications are through the web and encrypted with certificates.
The SSL certificate is certified by trusted parties and is therefore unique

Authentication



User authentication goes through Curron's authentication server. Authentication is "Federation Authentication", which ensures that no system components within CareOn can be accessed except by an authorized "Token" from Curron's authentication server.
This applies to sign-in from hands-free devices and via the web (CareOn.is)
CareOn users are the caretakers' team and team managers. Service receivers are generally not users.

Curron Identifier

The authentication server is accessible only through HTTPS and uses RSA 2048-bit SSL certificates from a trusted and accredited issuer.
Passwords are encrypted in a database and thus utilizes Microsoft Authentication.

Data layers


General

The CareOn home service databases are hosted by Origo, an ISO 27001 certified company and are closed behind a firewall. They are only accessible by (T3.Curron.is) home service systems and are not accessible from an outside network.
Microsoft SQL 2012 is used to host data.

Databases

Each data owner (municipality) has its own database (its own Scheme).
Database access is encrypted (Symmetric Key) with AES_256 algorithm. Encryption keys are marked with a certificate from the database.

Data protection

Relationships between individuals and services provided to individuals are encrypted on a database layer.
Encryption is achieved with Symmetric Key with AES_256 algorithm. Encryption keys are marked with a certificate from the database.
Connection between service receiver and the services provided is therefore encrypted on a database layer.