- What role do trust and the Trusted Platform Module play in embedded systems?
- Will TPMs based on the existing TPM 1.2 specification also support these other, non-PC applications? If not, will the TPM specification have to be modified?
- What kinds of use cases do you envision enabling via the addition of trusted computing technology to embedded systems?
In the United States, the security and privacy of patient records are protected by Federal Law. These regulations, such as the Health Insurance Portability and Accountability Act (HIPAA), were established to protect the privacy of electronic health records as they are collected, stored and used by entities such as patients, doctors, hospitals, healthcare clinics, laboratories and pharmacies. Further, these regulations also apply to individuals and organizations outside the healthcare system that receive personal health information from it, including insurance companies, employers and schools.
TCG technologies are available to help meet the regulatory requirements that include:
- Date Protection
- Network Access
- Audit and Conformance
With UAC, St. Mary’s was able to roll out a wireless one-to-one computing program to support its cutting-edge science, technology, engineering and math curriculum with confidence that data privacy and network security would be maintained.
LJM Systems deployed Juniper’s SA4000 and IC4000 to provide the infrastructure for a secure intranet as well as an extranet that would enable staff and students to access St. Monica’s network from home and to differentiate their network and application access based on their role, whether remote or local.
With ERAS, AdaptaSoft has a single, powerful tool to manage both FDE hard drives and Trusted Platform Modules (TPMs), ensuring future flexibility as these trusted devices replace software-based point solutions.