This is not encryption. This is not Pseudonymisation. And yet, it's all of them. This is a different approach to both security and privacy. And so, I'm going to try to get you up to speed very quickly, but we will be here after the presentation during the launch. We have a more detailed presentation we could give. Happy to talk to any of you one on one.
[00:37] First page, I've already made the point, which I think is very key. We do not claim to be a silver bullet. We're not a silver bullet. But we're a bullet, and bullets existed before. The way to summarize what Anonos tries to do is we take the “personal” out of personal information. We believe that amazing power and innovation is possible. But that something has to happen and something has to be done differently so that innovation can occur without revealing who the person is.
[02:02] And so, the reality is if we could actually follow the FIPs technologically. Just by way of a very brief background. Ted and I come from the financial sector. We spent over 10 years there, and I will be so bold as to say we revolutionized the worldwide financial markets. Because of the technology we developed at FTEN, there's now real-time financial transparency and control. NASDAQ bought us for their systems and markets in the US, and they installed our technology across the globe at 85 different markets. We're trying to do the same thing. We're trying to be part of a team that gets this word out there, not just our approach, not just our bullet, but others. We believe this can be done. We empower and enable the power of connected data by disconnecting it.
[02:53] The second slide.
[03:04] These are three key elements of what we do at Anonos. And I should say we have spent, as I said, the last 3 years on research and development. We're in negotiations now with a number of different companies about pilot programs. This is not a technology that if you said you wanted licensed that I could give it today anyways. We're here to start the dialogue, to have the discussion.
[03:25] Let's pretend that I'm using an IoT monitor. It's a blood pressure monitor. It's checking my blood pressure, and it also has my geolocation. So, that means information regarding my blood pressure and my location and my identity is going to the cloud or some server somewhere. Unfortunately, that means that data is susceptible to misuse by employees. Look at Uber and Lyft. Were those employees supposed to do what they did with the data? It also means it's available for sale to or use by third parties that I may not be aware of. I may not have fully comprehended the consent that I gave, and I might have withdrawn it if I had known. And obviously security breaches.
[04:08] Sony is in a terrible situation. But what I find amazing is everyone's paying attention to that when the number of people impacted is such a small percentage compared to the Home Depot and other things. That's a problem.
[04:23] And that's why I gave you the print. It’s only six slides. I really do encourage that you read it. So, basically what we do, and our approach to dynamic data obscurity is what we call dynamic anonymity. The example I'll give you is imagine that we are at a Mardi Gras Ball, and we're all wearing masks and costumes. You don't take the mask off. You don't take the custom off. After a while, you'll figure out who the different people are. Why? Because this person's interacting with that person and we know they’re friends. This person only eats shrimp, and we know that they do that. It's their characteristics and their behavior that allow us to get beyond the mask and figure out who those people are. Now, imagine if every 5 minutes the masks and the costumes change. Dynamic data obscurity, as done by dynamic anonymity, is constantly changing the identifiers associated with users and associated with activities and putting the keys that allow you to reassociate that information in something we call the circle of trust.
[05:23] This is not encryption because encrypted data isn't capable of being analyzed or processed or used. De-ID data would in fact enable that. We originally came up with the idea for the consumer internet as we started talking to Marty and his colleagues. It looks like healthcare is a much more proactive place, particularly the Internet of Things. Think of all the devices that could be used that could help healthcare.
[05:48] Last night, we were given an official notice that we will be getting certification that if you “ANONOSIZE” data, it is HIPAA-exempt. Think about that for a moment. Since September of last year, the final rule of the HITECH Act is if you're processing data that is HIPAA data, you are directly subject to HIPAA. That is a cost that could crush innovation in the IoT space. But if people use Anonos for IoT devices and that data is exempt, what does that do for you? So, I'll close with the objective of Anonos.
[06:31] The objective of Anonos is to satisfy regulatory and legislative goals and objectives technologically. We successfully did that in the financial space with something called The Market Access Rule (SEC Rule 15c3-5) that requires real-time risk management. When the SEC passed it, there was only one technology that made it possible. That was ours. And then, the competitors came. That's great because the market is more secure. I leave you with the script. Please read it. If you have any questions, happy to meet with you one on one. Or as I said, after the whole presentation, we will be here if you want to talk.