22

Epicenter Pitch Deck

Embed Size (px)

Citation preview

2

3

Tourism 20%

Retail 10%

Restaurants 15%

4

Reproductive rate = LOW

I only spread to 4% of household contacts

SarsMERS

EBOLAH1n5

Influenza

unknown

Identify household contacts

INQUIRE ABOUT PEOPLE EXPOSED TO CASE

PLACES VISITED

SECONDARY CONTACTS

10x

100x

???

1

Contact TracingLengthy and Imperfect process

Surveillance Officer

ex

but crucial

Identify household contacts

INQUIRE ABOUT PEOPLE EXPOSED TO CASE

PLACES VISITED

SECONDARY CONTACTS

10x

100x

???

1

Contact TracingLengthy and Imperfect process

Surveillance Officer

Surveillance officers need someserious help

Contact Tracing in an efficient and comprehensive manner, while still

safeguarding privacy

Demo

Pre-installed knowledge baseViral Profiling

Confirmed CaseSymptomsStart Shedding virus Infected

Incubation

Pre-symptomatic Infectivity

Gen two - Search Window

H1N1

1 day1-4 days

Gen one - Search Window

Incubation

Transmission mode:Contact precaution

contacted

Viral Stats

Innovative

11

Effective QuarantineSupports the National Response Framework

What makes us valuable

reduce mortality through early treatment

slow and limit the spread of disease

maintain essential services, limit community disruptions

Plug and Play

Huge Demand Numerous use cases

Management information baseRaw AP usage logs over Simple Network Management Protocol

99% Compatible with existing wifi infrastructure

Plug and PlayWeb-service and REST API

Data we need is already available in large volumes

REST

Websockets

??

great ROIHigh commercial value!!

Extending reach of the networkReinforced with Hardware

Integrates as a registration System

outdoor venuesadhoc events

Extending reach of the networkReinforced with Hardware

Integrates as a registration System

outdoor venuesadhoc events

Organization #1 database

Organization #2 database

Organization #3 database

employee employee User

*consentCall if

suspected consentCall ifsuspected

Suspected Mac addresses

2nd Gen suspects

broadcast search request

BroadcastSuspects

consentCall if

suspected

Internal search

Follow up

Architecture | Protocol

sha-256 hashed

addresses

*Personal info will be destroyed upon

expiration of consent

1

2

3

4

5

6

IT Standards

21

data privacy secure communications

hashed mac addresses [sha-256]

vpn + sha-256

proper disposal of data

replacing with meaningless data

oecd & apec [pdpa] +

iso/iec 27040:2015

is0/iec 27010

22

Keep calm and fight epidemics