Keep your medical context in your hands after the French health data breach.

Cegedim Sante exposed 15.8 million files, and Medoucine exposed 813,866 patient records. Patient-held records, selective disclosure, and revocable access preserve care continuity without another centralized medical-data honeypot.

Why this matters

The French health breach cluster did not just leak names and administrative rows. It leaked the clinical context that tells other people how your life works.

Cegedim Sante exposed 15.8 million files, and Medoucine exposed 813,866 patient records tied to centralized storage and free-text collection.
No credit card required

The primary stakeholder is the patient whose care story escaped the clinic context. Doctors, wellness practitioners, and caregivers matter, but they matter after the patient's agency is restored.

The exposed population spans ordinary patients, high-profile public figures, and households mentioned inside notes and form narratives.
No credit card required

Care coordination should happen through patient-directed channels, not through giant vendor warehouses that quietly keep every attachment and narrative forever.

One patient-held channel can replace repeated uploads, repeated form fields, and repeated over-disclosure across clinics, specialists, and wellness providers.
No credit card required

Explore More

USER EXPERIENCE Trust does not come back because a breached platform sends an apology

Trust does not come back because a breached platform sends an apology

How It Works · User Experience · How trust returns

Trust does not come back because a breached platform sends an apology. It comes back when every disclosure has a purpose, a recipient, an expiry, and a visible receipt.

A signed consent trail turns hidden downstream copying into inspectable events that patients can challenge or end.
VALUE & PRICING Centralized overcollection looks efficient until exposed records start carrying stigma, legal exposure, support costs, a

Centralized overcollection looks efficient until exposed records start carrying stigma, legal exposure, support costs, a

What It Costs · Value & Pricing · What the breach really costs

Centralized overcollection looks efficient until exposed records start carrying stigma, legal exposure, support costs, and repeated patient distrust across the care system.

The visible breach count is 16.6 million-plus files and records across the cluster, but the hidden cost is every repeated explanation, re-consent step, and trust repair burden that follows.
ASSETS & CAPABILITIES The essential resource is not another institutional dashboard

The essential resource is not another institutional dashboard

Proof & Evidence · Assets & Capabilities · What must be owned

The essential resource is not another institutional dashboard. It is the patient-held canonical record that travels with provenance, consent history, and the right amount of context.

One portable record package can replace repeated uploads, repeated note re-entry, and repeated vendor copies across the care journey.
OPERATIONS & TIMING The winning activity set is not endless accumulation

The winning activity set is not endless accumulation

How It Performs · Operations & Timing · What the system must do

The winning activity set is not endless accumulation. It is a disciplined loop: collect less, structure well, share narrowly, prove consent, and close access when the purpose ends.

Four core activities define the safer model: patient-led structuring, scoped sharing, live audit logging, and clean revocation after use.
ECOSYSTEM & ALLIES A patient-held model only works if clinics, software vendors, wellness providers, auditors, and regulators can all accep

A patient-held model only works if clinics, software vendors, wellness providers, auditors, and regulators can all accep

Partners · Ecosystem & Allies · Who has to cooperate

A patient-held model only works if clinics, software vendors, wellness providers, auditors, and regulators can all accept the same proof of permission and provenance.

The partner set spans doctors, holistic practitioners, health software vendors, prosecutors, and regulators because every one of them touches record movement or accountability.
INVESTMENT & READINESS Changing the architecture sounds heavy until you compare it with another cycle of leaked notes, emergency notices, patie

Changing the architecture sounds heavy until you compare it with another cycle of leaked notes, emergency notices, patie

Positioning · Investment & Readiness · What it takes to switch

Changing the architecture sounds heavy until you compare it with another cycle of leaked notes, emergency notices, patient distrust, and duplicated remediation.

The cost of structured intake, patient-held records, and revocable sharing is lower than repeating breach-scale exposure across millions of records.
Deep Dive
This page is alive
Suggest improvement Ask a question Can't find something Another language
Recent community activity
Be the first to contribute. Your input shapes this page.

No credit card required