Page 46

“THE ASSIGNING OF UNIQUE IDENTIFIERS AND CONNECTING NEW ‘CHILD’ INVENTORY WITH ITS ‘PARENT’ INVENTORY CREATES A LINEAGE CHAIN FROM PLANT TO PLANT MATERIAL TO CONSUMABLE PRODUCTS.” that everyone involved with the industry knew would be devastatingly costly. To make sure that the Washington cannabis industry could survive the “manual spreadsheet era,” we practically cloned our Washington traceability software system overnight and deployed it as a private-sector system, independent of MJ Freeway and the state. Licensees and the majority of our point-of-sale competitors agreed that our Unified Cannabis System (UCS) was the best path forward for the industry. For a small monthly fee to cover the hosting costs of the UCS, nearly all licensees in the state were able to continue reporting to our private UCS system, which then coordinated the chain of custody transfer data between licensees and generated over a million individual spreadsheet files that were automatically submitted to the LCB. It’s not an exaggeration to say that the UCS upheld the Washington industry and automated the reporting for more than 1,600 licensees from Nov. 1 until MJ Freeway’s system finally launched on Feb. 1. Is MJ Freeway the only company operating in this space that’s been hacked? Why do you suppose that is? We’re all frustrated with MJ Freeway’s situation. Though we all compete with each other for business, we’re ultimately fighting together to build trust, confidence, credibility and professionalism for the entire industry. When one team suffers, we all suffer. What is BioTrackTHC doing to make 46 FREEDOM LEAF

SPRING 2018

sure that the data you’re processing and storing remains secure? Because the core of what we do is data— business management data, compliance data, patient/consumer data—system security has always been a top priority. BioTrack utilizes physical cryptographic security keys as well as passwords for multifactor authentication into critical systems. This means guessing or stealing an employee’s username and password is not enough to gain access. The unique security key must be inserted in the computer’s USB port to successfully log in. Google deployed the same security keys to more than 50,000 Google employees and found they’re incredibly effective. BioTrack also utilizes a technology that implements the Zero Trust architecture spearheaded by Google. It piggybacks on the security keys using a chained authentication system. Every developer log-in attempt is individually managed and independently tracked. Each log-in is limited in scope and valid for one-time use, and because there are no shared keys or shared developer environments, the ability for a would-be attacker to gain access to the system is dramatically reduced. And even in the highly unlikely event attackers gained access to one system, they couldn’t access other systems. When seeking state contracts, how does BioTrackTHC stand out from the competition? Providing business software is one of the greatest values we bring to the table.

Issue 32 - Spring 2018  

Living in Baja, Mota History, Terps Guide, Mass Goes Legal

Issue 32 - Spring 2018  

Living in Baja, Mota History, Terps Guide, Mass Goes Legal

Advertisement