Security and Privacy Considerations: The scenarios and reference implementations here run using open (i.e. unsecured) connections. Systems SHALL NOT use PHI in any form, or data derived directly from PHI.
Track Report Out
*1 paragraph summary: what was the track trying to achieve
*1 list of participants (with logos if you have time and energy)
*systems which have implemented the IG, Profile, or Resource, and approximate percentage covered
*1 paragraph: notable achievements
*1-2 screenshots if relevant and interesting and/or links to further information about implementations/achievements
*1 paragraph: discovered issues / questions (if there are any)
*1 paragraph: now what?