Information security and data protection in medicine

被引:0
|
作者
Darms, M. [1 ]
Hassfeld, S. [2 ]
Fedtke, S. [3 ]
机构
[1] Darms Engn GmbH, Verenaweg 12, CH-6343 Buonas, Switzerland
[2] Klinikum Dortmund Nord, Klin Mund Kiefer & Gesichtschirurg Plast Operat, Dortmund, Germany
[3] Syst Software, Zug, Switzerland
来源
MKG-CHIRURG | 2020年 / 13卷 / 04期
关键词
Information technology; Confidentiality; Electronic health records; Integrity; Cyber security;
D O I
10.1007/s12285-020-00265-3
中图分类号
R78 [口腔科学];
学科分类号
1003 ;
摘要
Due to the possibility of (global) networking, the Internet places considerable demands on medicine and related fields in terms of information technology (IT) security and data protection. The contents of electronic health records, including all medical findings, images, and other documents, are covered by patient confidentiality according to data protection legislation and medical law. Many current reports of hacker attacks aimed at components of the health care system highlight the potential danger. The current article presents important objectives, mistakes, and risks in the field of IT, with a focus on routine workflows in practices and hospitals, including practice-relevant security tips.
引用
收藏
页码:240 / 247
页数:8
相关论文
共 50 条
  • [1] Information security and data protection
    Qureshi, AA
    Siegel, JG
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2001, 14 (1-3) : 1 - 16
  • [2] Information security and protection of personal data
    Siskin, Dilan Serife
    [J]. TURKISH LIBRARIANSHIP, 2018, 32 (04) : 342 - 345
  • [3] The protection of personal data and the security of information
    Ribagorda Garnacho, Arturo
    [J]. REVISTA JURIDICA DE CASTILLA Y LEON, 2008, (16): : 373 - 399
  • [4] Open information systems and data security in medicine
    Blobel, B
    [J]. TOWARDS SECURITY IN MEDICAL TELEMATICS: LEGAL AND TECHNICAL ASPECTS, 1996, 27 : 168 - 182
  • [5] UK DATA PROTECTION ACT - PRINCIPLE OF INFORMATION SECURITY AND SECURITY MEASURES
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2012, 4 (03): : 55 - 66
  • [6] Cyber Security and Habeas Data:The Latin American Response to Information Security and Data Protection
    Parraguez Kobek, Luisa
    Caldera, Erick
    [J]. OASIS-OBSERVATORIO DE ANALISIS DE LOS SISTEMAS INTERNACIONALES, 2016, (24): : 109 - 128
  • [7] SPORTS DATA PRIVACY PROTECTION AND INFORMATION SECURITY MANAGEMENT
    Jin, Biao
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 4390 - 4398
  • [8] A Study on Information Security Management with Personal Data Protection
    Huang, Chien-Cheng
    Farn, Kwo-Jean
    Lin, Frank Yeong-Sung
    [J]. 2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 624 - 630
  • [9] Protection of Personal Information Security in the Age of Big Data
    Zou, Hui
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 586 - 589
  • [10] Network Information Security Data Protection Based on Data Encryption Technology
    Ping, Han
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (03) : 2719 - 2729