Information security and data protection in medicine

被引:0
|
作者
Darms, M. [1 ]
Hassfeld, S. [2 ]
Fedtke, S. [3 ]
机构
[1] Darms Engn GmbH, Verenaweg 12, CH-6343 Buonas, Switzerland
[2] Klinikum Dortmund Nord, Klin Mund Kiefer & Gesichtschirurg Plast Operat, Dortmund, Germany
[3] Syst Software, Zug, Switzerland
来源
MKG-CHIRURG | 2020年 / 13卷 / 04期
关键词
Information technology; Confidentiality; Electronic health records; Integrity; Cyber security;
D O I
10.1007/s12285-020-00265-3
中图分类号
R78 [口腔科学];
学科分类号
1003 ;
摘要
Due to the possibility of (global) networking, the Internet places considerable demands on medicine and related fields in terms of information technology (IT) security and data protection. The contents of electronic health records, including all medical findings, images, and other documents, are covered by patient confidentiality according to data protection legislation and medical law. Many current reports of hacker attacks aimed at components of the health care system highlight the potential danger. The current article presents important objectives, mistakes, and risks in the field of IT, with a focus on routine workflows in practices and hospitals, including practice-relevant security tips.
引用
收藏
页码:240 / 247
页数:8
相关论文
共 50 条
  • [41] Information security: threats and protection mechanisms
    Howard, A
    Paridaens, O
    Gamm, A
    [J]. ALCATEL TELECOMMUNICATIONS REVIEW, 2001, (02): : 117 - 121
  • [42] Information Security Protection in Software Testing
    Wang, Yubin
    Yao, Jinyu
    Yu, Xiaoxue
    [J]. 2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 449 - 452
  • [43] Information security protection in hybrid office
    Ma, Jun
    Alias, Syazwina
    Huang, Chunya
    [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 21 - 25
  • [44] Information disclosure and security information protection at water utilities
    Herrick, Charles
    Blaha, Frank J.
    [J]. JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2007, 99 (11): : 40 - 42
  • [45] What actually is ... Data Protection/Data Security?
    Lang, Michael
    [J]. UROLOGE, 2021, 60 (07): : 952 - 952
  • [46] IoT and Smart Home Data Breach Risks from the Perspective of Data Protection and Information Security Law
    Vojkovic, Goran
    Milenkovic, Melita
    Katulic, Tihomir
    [J]. BUSINESS SYSTEMS RESEARCH JOURNAL, 2020, 11 (03): : 167 - 185
  • [47] PRIVACY AND DATA PROTECTION IN MEDICINE
    HORBACH, L
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1983, 149 : 228 - 232
  • [48] Implementation of Information Security Management Systems for Data Protection in Organizations: A systematic literature review
    Marhad, Siti Suhaida
    Abd Goni, Siti Zaleha
    Sani, Mad Khir Johari Abdullah
    [J]. ENVIRONMENT-BEHAVIOUR PROCEEDINGS JOURNAL, 2024, 9 : 197 - 203
  • [50] Editorial: Special Issue on "Information Security and Data Protection in Future Generation Communication and Networking"
    Park, Jong Hyuk
    Chao, Han-Chieh
    Chen, Whai-En
    Kitsos, Paris
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2009, 51 (01) : 1 - 3