The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The emergence of New Data Sources (NDS) in healthcare is revolutionising traditional electronic health records in terms of data availability, storage, and access. Increasingly, clinicians are using NDS to build a virtual holistic image of a patients health condition. This research is focused on a review and analysis of the current legislation and privacy rules available for healthcare professionals...
Assessing ICT applications and services goes beyond technical issues; their legal context is as important as international standards and specifications. ICT involve balancing several fundamental rights such as privacy and freedom of movement. International standards, along with French and European legal requirements, are strong levers, not obstacles, to promote sustainable development of ICT applications...
Freedom of movement in the European Union (EU) requires the possibility to exchange healthcare - related information across borders. Such an interchange must face legal, technical and security issues. In this work, we provide a technical analysis of the state - of - the - art software for cross - border eHealth data exchange in the EU, namely OpenNCP, from the security point of view. Moreover, we...
Decision-making in an emergency department needs to be efficient. It does not allow observation of the patient for a prolonged period of time, especially if the patients harm themselves or others, or refuses treatment. This includes suicidal, violent, intentional self-inflicted or non-consenting to treatments patient. Clinicians have to quickly decide whether to call the police, admit the patient...
Smart Home deployment remains within the early adopter phase. In spite of relatively moderate penetration of the patronage and healthcare functionality in the already installed devices, this feature is considered as one of the highest potential drivers for Smart Home deployment. We suggest the complex approach for medical assistance based on Smart Home usage. We propose also how to organize the human...
This document contains position statements from the panel chair and the different panelists on the panel “Ubiquitous sensing and privacy: Can the twains meet?” held on January 06, 2017 during the 9th International Conference on Communication Systems and Networks (COMSNETS), held in Bangalore, India.
Health care providers are increasingly making use of m-health systems for data collection and maintenance of patients' health records, e.g. Mobile Personal Health Record Systems (MPHS). The privacy issues raised when making use of MPHRS include how information is collected, stored, and who has access to the collected information. These privacy concerns have not been investigated in the South African...
Biomedical technology promises to improve our health and well-being. Curiously, some promising technologies have threatened our sacrosanct right to privacy, offended our disabled citizens, and provided fodder for our tort system. A novel course, Impacts of Biomedical Innovations, challenges students to critically evaluate existing medical devices and biomedical technologies, including their benefits,...
Social networking for healthcare is used by many of the different participants in the healthcare system. The motivations for using social networking differ depending on the participant. In this paper, the distinct types of social networking for health care and the user groups that are associated with them are defined. There are three distinct emerging user groups in social networking for health care...
The article deals with the protection of personal data in the e-health. The author discusses approaches to the information security of patients' health data in the international practice, highlights the specific features of the personal medical data, and shows the potential threats to privacy and security of the medical secrecy and patient confidentiality in the healthcare information systems. The...
Some within the engineering education community have asserted that engineering education should be considered a profession. While the formal meaning and identifying characteristics of a profession are debated, in general an individual that is considered professional meets at least three criteria: recognized expertise drawn from a widely accepted body of knowledge, accepted norms of professional behavior,...
Patient access to their own health records is a legal right necessary to facilitate self-care however there are numerous laws and ethics that impact the extent and ease to which access is granted. A method and tool to accurately and efficiently guide guardians and patients in the initial assessment of requests for access to health records would be useful in promoting patient-centered care. This paper...
What are the themes and broad questions within these themes that have arisen within the discourse represented by Technology in Society? Is there any connecting ideology or methodology that crosses all of these themes? This study revealed that there were broad questions and themes that emerged in the international journal, Technology in Society from 2004–2015. Some of these broader thematic questions...
In addition to knowledge and experience of medical doctors, correct diagnosis and appropriate patient treatment largely depend on accuracy and functionality of medical devices. In a large number of serious medical situations proper functionality of medical devices is crucial for patients. Therefore it is necessary to carry out as strict and independent testing of functionalities of medical devices...
Personal Health Records (PHR) open new opportunities for enhancing delivery of standard health care services and health information to general population and supporting individuals to take more active role in health management and decision making processes. However, while utilization of PHR as part of a health management process brings much more flexibility, and advanced options to individuals, it...
Recently, Electronic Health Record (EHR) systems have gained a great attention in industry, research and public sectors in order to enhance the quality of healthcare. Security and privacy, however, are still major issues that require further investigations. The recognition of the significance of various security aspects in the adaptation of EHR solutions has been accompanied with an increasing research...
More attention has been paid to the protection of the personal health information (PHI) system with the widespread concern of the personal privacy. Combining the patient's right and obligation, this paper fully takes into consideration of the important role of the patients in the privacy protection, designs the model of privacy protection based on the patients as main body in PHI system, in the sections...
This paper will identify the legal and ethical challenges in Europe of clinical data governance in health informatics and classify the various legal bases for sharing a dataset.
Often communicate private data in informal settings such as email, where we trust that the recipient shares our assumptions regarding the disposition of this data. Sometimes we informally express our desires in this regard, but there is no formal means in such settings to make our wishes explicit, nor to hold the recipient accountable. Here we describe a system and prototype implementation called...
The paper aims at identifying and investigating legal issues surrounding de-identification of data streams generated by CCTV applications. As a basis for further discussions, the exact subject-matter of legal protection afforded to data (images and sounds) resulting from CCTV operations is pinpointed. Thereafter, legal consequences of de-identification are established. In connection with that, delineation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.