PATIENT DATA PROTECTION RECOMMENDATIONS BEING DEVELOPED

2000 ◽  
Vol 131 (1) ◽  
pp. 22-24
Keyword(s):  
2020 ◽  
pp. 1-10
Author(s):  
Georg W. Alpers ◽  
Lisa Frey ◽  
Stephanie Tessmer-Petzendorfer ◽  
Anna Klingauf ◽  
Silvia Schad

Digital communication is omnipresent. In everyday life, social messenger apps are very popular. Thus, for some patients1 it seems intuitive to use such media to correspond with their professional therapists as well. From a practical perspective, this seems to be advantageous for the therapists themselves. However, this should not lead us to overlook the problems of such platforms, especially issues with data protection. In spite of the legally binding rollout of a safe communication route for therapeutic and medical services in Germany (the so-called “Telematik-Infrastruktur”), so far, there is no unproblematic communication platform for therapists and their patients. Special messenger apps, which explicitly do not store metadata, seem to be the least problematic besides classic phone calls or letters. However, they are not yet widely used. This paper aims to sensitize psychotherapists for their responsibility and to demonstrate technical options, which need to be weighed carefully in order to maximize data protection of digital communication in therapeutic practice.


2007 ◽  
Vol 89 (2) ◽  
pp. 70-72
Author(s):  
CN Peck ◽  
MJ Fehily ◽  
DW Howcroft ◽  
DS Johnson

The Data Protection Act (DPA) 1998 became UK law in March 2000, with the purpose of preventing the misuse of sensitive personal data. It imposed legal obligations on all medical and surgical personnel and has implications for training logbooks, audit and research. Previous studies have shown a poor awareness of and compliance with the Act, which gives us rules to follow when handling patient data. The DPA has tighter controls over electronic data than paper-based data due to the rise in the use of computers for holding such information and their potential for abuse. The aim of this study was to assess compliance with the DPA, particularly with regard to electronic logbooks.


2015 ◽  
Vol 3 (2) ◽  
pp. e18 ◽  
Author(s):  
Nancy A Dreyer ◽  
Stella Blackburn ◽  
Valerie Hliva ◽  
Shahrul Mt-Isa ◽  
Jonathan Richardson ◽  
...  

2011 ◽  
pp. 933-944
Author(s):  
John Ayoade ◽  
Judith Symonds

The main features of RFID are the ability to identify objects without a line of sight between reader and tag, read/write capability and ability of readers to read many tags at the same time. The read/write capability allows information to be stored in the tags embedded in the objects as it travels through a system. Some applications require information to be stored in the tag and be retrieved by the readers. This paper discusses the security and privacy challenges involve in such applications and how the proposed and implemented prototype system Authentication Processing Framework (APF) would be a solution to protect hospital patient data. The deployment of the APF provides mutual authentication for both tags and readers and the mutual authentication process in the APF provides security for the information stored in the tags. A prototype solution for hospital patient data protection for information stored on RFID bracelets is offered.


Author(s):  
John Ayoade ◽  
Judith Symonds

The main features of RFID are the ability to identify objects without a line of sight between reader and tag, read/write capability and ability of readers to read many tags at the same time. The read/write capability allows information to be stored in the tags embedded in the objects as it travels through a system. Some applications require information to be stored in the tag and be retrieved by the readers. This paper discusses the security and privacy challenges involve in such applications and how the proposed and implemented prototype system Authentication Processing Framework (APF) would be a solution to protect hospital patient data. The deployment of the APF provides mutual authentication for both tags and readers and the mutual authentication process in the APF provides security for the information stored in the tags. A prototype solution for hospital patient data protection for information stored on RFID bracelets is offered.


2020 ◽  
Author(s):  
Kyle Lam ◽  
Sanjay Purkayastha ◽  
James M Kinross

UNSTRUCTURED This viewpoint explores the ethical and regulatory consequences of the digital transformation of the operating room. Surgical robotics is undergoing significant change and future advances will center around the capture and use of data. The consequences of creating this surgical data pipeline must be understood and digital surgical systems must prioritize the safeguarding of patient data. Moreover, data protection laws and frameworks must adapt to the changing nature of surgical data. Finally, digital surgeons must understand changing data legislation and best practice on data governance to act as guardians not only for their own but also for their patients’ data.


Author(s):  
John Ayoade ◽  
Judith Symonds

The main features of RFID are the ability to identify objects without a line of sight between reader and tag, read/write capability and ability of readers to read many tags at the same time. The read/write capability allows information to be stored in the tags embedded in the objects as it travels through a system. Some applications require information to be stored in the tag and be retrieved by the readers. This paper discusses the security and privacy challenges involve in such applications and how the proposed and implemented prototype system Authentication Processing Framework (APF) would be a solution to protect hospital patient data. The deployment of the APF provides mutual authentication for both tags and readers and the mutual authentication process in the APF provides security for the information stored in the tags. A prototype solution for hospital patient data protection for information stored on RFID bracelets is offered.


Sign in / Sign up

Export Citation Format

Share Document