Ferreira, 2022 - Google Patents
E-health applications and data protection: a comparison of selected European Union members' national legal systemsFerreira, 2022
View PDF- Document ID
- 11709009861197576410
- Author
- Ferreira T
- Publication year
- Publication venue
- Bioethica
External Links
Snippet
In a context of constant evolutions and digitalization of the world, the health industry is one of the most relevant areas of innovation, especially with the development of countless types of electronic health (e-health) applications such as electronic health records or health …
- 230000001105 regulatory 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Edemekong et al. | Health insurance portability and accountability act | |
Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure et al. | For the record: protecting electronic health information | |
Sahney et al. | Electronic health records: A general overview | |
Anderson et al. | Ethics and information technology: a case-based approach to a health care system in transition | |
Shah et al. | Electronic health records: challenges and opportunities | |
Svendsen et al. | Pros and cons of eHealth: A systematic review of the literature and observations in Denmark | |
Cohen et al. | Your money or your patient's life? Ransomware and electronic health records | |
Tilaar et al. | Review of electronic medical records in Indonesia and its developments based on legal regulations in Indonesia and its harmonization with electronic health records (manual for developing countries) | |
Joseph et al. | Design and Implementation of a Secured Web Based Medical Record Management System: A Case Study of Federal University WUKARI (FUW) CLINIC | |
Field et al. | Am I My Cousin's Keeper? A Proposal to Protect Relatives of Genetic Database Subjects | |
Terp et al. | Civil monetary penalties resulting from violations of the Emergency Medical Treatment and Labor Act (EMTALA) involving psychiatric emergencies, 2002 to 2018 | |
Ferreira | E-health applications and data protection: a comparison of selected European Union members’ national legal systems | |
Zou et al. | The next horizon of drug development: external control arms and innovative tools to enrich clinical trial data | |
Appavu | Analysis of unique patient identifier options | |
Clarke III et al. | CONSUMER PRIVACY ISSUES ASSOCIATED WITH THE USE OF ELECTRONIC HEALTH RECORDS. | |
Valle et al. | The feasibility of the nationwide health information network | |
Ellßel et al. | Data Security, Cybersecurity, Legal and Ethical Implications for Digital Health:: A European Perspective | |
McCarthy | Paging Dr. Google: personal health records and patient privacy | |
Shukla et al. | Mitigating the impact of the year end spike in elective surgery on surgeon and staff well-being: A surgical perspective | |
Key et al. | Focusing on Patient Safety: the Challenge of Securely Sharing Electronic Medical Records in Complex Care Continuums. | |
Kaplan | Patient health data privacy | |
Wen et al. | Health information exchange in Taiwan: multiple layers to facilitate broad access and use of data for clinical and population health | |
Geng et al. | A study to analyze the placing behind the eHRSS security architecture of the principle of privacy protection. | |
Were | Management of records in health institutions | |
Mendelson | Healthcare identifiers legislation: a whiff of fourberie |