[go: up one dir, main page]

Ferreira, 2022 - Google Patents

E-health applications and data protection: a comparison of selected European Union members' national legal systems

Ferreira, 2022

View PDF
Document ID
11709009861197576410
Author
Ferreira T
Publication year
Publication venue
Bioethica

External Links

Snippet

In a context of constant evolutions and digitalization of the world, the health industry is one of the most relevant areas of innovation, especially with the development of countless types of electronic health (e-health) applications such as electronic health records or health …
Continue reading at ejournals.epublishing.ekt.gr (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models

Similar Documents

Publication Publication Date Title
Edemekong et al. Health insurance portability and accountability act
Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure et al. For the record: protecting electronic health information
Sahney et al. Electronic health records: A general overview
Anderson et al. Ethics and information technology: a case-based approach to a health care system in transition
Shah et al. Electronic health records: challenges and opportunities
Svendsen et al. Pros and cons of eHealth: A systematic review of the literature and observations in Denmark
Cohen et al. Your money or your patient's life? Ransomware and electronic health records
Tilaar et al. Review of electronic medical records in Indonesia and its developments based on legal regulations in Indonesia and its harmonization with electronic health records (manual for developing countries)
Joseph et al. Design and Implementation of a Secured Web Based Medical Record Management System: A Case Study of Federal University WUKARI (FUW) CLINIC
Field et al. Am I My Cousin's Keeper? A Proposal to Protect Relatives of Genetic Database Subjects
Terp et al. Civil monetary penalties resulting from violations of the Emergency Medical Treatment and Labor Act (EMTALA) involving psychiatric emergencies, 2002 to 2018
Ferreira E-health applications and data protection: a comparison of selected European Union members’ national legal systems
Zou et al. The next horizon of drug development: external control arms and innovative tools to enrich clinical trial data
Appavu Analysis of unique patient identifier options
Clarke III et al. CONSUMER PRIVACY ISSUES ASSOCIATED WITH THE USE OF ELECTRONIC HEALTH RECORDS.
Valle et al. The feasibility of the nationwide health information network
Ellßel et al. Data Security, Cybersecurity, Legal and Ethical Implications for Digital Health:: A European Perspective
McCarthy Paging Dr. Google: personal health records and patient privacy
Shukla et al. Mitigating the impact of the year end spike in elective surgery on surgeon and staff well-being: A surgical perspective
Key et al. Focusing on Patient Safety: the Challenge of Securely Sharing Electronic Medical Records in Complex Care Continuums.
Kaplan Patient health data privacy
Wen et al. Health information exchange in Taiwan: multiple layers to facilitate broad access and use of data for clinical and population health
Geng et al. A study to analyze the placing behind the eHRSS security architecture of the principle of privacy protection.
Were Management of records in health institutions
Mendelson Healthcare identifiers legislation: a whiff of fourberie