Absrtact: If in an innovation century, the technological change is the skeleton reorganization, then the service and the content is the skeleton blood vessel and the muscle, when they gradually spread out, the information security this piece of skin, should consider covering the whole body, avoids the water nutrient loss. From Wei
If, in an innovative century, technological change is a skeleton reorganization, then the service and content is the skeleton of the blood vessels and muscles, when they gradually spread out, information security this piece of skin, should consider covering the whole body, to avoid loss of water nutrients.
According to the recently published "Telemedicine Information System Construction Technology Guide (2014 edition)" of the Wei Planning Board, the safety of the patient's electronic medical record, health file, consultation information and image data involved in telemedicine is a general concern in the industry, but the biggest obstacle at present is: there is no uniform specification.
Therefore, the guide can only say that the construction of telemedicine information system needs to consider the protection of patient information privacy requirements, the protection of the internal information needs of consultation institutions, business database security requirements, security management system needs.
Also put forward specific security measures, such as data collection should adopt a unified data collection channel to ensure the collection of medical information resources data security; Data storage should use fragmented distributed discrete storage technology to save medical information resources; In data transmission, we should use VPN and data transmission encryption technology, To realize the security of data transmission channel; It is necessary to ensure that the disk storage space is freed or redistributed to other users before it is fully erased;
and IDC in its 2015Health it forecasts also mentioned many times, mobile health care is now spelled the product, 2018 to fight the security.
In 2015, for example, half of health-care institutions will encounter cyber attacks ranging from 1 to 5, with One-third of them being recruited. So medical institutions should consider making more investments and multiple strategic layouts in terms of cybersecurity, avoiding operational problems caused by attacks, or other costs.
In 2020, almost 42% of electronic health data will be unprotected, but they need to be protected because more and more stakeholders will rely on larger datasets.
Visible health information security related services will also become a mobile health care field of an entrepreneurial outlet, then 2015, who will do health information security Guardian?