Who will be the guardian of health information security in 2015?

Source: Internet
Author: User
Keywords Tele-Medical Technology Guide
Tags change content data data collection data transmission guide health information information

Absrtact: If in an innovation century, the technological change is the skeleton reorganization, then the service and the content is the skeleton blood vessel and the muscle, when they gradually spread out, the information security this piece of skin, should consider covering the whole body, avoids the water nutrient loss. From Wei

If, in an innovative century, technological change is a skeleton reorganization, then the service and content is the skeleton of the blood vessels and muscles, when they gradually spread out, information security this piece of skin, should consider covering the whole body, to avoid loss of water nutrients.

According to the recently published "Telemedicine Information System Construction Technology Guide (2014 edition)" of the Wei Planning Board, the safety of the patient's electronic medical record, health file, consultation information and image data involved in telemedicine is a general concern in the industry, but the biggest obstacle at present is: there is no uniform specification.

Therefore, the guide can only say that the construction of telemedicine information system needs to consider the protection of patient information privacy requirements, the protection of the internal information needs of consultation institutions, business database security requirements, security management system needs.

Also put forward specific security measures, such as data collection should adopt a unified data collection channel to ensure the collection of medical information resources data security; Data storage should use fragmented distributed discrete storage technology to save medical information resources; In data transmission, we should use VPN and data transmission encryption technology, To realize the security of data transmission channel; It is necessary to ensure that the disk storage space is freed or redistributed to other users before it is fully erased;

and IDC in its 2015Health it forecasts also mentioned many times, mobile health care is now spelled the product, 2018 to fight the security.

In 2015, for example, half of health-care institutions will encounter cyber attacks ranging from 1 to 5, with One-third of them being recruited. So medical institutions should consider making more investments and multiple strategic layouts in terms of cybersecurity, avoiding operational problems caused by attacks, or other costs.

In 2020, almost 42% of electronic health data will be unprotected, but they need to be protected because more and more stakeholders will rely on larger datasets.

Visible health information security related services will also become a mobile health care field of an entrepreneurial outlet, then 2015, who will do health information security Guardian?

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.