Правовое обеспечение электронного документооборота в телемедицине
Relevance. Rapid development of telemedicine and e-health requires free, legitimate and secure health information exchange. Besides technical solutions an important role in providing health information exchange played by legal and organizational measures. Adoption of the new legislation on the application of information technologies in healthcare increases the relevance of legal issues in this sphere.
Objective. The article addresses the legal aspects of building health information systems, taking into account the rights and legitimate interests of all stakeholders (patients, physicians, healthcare providers, insurance companies, research organizations, etc.).
The main results. In the paper it is reasoned that the architecture of health information systems should be based on principles of centralized storage of data, integration of data from the wide range of sources, increasing usability of the systems, ensuring data dynamism and mobility as well as enhancing the role of patients in management of personal health records.
Also particular attention is paid to security issues of health information systems. The information security measures for such systems include reliable procedures for identification and authorization of subjects, differentiation of access rights to health records, encryption of health data and depersonalization of health data of individual patients. These and other measures will help to ensure the legitimacy of electronic document exchange, as well as to increase the level of patients trust to information technologies used in healthcare.
Applicability and scientific significance. The principles and ideas reflected in the article can be used in law-making process in the area of telemedicine and serve as a basis for the subsequent academic research on the electronic document exchange in the new technological conditions.
Widespread acceptance and adoption of cloud computing calls for adaptation and development of existing risk assessment models of information systems. The approach suggested in this article can be used for risk assessment of information systems functioning on the basis of cloud computing technology, and assess the effectiveness of security measures.
Continua Health Alliance is a non-profit, open industry organization of healthcare and technology companies joining together in collaboration to improve the quality of personal healthcare. With more than 200members companies around the world, Continua is dedicated to establishing a system of interoperable personal connected health solutions with the knowledge that extending those solutions into the home fosters independence, empowers individuals and provides the opportunity for truly personalized health and wellness management. When you look at complete list of Continua Certified TM http://www.continuaalliance.org/node/77, you cannot find any ECG device (at the time of writing), but need ECG asa useful screening tool for a variety of cardiac abnormalities. We decided to build the prototype of 3-5-lead ECG with Bluetooth LE and USB interface. The firmware of the device was developed according the ISO/EEE 11073-10406:2011 and this device as a agent can communicate with any manager device on Personal Area Network. The filters of the device (50/60 Hz , low and high pass) are programmable and can be remotely configured. The signals from electrodes can be routed to doctor computer's screen for online diagnostic, can be save in EHR system or sent to special computer with LabView for ECG signal processing with different algorithms. This prototype could be used as a X73 agent for other consumer medical applications.
Some provisions of SWOT analysis and assessment of its productivity in business are criticized.
This paperwork overviews core technologies implemented by comparably new products at information security market - web application firewalls. Web applications are a very wide-used and convenient way of presenting remote users with access to corporate information resources. It can however become single point of failure rendering all the information infrastructure unreachable for legitimate clients. To prevent malicious access attempts to endpoint information resources and, intermediately, to web server, a new class of information security solutions has been created. Web application firewalls function at the highest, seventh layer of ISO/OSI model and serves as a controlling tunnel for all the traffic heading to and from company’s web application server(s). To ensure decent levels of traffic monitoring and intrusion prevention web application firewalls are equipped with various mechanisms of data exchange session “normalness” control. These mechanisms include protocol check routines, machine learning techniques, traffic signature analysis and more dedicated means like denial of service, XSS injection and CRRF attack prevention. Ability to research and add user rules to be processed along with vendor-provided ones is important since every company has its own security policy and, therefore the web application firewall should provide security engineers with ways to tweak its rules to reflect the security policy more precisely. This research is based on wide practice experience integrating web application firewalls into security landscape of various organizations, their administration and customization. We illustrate our research of available filtering mechanisms and their implementations with example product features by market leaders, schemes and screenshots from real web application firewall systems.
The use of hardware virtualization for ensuring information security is discussed. A review of various approaches to improving the security of software systems based on virtualization is given. A review of possible scenarios of using virtualization by intruders is also presented. The application domains and limitations of the available solutions and perspectives of future development in the field are discussed.
This conference is the 9th of its kind on the Mediterranean region. This edition will provide a forum to discuss achievements and current experiences in specific areas in medical informatics and telemedicine, focusing on innovation methods and approaches. Its overall goal is to increase interaction and collaboration among professionals from both health and information technology sectors within and between the Mediterranean countries for scientific and social development in the region. The Euromediterranean Medical Informatics and TeleMedicine conference series have provided a forum for discussions and an environment that fosters creation of new collaboration in an interdisciplinary environment. They led to the emergence of the Euro-Mediterranean Medical Informatics and Telemedicine Association and number of regional cooperation. We hope that this year conference will accomplish the expectations announced in the previous ones, and will enhance collaboration between all participants coming from Europe, Africa and the Middle East. The organization of the EMMIT 2013 Conference in Morocco has come together through the hard work of the local organizing committee, together with the International Institute of Tele-Medicine personnel and members of Euro-Mediterranean Medical Informatics and Tele-Medicine Association. The overall plans were overseen by a steering committee and the program was put together through the work of the scientific committee chaired by Prof. Francesco Sircurello. We are very grateful to all our sponsors, particularly to the Moroccan Ministry of Health that accepted to offer its patronage to the event, The University Mohammed First, The Faculty of Medicine of Oujda, The Faculty of Sciences of Oujda, The School of Engineering, The Faculty of Medicine of Fes and The MarchicaMed agency. We are also excited about the list of participants who are coming in from the Mediterranean and around the world. Finally, we would like to add our welcome to all of you to the beautiful Mediterranean city of Nador, Morocco, the Kingdom of solidarity, peace and hospitality.
The article is devoted to a particular form of freedom of assembly — the right to counter-demonstrate. The author underlines the value of this right as an element of democratic society, but also acknowledges the risk of violent actions among participants of opposing demonstrations. Due to this risk, the government may adopt adequate measures restricting the right to counter-demonstrate, certain types of which are analyzed in this paper.
Development of standards of international controllability is reviewed in the article. Institutional approach is applied to development of international legal regime of Energy Charter. Definition of controllability is connected to development of international standards of dispute settlement, which are described in the article in detail. In connection with controllability, Russian interest, defense of investment in European Union and ecological investment encouragement, is reviewed in the article.
мировое управление и управляемость, Мировая экономика, международное экономическое право, энергетическая хартия, International control and controllability, International economics, international economic law, Energy Charter
международное частное право; недвижимость; ; школа бартолистов; бартолисты; теория статутов; статуарная теория/