z-logo
open-access-imgOpen Access
Protection of patients' personal data when using telemedicine technologies during the COVID-19 pandemic
Author(s) -
D. M. Monakov,
AUTHOR_ID,
V.A. Shaderkina,
С. А. Рева,
А. А. Грицкевич,
AUTHOR_ID,
AUTHOR_ID,
AUTHOR_ID,
AUTHOR_ID
Publication year - 2021
Publication title -
rossijskij žurnal telemediciny i èlektronnogo zdravoohraneniâ
Language(s) - English
Resource type - Journals
eISSN - 2712-9225
pISSN - 2712-9217
DOI - 10.29188/2712-9217-2021-7-4-48-57
Subject(s) - telemedicine , personally identifiable information , data protection act 1998 , pandemic , internet privacy , legislature , vulnerability (computing) , process (computing) , data security , big data , business , data collection , computer science , information security , computer security , covid-19 , data science , political science , health care , medicine , encryption , sociology , social science , disease , pathology , infectious disease (medical specialty) , law , operating system
. The pandemic of COVID-19 has promoted the development of information and telemedicine technologies but also has risen some questions about their challenges. One of them is the secure of personal data. This review is aim to discuss those issues. Materials and methods. We have sought publications in the databases PubMed, e-Library, Google Scholar, Guarantor, Consultant and on the official websites of Russian state institutions using the keywords «personal data», «telemedicine», «protection», «threats», «personal data», «security», «threats», «telemedicine». Forty three publications were found and included in this review. Results. The review presents the basic concepts related to personal data, lists the types of threats to them and the levels of security, systematizes measures to ensure the protection of personal data and provides a brief description of them. The features of the collection, processing, storage and use of personal data when using telemedicine technologies are also outlined. Discussion. Personal data may be collected for administrative, scientific, commercial or criminal purposes. The emergence of modern "big data" technologies has greatly facilitated the process of data collection and processing, as well as access to them, but also increased their vulnerability. The process of information protection requires the complex application of various legal, organizational and technical measures, which requires significant financial, material and time costs. For the rational use of resources, information requiring protection is grouped by security levels, which are determined by the category, characteristics of the data and the type of threats to them. Conclusions. The current legislative principles of regulation in this area are significantly lagging behind the rapid development of technologies, which requires a fundamental revision of them. To date, the leading role in ensuring the security of personal data belongs to organizational and technical measures.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here