Search results

From LIMSWiki
Jump to navigationJump to search
  • |title_full = Automated cyber and privacy risk management toolkit ...the degree of compliance with data protection legislation. Furthermore, a privacy impact assessment (PIA) is conducted in a proactive manner during the desig
    136 KB (18,556 words) - 18:40, 6 October 2021
  • |title_full = Health data privacy through homomorphic encryption and distributed ledger computing: An ethical ...tions for [[Data sharing|sharing patient data]] in a [[Information privacy|privacy-preserving manner]]. Two of these technical solutions are [[homomorphic enc
    91 KB (12,825 words) - 19:20, 7 February 2023
  • ...and sustainability. The key topics raised by interviewees revolved around privacy and to some extent [[cybersecurity]]. This may be due to the prevalence of ...rmation on the household energy footprint, and stored data in the light of privacy and confidentiality policies.<ref name="ECBench14" />
    72 KB (10,776 words) - 18:50, 14 October 2019
  • ...o refer to the movement of personal data across national borders. The OECD Privacy Guidelines refer to “transborder data flows,” defining the term as “m ...e European Convention on Human Rights with regard to [[Information privacy|privacy protection]]. It attempts to build consistent data protection principles to
    68 KB (9,682 words) - 19:21, 31 July 2021
  • ...patible with the Patient Data Act, Personal Data Act, and other applicable privacy laws. ...tions to be used to evaluate a digital health service according to current legislation.
    45 KB (6,297 words) - 19:48, 6 June 2016
  • ...ined with [[Information security|data security]] and [[Information privacy|privacy]], while cloud provides solutions to the blockchain scalability and efficie ...al:Automated cyber and privacy risk management toolkit|Automated cyber and privacy risk management toolkit]]"'''
    79 KB (10,982 words) - 23:51, 11 April 2024
  • ....us |publisher=Civic Impulse, LLC |accessdate=12 February 2015}}</ref> The legislation successfully made it out of the Senate Labor and Human Resources Committee ...PAA" /> On February 7, 1996, the two parties agreed to further discuss the legislation in the House and Senate. This resulted in several events: the House of Repr
    20 KB (2,906 words) - 00:43, 8 January 2022
  • ...ng, they could easily self-direct themselves to improve their security and privacy. Finally, we provide recommendations for educators, app developers, and mob ...urity, security education, app permission, mobile security awareness, user privacy, user security, sensor attacks
    89 KB (12,939 words) - 20:08, 26 November 2019
  • ...syntactic choices, applications, technical infrastructure, and safety and privacy issues. The Refined eHealth European Interoperability Framework (EIF) is a * Legal and regulatory: This level represents the legislation and regulatory guidelines that define the boundaries for interoperability n
    68 KB (9,790 words) - 21:42, 8 June 2021
  • ...ny advantages to mobile users, it also still suffers from the security and privacy issues of data while hosted on virtual machines (VM) on remote cloud’s se Under current legislation in Italy, using the ''[[wikipedia:Cannabis|Cannabis]]'' plant for medical p
    83 KB (11,691 words) - 15:36, 2 January 2024
  • ...it was enacted, it was considered "the most important piece of health care legislation to be passed in the last 20 to 30 years"<ref name="hungry-contractors">{{ci ...me="CMSMUOver">{{cite web |url=http://www.cms.gov/Regulations-and-Guidance/Legislation/EHRIncentivePrograms/index.html |title=EHR Incentive Programs |publisher=Ce
    17 KB (2,264 words) - 19:54, 19 September 2021
  • '''Keywords''': pseudonymity, anonymity, untraceability, privacy-preserving protocols, informatics, data reporting, data protection, researc ...it. The General Data Protection Regulation (GDPR) has replaced the current legislation and comes into full effect in 2018.<ref name="EUR-LexGDPR">{{cite web |url=
    26 KB (3,723 words) - 15:04, 25 April 2017
  • ...rnal of Medical Informatics |title=Views on health information sharing and privacy from primary care practices using electronic medical records |author=Perera ...gov/policy-researchers-implementers/health-it-legislation |title=Health IT Legislation |work=HealthIT.gov |publisher=U.S. Department of Health & Human Services |d
    27 KB (3,655 words) - 15:28, 20 September 2022
  • Globally, death investigations are conducted according to prevailing legislation, which differs from country to country. Historically, the coroner system wa ...4" /> The systems were also seen as a conduit for information sharing once privacy challenges were tackled.<ref name=":23" /><ref name=":14" /><ref name=":18"
    85 KB (10,856 words) - 23:13, 24 February 2023
  • With the implementation of this legislation as well as the technologies associated with it, it is imperative to effecti | style="background-color:white; padding-left:10px; padding-right:10px;"|Privacy, confidentiality, data duplication, integrity
    59 KB (7,747 words) - 17:40, 7 December 2016
  • ...tion]] to patients, however, may be complicated by misunderstanding of HIT privacy and information sharing. The purpose of this study was to determine whether ...ociated with security requirements of data encryption, multi-tenancy, data privacy, authentication and authorization for different cloud services. The multile
    83 KB (11,829 words) - 22:16, 4 April 2024
  • ...more clinical labs into the regulation net, with proposed but unsuccessful legislation in 1976 and 1977 that would have extended federal licensure to all hospital ...|title=AMA battle cry: get off our backs; in a broadside swipe at federal legislation, angry delegates reject CLIA, databank |author=Carpi, John |volume=34 |issu
    55 KB (7,634 words) - 19:45, 17 May 2022
  • {{wikipedia::Children's Online Privacy Protection Act}} [[Category:Privacy legislation]]
    454 bytes (59 words) - 20:04, 21 June 2016
  • ...ed. The first one is data protection as a consequence of people’s right to privacy, something that, from the beginning, seems to collide clearly with the busi ...nment) regulations.<ref name="MartínezGestión14" /> Moreover, most of this legislation is outdated to a large extent, since it was passed in a time when IT progre
    54 KB (7,477 words) - 23:11, 20 March 2018
  • ...dvertent disclosures through breaches of security. The choice of this U.S. legislation was informed by its reputation as one of the best regulatory rules pertaini ...patient data stored in the PACS. In protecting confidentiality, patients’ privacy is secured, and the intrinsic value of patients as human beings is recogniz
    35 KB (4,745 words) - 22:45, 30 July 2018

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)