Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 20 de 31
Filter
1.
Acta bioeth ; 29(2)oct. 2023.
Article in English | LILACS-Express | LILACS | ID: biblio-1519847

ABSTRACT

Biometric technology has transformed human biological characteristics into a new form of privacy, and the misuse of this technology poses challenges to protecting this new privacy. This article initially defines biometric technology and biometric characteristics, further demonstrating why biometric characteristics belong to personal privacy and how biometric technology poses challenges to its protection. Through analysis, this article argues that the essence of these challenges is the conflicts between the ethical principle of privacy protection and the ethical principle of maximizing social benefits. In order to address these challenges, it is necessary first to weigh the fundamental ethical principles. The two basic principles of privacy protection and maximizing social benefits are not mutual antagonism but hierarchy, and this hierarchy should be based on the principle of practical feasibility. That is, applying biometric technology should first meet the principle of practical feasibility and, on this premise, realize the principle of maximizing social benefits based on not infringing on the principle of privacy protection.


La tecnología biométrica ha transformado las características biológicas humanas en una nueva forma de privacidad, y el uso indebido de esta tecnología plantea desafíos a su protección. En este artículo se define inicialmente la tecnología biométrica y las características biométricas; se demuestra además por qué las características biométricas pertenecen a la privacidad personal y cómo la tecnología biométrica plantea retos para su protección. Este artículo argumenta que la esencia de estos retos es el conflicto entre el principio ético de protección de la privacidad y el de maximización de los beneficios sociales. Para abordar estos retos es necesario sopesar primero los principios éticos fundamentales. Los dos principios básicos de protección de la privacidad y maximización de los beneficios sociales no son antagónicos, sino jerárquicos, y esta jerarquía debe basarse en el principio de viabilidad práctica. Es decir, la aplicación de la tecnología biométrica debe cumplir primero el principio de viabilidad práctica y, a partir de esta premisa, realizar el principio de maximización de los beneficios sociales sobre la base de no infringir el principio de protección de la intimidad.


A tecnologia biométrica transformou as características biológicas humanas em uma nova forma de privacidade, e o mal uso dessa tecnologia apresenta desafios para proteger essa nova privacidade. Esse artigo inicialmente define tecnologia biométrica e características biométricas, demonstrando posteriormente por que características biométricas pertencem à privacidade pessoal e como tecnologia biométrica coloca desafios à sua proteção. Através de análise, esse artigo discute que a essência desses desafios é o conflito entre o princípio ético da proteção da privacidade e o princípio ético de maximizar benefícios sociais. De forma a visar esses desafios é necessário primeiro ponderar os princípios éticos fundamentais. Os dois princípios básicos de proteção da privacidade e de maximizar benefícios sociais não são mutuamente antagônicos mas hierárquicos, e essa hierarquia deve ser baseada no princípio da viabilidade prática. Isso é, aplicar tecnologia biométrica deve primeiro atender ao princípio da viabilidade prática e, nessa premissa, compreender o princípio de maximizar benefícios sociais com base em não infringir o princípio de proteção da privacidade.

2.
Chinese Medical Ethics ; (6): 263-270, 2023.
Article in Chinese | WPRIM | ID: wpr-1005542

ABSTRACT

At present, China is still in the exploratory stage in the field of electronic informed consent (eIC), and relevant policies, regulations and application guidelines have not yet been established and improved. While the traditional informed consent supervision system is difficult to meet the needs of the innovative development of eIC, such as subject privacy and data security. Through sorting out and analyzing the legal norms and construction system of eIC supervision in Europe and the United States, combined with the current development status, problems, and challenges of eIC in China, this paper targeted proposed the path to construct the supervision of eIC in clinical research in China from the aspects of restricting the signing form and process of eIC, adjusting the ethical review paradigm of eIC, enhancing the strength of eIC ethical review, improving the construction of eIC legal system, and strengthening the training of relevant researchers.

3.
Chinese Medical Ethics ; (6): 193-199, 2023.
Article in Chinese | WPRIM | ID: wpr-1005531

ABSTRACT

At present, there are no laws and regulations, ethical standards, and regulatory requirements related to ethical review of case reports at home and abroad. Whether ethical review is required for case reports, there are different norms in different regions, countries and medical institutions, and the provisions of different journals at home and abroad are also inconsistent. Through the discussion on whether the publication of case reports needs ethical review and approval, this paper summarized the problems of privacy protection and informed consent existing in the publication of case reports, and proposed the key points of ethical review of case reports, including the scientific nature of case reports, patient privacy protection, informed consent and conflict of interest management, with a view to making case reports conform to ethical standards and promoting the development of medical science.

4.
Chinese Journal of Hospital Administration ; (12): 342-346, 2023.
Article in Chinese | WPRIM | ID: wpr-996086

ABSTRACT

Blockchain technology has the advantages of decentralization, secure sharing and tamper resistance, and high privacy, which can solve the current problem of sharing electronic medical records in medical institutions in China. A tertiary hospital established an electronic medical record sharing services convenience service platform based on blockchain in collaboration with China mobile gansu company in September 2021. The hardware architecture of the platform consisted of a hospital data warehouse, a local front-end computer and a blockchain platform. The functional architecture included platform front-end services, the blockchain electronic medical record archiving and service platform. The technical architecture included the underlying blockchain, service layer, interface layer and application layer, which was embedded with asymmetric encryption technology, hash algorithm, smart contract and other technical means, ensuring data ownership and on-demand, controllable, real-time and secure sharing of data. Since the operation of the platform in September 2021, as of October 2022, a tertiary hospital had accumulated 21 545 patient medical records on the chain. The overall operation of the platform was smooth, achieving reliable storage and secure sharing of patient electronic medical records, providing reference for further promoting the interconnection trusted sharing of electronic medical records in medical institutions in China.

5.
Chinese Journal of Hospital Administration ; (12): 217-221, 2022.
Article in Chinese | WPRIM | ID: wpr-958761

ABSTRACT

Under the background of " Internet+ medical treatment" and the continuous deepening of face recognition technology research, the face recognition industry has continued to mature, and face recognition has been initially applied in medical fields such as hospital management, auxiliary medical care, and epidemic prevention and control. At the same time, face recognition technology brings problems including error risk, technical cracking risk, privacy risk, equality risk, abuse risk, and other issues in practice, which seriously threaten the personal and property rights and interests of the public. On the basis of summarizing the specific application direction of face recognition technology in hospitals, the authors sorted out the legal regulation of face recognition in China, and proposed that it should be based on technology research and development, strengthen the " gatekeeper" responsibility of medical institutions, improve legal system and recommendations for strengthening judicial leadership in order to improve the legal regulations of face recognition technology, reduce the risk of infringement by medical institutions in the application of face recognition technology, and protect the legitimate rights and interests of citizens.

6.
Chinese Journal of Medical Science Research Management ; (4): 237-240, 2022.
Article in Chinese | WPRIM | ID: wpr-958674

ABSTRACT

Objective:To analyze data safety problem raised from personal medical data sharing and privacy protection, provide suggestions for improving its application and development.Methods:The personal medical data sharing and privacy protection measures were discussed according to the study of related literatures, typical case analysis, analyzing the current situation and its development trend of legislation status of personal medical data sharing and privacy protection.Results:Medical data is one kind of personal data, but more sensitive than other personal data. The country should strengthen relevant legislation, more clearly define relevant concepts, establish the authority and scope of personal medical data processing, improve the effectiveness and operability of laws, maximize the public interest of data, and ensure the balance between the personal data processing and privacy security.Conclusions:The personal medical data sharing and privacy protection is a systematic project. The solution of the personal security risks is also based on a comprehensive safeguard system which including laws, regulations, management and technology.

7.
Shanghai Journal of Preventive Medicine ; (12): 438-441, 2021.
Article in Chinese | WPRIM | ID: wpr-881482

ABSTRACT

Objective:To assess the current situation of information security literacy, and determine its factors. Methods:Literature review and Delphi method were used to design a questionnaire on information security literacy. All users of disease control information system in Jinshan District,Shanghai were investigated. The questionnaire included information security related knowledge, awareness, role cognition, and behavior. Results:The overall proportion of information security literacy was determined to be 7.98%. Information security knowledge, awareness, role cognition, and behavior was identified in 17.18%, 37.42%, 62.58%, and 38.04% of the users, respectively. Sex, age and type of information system account were associated with the information security literacy. Conclusion:Information security literacy remains low in Jinshan District, which may not meet the current requirement in work. Particularly, information security behavior is at risk, which warrants further improvement in the information security management.

8.
Chinese Journal of Medical Science Research Management ; (4): E011-E011, 2020.
Article in Chinese | WPRIM | ID: wpr-811537

ABSTRACT

Objective@#The outbreak of novel coronavirus raised many problems in the auxiliary information system of epidemic prevention and control, which including the need to prevent key data from being illegal modification, traceability, lack of decision support systems at different levels, barriers to cross regional cooperation and low automation of case diagnosis.@*Methods@#In this paper, artificial intelligence, security computing supporting privacy protection, block chain and other emerging technologies are introduced into the epidemic prevention and control auxiliary information system.@*Results@#This paper discusses how to utilize modern cryptography and block chain technology to establish a traceability system that could assure the security of epidemic information; design a distributed decision support system; solve the privacy-preserving problems of Federated Learning based on SGX technology, and present a group architecture to alleviate the performance cost of SGX.@*Conclusions@#The schemes above can help to achieve the security and traceability of epidemic information, also improve the automation and decision-making efficiency of the auxiliary information system for epidemic prevention and control.

9.
Chinese Medical Ethics ; (6): 335-339, 2019.
Article in Chinese | WPRIM | ID: wpr-744929

ABSTRACT

At present, the development of biobank in China is still at the initial stage, and there are many problems, such as lack of scientific management and sharing mechanism, insufficient application of transformation and weak sustainable development. Through constructing the ethical challenge of biobank, the author draw out the rights protection claims of biological sample sources, such as the informed consent of samples source and the privacy protection of samples management. In order to achieve the balance between the protection and sharing of biobank construction, we should improve the awareness of privacy protection, take effective means of privacy protection and fully consider and foresee ethical issues after rapid development of technology. Finally, it is pointed out that the principle of public welfare, the principle of fairness in the distribution of results and the predictive principle should be reflected in the transformation of results.

10.
Chinese Critical Care Medicine ; (12): 225-227, 2019.
Article in Chinese | WPRIM | ID: wpr-744702

ABSTRACT

On?the?premise?of?fully?studying?the?disaster?medical?rescue?monitoring?mechanism?in?emergencies?at?home?and?abroad,?the?functional?requirements?of?the?domestic?disaster?medical?rescue?monitoring?system?was?analyzed?in?this?paper,?the?logical?framework?and?data?structure?of?disaster?medical?rescue?monitoring?system?with?privacy?protection?mechanism?was?designed?by?department?of?emergency?in?Chinese?PLA?General?Hospital,?department?of?information?management?in?School?of?Economics?and?Management?of?Beijing?Jiaotong?University,?the?School?of?Information?Management?of?Nanjing?University.?Three?major?functional?modules?were?realized?in?the?system:?reporter?information?management,?disaster?medical?rescue?data?upload,?and?disaster?medical?rescue?data?search.?Android?client?and?Web?client?were?developed?for?easy?access?to?the?system.?The?system?also?had?the?function?of?privacy?protection.?Based?on?symmetric?searchable?encryption?algorithm,?the?system?realized?the?encryption?storage?of?untrusted?servers?and?ensured?the?security?of?medical?and?health?data.?It?is?beneficial?for?the?further?development?and?improvement?of?disaster?medical?rescue?data?collection?in?China.

11.
Journal of Medical Informatics ; (12): 2-5, 2019.
Article in Chinese | WPRIM | ID: wpr-815594

ABSTRACT

@#The paper, by taking genetic data as an example, conducts a comprehensive analysis on the challenges confronting the privacy of healthcare big data, discusses the protection strategies of private data from such aspects of analysis on alliance data, homomorphic encryption, hardware encryption and differential privacy. It also elaborates on the building of laws related to data security and privacy protection, and provides references for relevant study.

12.
Chinese Medical Ethics ; (6): 60-64, 2018.
Article in Chinese | WPRIM | ID: wpr-706043

ABSTRACT

First of all,this paper summarized the new features of privacy in the context of biometrics identifica-tion,namely the permanence of biometric information,the concealment of biometric information infringement,and the disclosure to medical information. Secondly,this paper analyzed the challenges faced by privacy protection from three aspects of database security,function creep and informatization of the body. Finally,from the perspective of ethics,this paper put forward some management suggestions for the privacy protection problems brought by the ap-plications of biometric identification technology.

13.
Chinese Journal of Hospital Administration ; (12): 60-63, 2018.
Article in Chinese | WPRIM | ID: wpr-665867

ABSTRACT

Objective To learn the situation of medical information privacy protection of a hospital and patient′s privacy demand for different medical information .Methods A 300-questionnaire survey was conducted at a tertiary hospital in Shanghai in April 2017 .The data were subject to descriptive analysis .Results The patients were generally satisfied with the hospital′s medical information privacy protection ,as 71% of them (213/300)were satisfied ,and 13% (39/300)of them experienced privacy exposure.Patients were most concerned with medical information from which others could identify them .Conclusions The State should promulgate rules and regulations for the protection of medical information privacy as soon as possible ;information technology need to be adopted to encrypt identifiable information ;a system of norms that can be followed need to be developed for the use of medical information ;hospitals should build a patient′s privacy protection system to comprehensively protect the privacy of patients .

14.
Chinese Journal of Medical Science Research Management ; (4): 3-7,11, 2018.
Article in Chinese | WPRIM | ID: wpr-712236

ABSTRACT

Objective Precision medical research is highly depended on the collection and analysis of big data from the new generation of life science.These data will inevitably contain a lot of sensitive information relating to individual privacy.This paper mainly investigates how to effectively integrate and share big data under the premise of protecting the privacy of participants and patients.Methods The international policies on precision medical big data and privacy protection were briefly summarized and analyzed.The establishment of the privacy protection system on big data in precision medical research was also explored,mainly from the aspects of technology research and development,ethical norms and policy construction.Results Several suggestions and strategies were put forward for the development of big data privacy protection system,including construction of ethical norms and policies,development of big data privacy protection technology,privacy protection education of participants and patients,fully transparent informed consent and some other related strategies.Conclusions These suggested strategies on the establishment of big data privacy protection system will provide references for promoting the establishment of related policies and regulations in our country.And this privacy protection system will certainly protect and promote the long-term healthy development of precision medicine.

15.
World Science and Technology-Modernization of Traditional Chinese Medicine ; (12): 114-119, 2017.
Article in Chinese | WPRIM | ID: wpr-513103

ABSTRACT

With the rapid development of network technology,the data sharing and health research provides an efficient and convenient way for medical research and clinical guidance.In order to know patients' opinions on informed consent and data sharing,we investigated first-class hospitals in the coastal and inland areas with a total of 397 patients participating the questionnaire on clinical health and data sharing,reusing the remaining clinical blood samples in scientific researches,and the acceptance degree of broad consent investigation and related influencing factors.It was found that patients with strong consciousness of informed consent right tended to choose a simpler way of informed consent based on the analysis.Patients preferred social benefits than personal benefits with a strong spirit of dedication to the community.Medical institutions in China rarely applied broad consents and took relervant summative researhes,compared with the European and American countries' promotions at the national level.The research afforded the evidence,from most of patients' point of view to ethics committee in the review of such kind of studies to understand the public data sharing in privacy protection and broad consent of the individual opinion,in order to facilitate the rational development and promotion of health data sharing in China ethically.

16.
Journal of Medical Informatics ; (12): 43-47, 2017.
Article in Chinese | WPRIM | ID: wpr-700713

ABSTRACT

Based on current data security problems existing in medical big data platform,the paper starts from security situation first,analyzing the key points,difficulties and common protection measures of security guarantee of domestic medical big data.Combining with the medical big data platform practice implemented by Southwest Hospital,it puts forward security strategy for data security of current medical big data platform,including management security,decryption security,storage security,network security,etc.

17.
Chinese Medical Equipment Journal ; (6): 11-15, 2017.
Article in Chinese | WPRIM | ID: wpr-699887

ABSTRACT

Objective To propose a hybrid encryption algorithm involving in elliptic curve cryptography (ECC) and advanced encryption standard (AES) to solve the problems of wiretapping and tampering of medical data in wireless channel transmission.Methods The sender used AES session key for medical data encryption and ECC public key for AES session key,and applied SHA-1 to obtaining the information summary of medical data and ECC public key to gaining information summary signature.The recipient employed ECC private key to verify the signature and then to decrypt AES session key,and finally decrypt medical data with AES session key.Results The proposed security solution gained advantages over the conventional ECC algorithm and hybrid cryptographic algorithm of RSA and AES in encryption and decryption time,safety strength and energy consumption,so that the confidentiality and integrity of medical data could be ensured during transmission.Conclusion The hybrid encryption scheme can meet the requirement of wireless medical sensor network in low time complexity,and realizes the protection of the patient data and privacy.

18.
Chinese Journal of Medical Library and Information Science ; (12): 15-20, 2017.
Article in Chinese | WPRIM | ID: wpr-712429

ABSTRACT

The problems in data collection, data management and data security of healthcare wearable devices were summarized and analyzed with measures proposed for the solution of these problems and for speeding up the sustainable development of healthcare wearable devices from the aspects of technologies, management and laws, such as using multiple data coding technologies, establishing hierarchical data management and control model, adding remote control functions, investigating the responsibility for use of their data, working out law systems for protecting personal healthcare data,beefing up popularization of privacy data protection.

19.
Chinese Medical Ethics ; (6): 723-728, 2017.
Article in Chinese | WPRIM | ID: wpr-609013

ABSTRACT

This paper summarized the problems of medical informationization from the perspective of ethics.While medical informationization brings about the benefits of the enhancement of information mobility and interac-tion,its negative impacts also cause the indifference of doctor-patient relationship and the leakage of privacy infor-mation.At the same time,to ensure real and effective information data is the basis for the development of informa-tionization.Finally,this paper put forward to save time using informationization,to improve the doctor-patient re-lationship with the advantages of convenient communication,to protect patients' privacy through information super-vision and encryption,and to establish data quality standards.

20.
Chinese Journal of Medical Library and Information Science ; (12): 13-17, 2016.
Article in Chinese | WPRIM | ID: wpr-497433

ABSTRACT

Objective To put forward suggestions for individuals, hospitals and medical insurance institutions in protecting medical insurance information privacy by investigating the protection of individual medical insurance pri-vacy and cognition of information sharing. Methods The need of 200 insurants for protecting their medical insur-ance information privacy was investigated with questionnaires. Results The insurants were of certain awareness in protecting their medical insurance information privacy, and believed that hospitals and medical insurance institu-tions would take measures to protect their medical insurance information privacy. However, they would not like to share their medical insurance information because they were afraid of letting them out. The awareness in protecting medical insurance information privacy and sharing medical insurance information was different in the insurants en-gaged in different works with different levels of education. Conclusion The risk of letting medical insurance infor-mation out is existed in certain hospitals and medical insurance institutions due to the problems in the management of their medical insurance information system.

SELECTION OF CITATIONS
SEARCH DETAIL