• Title/Summary/Keyword: 의료정보보호법

Search Result 24, Processing Time 0.025 seconds

A Study on Awareness Levels of Personal Information Protection in Health Care Workers (개인정보 보호에 대한 의료기관 종사자들의 인식수준에 관한 연구)

  • Hong, Ju-Youn;Kim, Hwan-Hui
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.8
    • /
    • pp.647-659
    • /
    • 2019
  • The purpose of this study was to examine the relationship between the awareness of health care workers on the protection of patient health information and their practice of it in an attempt to provide some information on the policy setting of health care institutions about medical information protection. As a result, the awareness of the health care workers on the protection of patient health information and their practice of it were both the best in the communication area, followed by the patient health information management area and the area of direct contact with health information. As for the variables linked to their awareness and practice of patient health information protection, the type of the health care institutions, job satisfaction, religion and the departments in which they worked were significantly related. To determine what factors affected the patient health information management area, a multiple regression analysis was carried out by selecting the area of direct contact with patient health information and the communication area as independent variables and by selecting the patient health information management area as a dependent variable. And it's found that the patient health information management area became better when the area of direct contact with the information and the communication area were better.

Study for the Pseudonymization Technique of Medical Image Data (의료 이미지 데이터의 비식별화 방안에 관한 연구)

  • Baek, Jongil;Song, Kyoungtaek;Choi, Wonkyun;Yu, Khiguen;Lee, Pilwoo;In, Hanjin;Kim, Cheoljung;Yeo, Kwangsoo;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.6
    • /
    • pp.103-110
    • /
    • 2016
  • The recent frequent cases of damage due to leakage of medical data and the privacy of medical patients is increasing day by day. The government says the Privacy Rule regulations established for these victims, such as prevention. Medical data guidelines can be seen 'national medical privacy guidelines' is only released. When replacing the image data between the institutions it has been included in the image file (JPG, JPEG, TIFF) there is exchange of data in common formats such as being made when the file is leaked to an external file there is a risk that the exposure key identification information of the patient. This medial image file has no protection such as encryption, This this paper, introduces a masking technique using a mosaic technique encrypting the image file contains the application to optical character recognition techniques. We propose pseudonymization technique of personal information in the image data.

Image analysis method and system for multi-center Medical bigdata research (다기관 의료 빅데이터 연구를 위한 영상 분석 방법 및 시스템)

  • Kim, Seung-Jin;Jeong, Chang-Won;Kim, Tae-Hoon;Jun, Hong Yong;No, Si-Hyeong;Kim, Ji-Eon;Lee, Yun Oh;Yoon, Kwon-Ha
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.428-429
    • /
    • 2018
  • 본 논문에서는 다기관 의료영상 분석 방법 및 시스템을 제안한다. 다기관 연구에 참여하는 기관에게 분석 가이드 및 분석 프로그램을 제공하여 표준화된 영상분석 연구를 지원하고자 한다. 이를 위해 동일한 프로토콜로 표준화된 영상을 획득 및 분석하고 결과를 공유하는 분산형 연구방법을 제시한다. 제안하는 시스템은 개인정보보호법 및 보안문제가 강조되고 있는 의료현장에 적합한 시스템으로 다양한 다기관 의료 빅데이터 분석 연구에 활용될 것으로 기대된다.

A Study on an Efficient and Robust Differential Privacy Scheme Using a Tag Field in Medical Environment

  • Kim, Soon-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.109-117
    • /
    • 2019
  • Recently, the invasion of privacy in medical information has been issued following the interest in the secondary use of mass medical information. The mass medical information is very useful information that can be used in various fields such as disease research and prevention. However, due to privacy laws such as the Privacy Act and Medical Law, this information, including patients' or health professionals' personal information, is difficult to utilize as a secondary use of mass information. To do these problem, various methods such as k-anonymity, l-diversity and differential-privacy that can be utilized while protecting privacy have been developed and utilized in this field. In this paper, we discuss the differential privacy processing of the various methods that have been studied so far, and discuss the problems of differential privacy using Laplace noise and the previously proposed differential privacy. Finally, we propose a new scheme to solve the existing problem by adding a 1-bit status field to the last column of a given data set to confirm the response to queries from analysts.

Legal Issues To Be Considered Before Implementing Telehealth in South Korea (원격진료 실시에 수반되는 법적 쟁점들에 대한 고찰)

  • Lee, Won Bok
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.1
    • /
    • pp.57-90
    • /
    • 2021
  • Telehealth has been a hotly debated health policy issue in South Korea, mostly because the medical community - especially primary care practitioners - have strongly opposed it. As a result, telehealth has remained forbidden under law. However, the temporary permission of telehealth in Korea, as well as its exploding use in other countries, all in response to COVID-19, is re-igniting the discussion on telehealth in Korea. This article explores general legal issues that may arise if and when telehealth is fully implemented in Korea. The article's analysis shows that legislative changes are necessary to allow reimbursement of telehealth as well as remote purchase of medicine. The article also advocates introducing new evidentiary rules to curtail covert recording of telehealth sessions. On the other hand, additional legislation is probably not necessary to address the medical liability of physicians practicing telehealth or to adress much-discussed privacy issues. The existing laws in those domains are already robust enough to operate without much difficulty in the context of telehealth too.

개인정보보호 참조 아키텍처와 국제표준화 동향

  • Shin, Yong-Nyuo;Kim, Hak-Il;Chun, Myung-Geun
    • Review of KIISC
    • /
    • v.21 no.5
    • /
    • pp.12-20
    • /
    • 2011
  • 개인정보보호법이 전면적인 법 시행을 앞두고 있고 지금까지 규제대상이 아니던 기업 종업원의 개인정보는 물론, 종이 문서형태의 개인정보까지를 규제대상으로 삼고 있어 개인정보보호 시장이 크게 확대될 것으로 전망된다. 규제범위도 정보통신, 교육, 의료, 금융 분야까지 다루고 있어서, 정부/공공기관 및 민간기업의 철저한 사전준비가 필요한 시점이다. 개인의 프라이버시 보호에 대한 이러한 발전추세에는 국내외 표준화가구를 통한 활발한 표준화작업이 밑바탕이 되고 있으며, 특히 미국, 영국, 독일, 일본, 한국 등의 나라를 중심으로 국제표준화를 활발히 추진하고 있다[1]. 표준화의 분야에는 개체의 신분확인을 위한 표준, 개인식별정보와 바이오인식 정보가 같이 사용되는 상황에서 이들의 바이오인식 프라이버시 및 보안요구조건을 위한 표준, 프라이버시 프레임워크, 프레임워크 기반 구현을 위한 프라이버시 레퍼런스 아키텍쳐 등 다양한 표준화 분야가 있다. 본 논문에서는 프라이버시 표준화를 위한 국외 표준화 동향을 소개하고, 향후 추진해야할 중점 표준화 항목을 도출한다.

Designing web based medical learning system structure (웹 기반의 의료학습 시스템 구조 설계)

  • Kang, Dong-hyeob;Lee, Im-geun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.224-226
    • /
    • 2019
  • Currently, medical data is basically confidential and difficult to access because it is protected under the Medical Protection Act. For the practical education of the students who are in the process of education, the researcher or the faculty members create and upload simulated data (chart of the question bank) close to the actual data. In this paper, the maintenance and repair easier on the basis of node.js and Ajax, mysql, jquery to a web-based research and enables users to easily approach the problem of the chart and the easy to the difficult access to patient contact respectively.

  • PDF

Legal Issues in Protecting and Utilitizing Medical Data in United States - Focused on HIPAA/HITECH, 21st Century Cures Act, Common Law, Guidance - (미국의 보건의료데이터 보호 및 활용을 위한 주요 법적 쟁점 -미국 HIPAA/HITECH, 21세기 치료법, 공통규칙, 민간 가이드라인을 중심으로-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.4
    • /
    • pp.117-157
    • /
    • 2021
  • This research reviewed the HIPAA/HITECH, 21st Century Cures Act, Common Law, and private Guidances from the perspectives in protecting and utilitizing the medical data, while implications were followed. First, the standards for protection and utilization are relatively clearly regulated through single law on personal medical information in the United States. The HIPAA has been introduced in 1996 as fundamental act on protection of medical data. Medical data was divided into personally identifiable information, non-identifying information, and limited dataset under HIPAA. Regulations on de-identification measures for medical information, objects for deletion of limited data sets, and agreement on prohibition of data re-identification were stipulated. Moreover, in the 21st Century Cures Act regulated mutual compatibility for data sharing, prohibition of data blocking, and strengthening of accessibility of data subjects. Common Law introduced comprehensive consent system and clearly stipulates procedures. Second, the regulatory system is relatively simplified and clearly stipulated in the United States. To be specific, the expert consensus and the safe harbor system were introduced as an anonymity measure for identifiable medical information, which clearly defines the process while increasing trust. Third, the protection of the rights of the data subject is specified, the duty of explanation is specified in detail, while the information right of the consumer (opt-out procedure) for identification information is specified. For instance, the HHS rule and FDA regulations recognize the comprehensive consent system for human research, but the consent procedure, method, and requirements are stipulated through the common rule. Fourth, in the case of the United States, a trust-based system is being used throughout the health and medical data legislation. To be specific, Limited Data Sets are allowed to use in condition to the researcher's agreement to prohibit re-identification, and de-identification or consent process is simplified under the system.

A Study on the Medical Application and Personal Information Protection of Generative AI (생성형 AI의 의료적 활용과 개인정보보호)

  • Lee, Sookyoung
    • The Korean Society of Law and Medicine
    • /
    • v.24 no.4
    • /
    • pp.67-101
    • /
    • 2023
  • The utilization of generative AI in the medical field is also being rapidly researched. Access to vast data sets reduces the time and energy spent in selecting information. However, as the effort put into content creation decreases, there is a greater likelihood of associated issues arising. For example, with generative AI, users must discern the accuracy of results themselves, as these AIs learn from data within a set period and generate outcomes. While the answers may appear plausible, their sources are often unclear, making it challenging to determine their veracity. Additionally, the possibility of presenting results from a biased or distorted perspective cannot be discounted at present on ethical grounds. Despite these concerns, the field of generative AI is continually advancing, with an increasing number of users leveraging it in various sectors, including biomedical and life sciences. This raises important legal considerations regarding who bears responsibility and to what extent for any damages caused by these high-performance AI algorithms. A general overview of issues with generative AI includes those discussed above, but another perspective arises from its fundamental nature as a large-scale language model ('LLM') AI. There is a civil law concern regarding "the memorization of training data within artificial neural networks and its subsequent reproduction". Medical data, by nature, often reflects personal characteristics of patients, potentially leading to issues such as the regeneration of personal information. The extensive application of generative AI in scenarios beyond traditional AI brings forth the possibility of legal challenges that cannot be ignored. Upon examining the technical characteristics of generative AI and focusing on legal issues, especially concerning the protection of personal information, it's evident that current laws regarding personal information protection, particularly in the context of health and medical data utilization, are inadequate. These laws provide processes for anonymizing and de-identification, specific personal information but fall short when generative AI is applied as software in medical devices. To address the functionalities of generative AI in clinical software, a reevaluation and adjustment of existing laws for the protection of personal information are imperative.

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.