| Literature DB >> 35733982 |
Nan Liu1, Shiyong Chen2.
Abstract
With the application of big data technology in the medical field, personal health information is experiencing unprecedented challenges while showing great value. Opportunities and risks are like two sides of the same coin, and the rapid development of science and technology has not only brought valuable opportunities, but also made modern society seem to have developed into a risk society. Although countries around the world are committed to promoting the development and application of medical data and pay great attention to the protection of personal health information, the risk attributes of personal health information have rarely been mentioned before. This article first introduces the origin and development of medical big data, paving the way for the special risks faced by personal health information in this context. Then, through the introduction of concepts and characteristics, the content of personal health information is accurately defined. Next, according to a large number of personal health information security incidents, the new semantic scope of personal health information risk in the medical big data environment is analyzed, the necessity of personal health information risk regulation is emphasized, and the value conflicts that may occur in the process of personal health information risk regulation are clarified, laying the groundwork for the establishment of the risk decision-making procedure in the following article.Entities:
Mesh:
Year: 2022 PMID: 35733982 PMCID: PMC9208985 DOI: 10.1155/2022/2314468
Source DB: PubMed Journal: J Environ Public Health ISSN: 1687-9805
Figure 1Features of big data.
Figure 2Typical Internet health service model.
Figure 3The whole process of residents seeking medical treatment.
Figure 4Privacy of personal information data in the field of health care.
Figure 5Personal health information collection of smart wearable devices.
Figure 6Personal health analysis based on user portrait technology.
Regulations and systems for the protection of personal health information of medical big data.
| Type | Content |
|---|---|
| Law | Article 111 of the Civil Code of the People's Republic of China |
| Article 62 of Chapter 7 of the Law of the People's Republic of China on Authorized Responsibilities | |
| One of Chapter 253 of the Criminal Law of the People's Republic of China | |
| Chapter 1, Article 4 of the Mental Health Law of the People's Republic of China | |
| Article 42, Paragraph 6, of the Law of the People's Republic of China on Administrative Penalties for Public Security | |
| Article 34 of the Maternal and Child Health Care Law of the People's Republic of China | |
| Article 23, Paragraph 3 of the Medical Doctor Law of the People's Republic of China (effective as of March 1, 2022) Article 12 of the Law of the People's Republic of China on the Prevention and Control of Infectious Diseases | |
| Article 22 of the Cybersecurity Law of the People's Republic of China | |
| Article 38 of the Data Security Law of the People's Republic of China | |
|
| |
| Administrative regulations | Article 39 of the Regulations on AIDS Prevention and Control |
|
| |
| Ministerial regulations | Regulations on the Administration of Medical Records in Medical Institutions (2013 Edition) |
| Standard for the Application and Management of Electronic Medical Records (trial) | |
| National measures for the management of big data standards, safety and services of health care (trial) measures on the management of population health information | |
| Technical Guide for the Construction of Telemedicine Information System | |
| “The technology of data management in Linwei test is in southern China)” | |
|
| |
| National standard | Code for Personal Information Security of Information Security Technology |
| Health Informatics Guidelines for Data Protection for the Cross-border Flow of Personal Health Information Information Security Technology Personal Information Security Impact Assessment Guide) | |
| (“Information Security Technology data fill out Security Assessment Zhainan (Grass Room)”) | |
| “Information security technology personal information de-identification Zhainan” | |
| “Information Security Technology, Health and Medical Information Security in South China” | |
|
| |
| Guiding document | “outline of” healthy China 2030″ Plan |
| “guiding opinions on promoting and standardizing the Application and Development of big data in Health Medical Care” on promoting the Development of Internet + ‘s Medical Health | |
Figure 7The privacy protection model of medical big data in the whole life cycle.