Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL
Help

Conclusion > Conclusion - Pg. 42

Privacy and Security in e-Health Applications infrastructure, i.e. compliant clients and trusted modules that make piracy too difficult for most consumers. Commercial DRM systems include Apple FairPlay, Microsoft Media DRM (in each Windows Media Player), Open Mobile Alliance DRM for mobile phones, and Marlin DRM for consumer electronics. Digital Rights Management technology extends to information management in enterprises where it is called Information/En- terprise Rights Management. There, conceptually the same technology solves the regulatory require- ments defined by HIPAA or Sarbannes-Oxley laws. For example, the author can specify a set of rules on how a document (or parts of it) may be used by whom and bind this to the document (e.g. a policy can be that a specific user can view the document with a password but not print it). Commercial IRM/ERM systems, which include Microsoft Rights Management System (MS RMS), Adobe LiveCycle Rights Management and Oracle compliant client enforces these rights. In a similar way, healthcare documents can be protected by applying the digital rights management technology which has been recently proposed in (Petkovic, 2007; Sheppard 2009). CONCLUSION Throughout this chapter we were focused on se- curity and privacy issues of e-Health applications. We gave an overview of digital health records such as Electronic Health Records (EHR) and Personal Health Records (PHR) and described their purposes: to serve healthcare providers and to empower the patient. Next we made an over- view of the privacy and security requirements of digital health records such as data availability, data confidentiality, data integrity, accountabil- ity, anonymity, and user awareness. Finally, we