SlideShare a Scribd company logo
1 of 29
Security and ethical issues of
mobile device technology
Erik Ranschaert, MD, PhD
Vice-president EUSOMII
Disclosure
• No conflicts of interest
2© E R Ranschaert, ECR 2017
Introduction
• After this lecture you should know about:
1. The secure use of mobile devices in
medicine and radiology
2. The ethical issues involved in using mobile
devices for medical purposes
© E R Ranschaert, ECR 2017 3
HCPs and Mobile Devices
• Healthcare Professionals are
globally rapidly adapting to
mobile technology.
• Smartphones and tablets
are regarded as “the most
popular technological
development for providers
since the invention of the
stethoscope”.
© E R Ranschaert, ECR 2017 4
Source: “The road to telehealth 2.0 is mobile”,
http://www.telenor.com/media/in-focus/the-socio-economic-
impact-of-mhealth
HCPs Mobile Technology Policies
© E R Ranschaert, ECR 2017 5
2015 HIMSS Mobile Technology Survey
• 2015 HIMSS Mobile Technology
Survey
– Only 57 % of HCPs’ organizations
has a mobile technology policy.
– Mobile device security is
indicated as a key component of
current and future mobile
technology policies.
Mobile Operating Systems
• 5 out of 6 new phones are
running Android
• 1 in 7 are running iOS
• Mobile devices contain
valuable personal
information
• Smartphones become
increasingly attractive to
criminals*
© E R Ranschaert, ECR 2017 6
*Symantic Internet Security Threat Report 2016
What’s in it for radiologists?
© E R Ranschaert, ECR 2017 7http://www.acr.org/Advocacy/Informatics/IT-Reference-Guide
• Radiology is on the leading front of the medical
field’s adoption of mobile technologies
• Primary purpose of mobile devices is to trade the
traditional desktop displays for a more compact
display, to be used only occasionally while on the
go.
Mobile devices in radiology
Devices
• Smartphones and tablets
– High res graphical displays:
1920 x 1080 pixels
– Pixel sizes smaller than what
human retina can resolve
– Displays can surpass resolution of
many PACS monitors
• Hardware and dedicated radiology
reviewing apps allow radiologists to
incorporate them into their
workflow
Operating Systems
• Apple iOS
– Runs only on hardware designed
by Apple
• Google Android (≈ Linux)
Some features of open source SW, no
full access to code
• Many common (security) features
© E R Ranschaert, ECR 2017 8
Security risks
• Mobile devices = vulnerable to
loss/theft
• Patient-related data might be
stored on device
• Public cloud apps (social media
etc.) for storing & sharing of
medical data
– These apps/platforms are NOT
designed for MEDICAL purposes
– Patient privacy is not sufficiently
protected
© E R Ranschaert, ECR 2017 9
McEntee et al: 5 April 2012; Proc. of SPIE Vol. 8318
DOI: 10.1117/12.913754
RANSOM Survey
• RANSOM survey
• March - May 2015
• 516 radiologists
© E R Ranschaert, ECR 2017 10
J Digit Imaging. 2016 Aug;29(4):443-9. doi: 10.1007/s10278-016-9865-1.
Radiologists' Usage of Social Media: Results of the RANSOM Survey.
Ranschaert ER1, Van Ooijen PM2, McGinty GB3, Parizel PM4.
Major concerns in survey
Insufficient legislation, guidelines and policies for SoMe in healthcare 75%
Risk for privacy of the patients 39%
Risk for privacy of radiologists 39%
Insufficient knowledge about social media among radiologists 37%
Distraction from clinical activities 28%
Deprivation from real social contact with others 18%
Danger of negative comments on our practice 13%
© E R Ranschaert, ECR 2017 11
Security issues
1. Device-based
– passcode access, encryption, remote wiping, viruses,
malware
2. Software-based
– wireless security, application availability, enterprise
security
Security measures to protect patient information
are of critical importance.
© E R Ranschaert, ECR 2017 12
Device-based security
Access to the device
• Multiple security options
• 4-digit code
• HIPAA and other best-practice guidelines
require more complex passcodes:
– More digits/symbols
– Configurable tracing pattern
– Biometric access
• Stolen devices: remote tracking, reset
passcodes, data erasure etc.
Local Encryption
• Data stored on electronic HD (flash RAM)
• Physical access possible
• Content mostly not protected
• iOS + Android support encryption of data
• Stored personal health information should
be encrypted
• Encryption also protects data from
malware or viruses
• Apps should run in “virtual sandbox”
© E R Ranschaert, ECR 2017 13
EDPS Guidelines: https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/Supervision/Guidelines/15-12-17_Mobile_devices_EN.pdf
Sandboxing
• Sandbox is security
mechanism for separating
running programs
• Uses “scratch space” on disk
and memory
• To execute
untested/untrusted programs
without risking harm to host
device or OS
• Other apps can’t steal info
© E R Ranschaert, ECR 2017 14
Software-based security
Apple iOS
• Stringent control over app
store and OS
=> less threats than Android
• Not immune for malware
• Non-jailbroken device is
much more difficult to
compromise
Google Android
• Much more mobile malware
than iOS
– Larger market share
– Greater openness of Android,
multiple distribution methods
of apps
• Increase in volume of attacks
– 230% increase (2015)
– More “stealthy”
*Symantic Internet Security Threat Report 2016
© E R Ranschaert, ECR 2017 15
Enterprise IT-security
•The BYOD concept brings unique security challenges for institutional
IT depts.
•Most hospitals tolerate these devices, provided that they adhere to
institutional security policies.
BYOD
Bring Your Own Device
•The existing security features in iOS and Android should be
implemented
•Institutional security policies for mobile devices should be enforced
•Third-party mobile device management tools for monitoring and
detection of malicious behavior of apps should be used.
Mobile device
management
© E R Ranschaert, ECR 2017 16
Messaging Apps
E. R. Ranschaert, EUSOMII Valencia, 2016
WhatsApp from radiologist
• “I got this picture of an angiogram at 11 PM
from another radiologist. The patient was in
coma, almost dead.”
• “He wanted to know what this structure on the
angiogram is. I’m specialised in cerebral stroke
and could see that it was a thrombosis of the
basilar artery with a rare anatomic variant.”
• “I could explain the colleague how to deal with
this abnormality so the patient could be treated
quickly. The patient woke up after treatment and
could go home.”
E. R. Ranschaert, EUSOMII Valencia, 2016
Croonen H. Veilig whatsappen een must voor dokters.
Med Contact 2015(48):2312-5.
News 24 Feb. 2016
• Dutch DPA : “WhatsApp does
not meet the standards for
sharing medical data.”
• The individual doctor and/or
institution may receive a fine
for breaching protection of
personal data
• Medical doctors should find
alternative solutions
© E R Ranschaert, ECR 2017 19
http://linkis.com/medischcontact.nl/oRWkJ
Dedicated apps
© E R Ranschaert, ECR 2017 20
Secure and dedicated alternatives are being tested in Dutch hospitals
Secure file transfer
State of the art encryption
Secure authentication
Figure 1: patient privacy
• Patients' faces are automatically
obscured
• Users must manually block
identifying marks (e.g. tattoos).
• Each picture is reviewed by
moderators before storage in data
base
© E R Ranschaert, ECR 2017 21
Ethical concerns
1. Security and Privacy are ETHICAL issues
2. Main ethical concern = hacking of mobile
devices
3. Patient-centred principle: do not harm
patients
4. Ethical guidance can prevent all risks.
5. Guidelines need to be re(de)fined
© E R Ranschaert, ECR 2017 22
Golden Rule
“If you would like to discuss a patient case via
social media,
then the patient should thereby remain
anonymous
or the patient must have given explicit consent.”
© E R Ranschaert, ECR 2017 23
Hooghiemstra TF, Nouwt S. Een juridische blik op trends in e-Health. Ned Tijdschr Geneeskd 2014;158:A8423.
What should radiologists use?
• “It’s the responsibility
of the radiologist to
securely and
effectively utilize
mobile technology in
the best interests of
patient care.”
© E R Ranschaert, ECR 2017 24
http://www.acr.org/Advocacy/Informatics/IT-Reference-Guide
How secure are radiology data?
© E R Ranschaert, ECR 2017 25
Security study of DICOM servers
• 2744 Unprotected DICOM servers
• 719 Completely open to communication with patient data
• Downloading of pt data was theoretically possible and easy
• Geographic differences in lack of DICOM server security:
– Iran: 34/40 (85%)
– Thailand: 10/14 (71%)
– Spain: 11/23 (48%)
– Argentina: 6/13 (46%)
– Russia: 8/18 (44%)
– Germany: 9/22 (41%)
– USA: 346/1335 (26%)
26
Stites, M., & Pianykh, O. S. (2016). How Secure Is Your Radiology Department? Mapping Digital Radiology Adoption and Security Worldwide. American Journal of
Roentgenology, 206(4), 797–804. http://doi.org/10.2214/AJR.15.15283
European legislation
• Protection of natural
persons with regard to
processing of personal data
by competent authorities for
purposes of prevention,
investigation, detection,
prosecution of criminal
offences or execution of
criminal penalties, and on free
movement of such data
• The protection of
individuals with regard to the
processing of personal data
by the Community
institutions and bodies and
on the free movement of
such data
• Guarantees the processing
of personal data and the
protection of privacy in the
electronic communications
sector
• Protection of natural
persons with regard to the
processing of personal data
and on the free movement
of such data
Regulation
2016/679
GDPR
25 May 2018
ePrivacy
Regulation
(Proposal
jan.’17)
25 May 2018
Directive
2016/680
May 2018
Regulation
45/2001
© E R Ranschaert, ECR 2017 27
General Data Protection Regulation
• Move to 1 single regulation for EU, replaces
patchwork of national laws (May 2018)
• GDPR facilitates free flow of patient data within EU.
• It ensures that personal data can only be gathered
under strict conditions and for legitimate purposes.
• Data controllers have to respect rights of data
subject.
• Cloud provider (data processor) must protect
information on behalf of data controller.
© E R Ranschaert, ECR 2017 28
Data subject
Data controller
Data processor
Conclusions
• It’s the responsibility of the radiologist to securely and effectively
utilize mobile technology in the best interests of patient care.
• Guidelines and additional training of radiologists are needed to
support the use of mobile devices and to protect the patient’s
privacy & security.
• Effective implementation of security settings within the enterprise
setting can maximize the benefit of mobile devices to patients.
• The existing EU privacy legislation should be implemented and
respected.
© E R Ranschaert, ECR 2017 29DOI: http://dx.doi.org/10.1148/rg.2015140039

More Related Content

What's hot

Wireless technology
Wireless technologyWireless technology
Wireless technology
Fatma Ala'a
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
Vinayak Hegde
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
suthi
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless Transmission
Joe Christensen
 

What's hot (20)

Wireless technology from 0G to 7.5G
Wireless technology from 0G to 7.5GWireless technology from 0G to 7.5G
Wireless technology from 0G to 7.5G
 
Local area network
Local area networkLocal area network
Local area network
 
Emerging telecommunication technologies
Emerging telecommunication technologiesEmerging telecommunication technologies
Emerging telecommunication technologies
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
 
Wireless network presentation
Wireless network presentationWireless network presentation
Wireless network presentation
 
Satellite Based High Altitude Platforms
Satellite Based High Altitude PlatformsSatellite Based High Altitude Platforms
Satellite Based High Altitude Platforms
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technology
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
wireless communication system
wireless communication systemwireless communication system
wireless communication system
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Data Packets, Routers and IP Addresses
Data Packets, Routers and IP AddressesData Packets, Routers and IP Addresses
Data Packets, Routers and IP Addresses
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless Transmission
 
Wireless mobile communication
Wireless mobile communicationWireless mobile communication
Wireless mobile communication
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
39 ethernet
39 ethernet39 ethernet
39 ethernet
 

Viewers also liked

How to identify radiology productivity bottlenecks?
How to identify radiology productivity bottlenecks?How to identify radiology productivity bottlenecks?
How to identify radiology productivity bottlenecks?
Sergey Morozov, MD, PhD, MPH
 
Mobile computing
Mobile computingMobile computing
Mobile computing
amellia27
 
Representation of nationality in captain america
Representation of nationality  in captain americaRepresentation of nationality  in captain america
Representation of nationality in captain america
ddoggart
 

Viewers also liked (20)

Information Technology and Radiology: challenges and future perspectives
Information Technology and Radiology: challenges and future perspectivesInformation Technology and Radiology: challenges and future perspectives
Information Technology and Radiology: challenges and future perspectives
 
How to identify radiology productivity bottlenecks?
How to identify radiology productivity bottlenecks?How to identify radiology productivity bottlenecks?
How to identify radiology productivity bottlenecks?
 
IT changes communication for radiologists
IT changes communication for radiologistsIT changes communication for radiologists
IT changes communication for radiologists
 
ECR Europe Forum '08. Shelf-ready packaging: the balancing act
ECR Europe Forum '08. Shelf-ready packaging: the balancing actECR Europe Forum '08. Shelf-ready packaging: the balancing act
ECR Europe Forum '08. Shelf-ready packaging: the balancing act
 
Automated image analysis: rescue for diffusion-MRI of threat to radiologists?
Automated image analysis: rescue for diffusion-MRI of threat to radiologists?Automated image analysis: rescue for diffusion-MRI of threat to radiologists?
Automated image analysis: rescue for diffusion-MRI of threat to radiologists?
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
The paradox between current models of Primary Care and evolving Evidence Base...
The paradox between current models of Primary Care and evolving Evidence Base...The paradox between current models of Primary Care and evolving Evidence Base...
The paradox between current models of Primary Care and evolving Evidence Base...
 
Evaluation question 7
Evaluation question 7Evaluation question 7
Evaluation question 7
 
196309903 q-answer
196309903 q-answer196309903 q-answer
196309903 q-answer
 
Photos lar 2
Photos lar 2Photos lar 2
Photos lar 2
 
education people in our society
education people in our society education people in our society
education people in our society
 
I017345357
I017345357I017345357
I017345357
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Презентация ученика 6 класса "Дед Мороз и его двойники".
Презентация ученика 6 класса "Дед Мороз и его двойники".Презентация ученика 6 класса "Дед Мороз и его двойники".
Презентация ученика 6 класса "Дед Мороз и его двойники".
 
Trancision 2017
Trancision 2017Trancision 2017
Trancision 2017
 
Representation of nationality in captain america
Representation of nationality  in captain americaRepresentation of nationality  in captain america
Representation of nationality in captain america
 
Make Up Tutorials
Make Up TutorialsMake Up Tutorials
Make Up Tutorials
 
Writing Swift code with great testability
Writing Swift code with great testabilityWriting Swift code with great testability
Writing Swift code with great testability
 
Coronary CTA: The test of choice for obstructive CAD.
Coronary CTA: The test of choice for obstructive CAD.Coronary CTA: The test of choice for obstructive CAD.
Coronary CTA: The test of choice for obstructive CAD.
 
Методическое пособие "Менеджмент в здравоохранении"
Методическое пособие "Менеджмент в здравоохранении"Методическое пособие "Менеджмент в здравоохранении"
Методическое пособие "Менеджмент в здравоохранении"
 

Similar to Security and ethical issues of mobile device technology

Paper id 37201535
Paper id 37201535Paper id 37201535
Paper id 37201535
IJRAT
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
DaliaCulbertson719
 

Similar to Security and ethical issues of mobile device technology (20)

Mobile (tele)radiology
Mobile (tele)radiologyMobile (tele)radiology
Mobile (tele)radiology
 
What's in WhatsApp for Radiologists?
What's in WhatsApp for Radiologists?What's in WhatsApp for Radiologists?
What's in WhatsApp for Radiologists?
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
 
Capturing Data and Improving Outcomes for Humans and Machines Using the Inter...
Capturing Data and Improving Outcomes for Humans and Machines Using the Inter...Capturing Data and Improving Outcomes for Humans and Machines Using the Inter...
Capturing Data and Improving Outcomes for Humans and Machines Using the Inter...
 
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
 
Paper id 37201535
Paper id 37201535Paper id 37201535
Paper id 37201535
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
 
06.09.26.Handout
06.09.26.Handout06.09.26.Handout
06.09.26.Handout
 
Security & Privacy - Lecture E
Security & Privacy - Lecture ESecurity & Privacy - Lecture E
Security & Privacy - Lecture E
 
Using Healthcare Data for Research @ The Hyve - Campus Party 2016
Using Healthcare Data for Research @ The Hyve - Campus Party 2016Using Healthcare Data for Research @ The Hyve - Campus Party 2016
Using Healthcare Data for Research @ The Hyve - Campus Party 2016
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Teleradiology White Paper
Teleradiology White PaperTeleradiology White Paper
Teleradiology White Paper
 
06.09.26.Handout
06.09.26.Handout06.09.26.Handout
06.09.26.Handout
 
Designing a useful and usable mobile EMR application through a participatory...
Designing a useful and usable mobile EMR application through a participatory...Designing a useful and usable mobile EMR application through a participatory...
Designing a useful and usable mobile EMR application through a participatory...
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
2013 remote@e telemed
2013 remote@e telemed2013 remote@e telemed
2013 remote@e telemed
 
Healthcare apps for Nokia X and Nokia Asha
Healthcare apps for Nokia X and Nokia AshaHealthcare apps for Nokia X and Nokia Asha
Healthcare apps for Nokia X and Nokia Asha
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
 
Social Networks and Collaborative Platforms for Data Sharing in Radiology
Social Networks and Collaborative Platforms for Data Sharing in RadiologySocial Networks and Collaborative Platforms for Data Sharing in Radiology
Social Networks and Collaborative Platforms for Data Sharing in Radiology
 

More from Erik R. Ranschaert, MD, PhD

The impact of Information Technology on Radiology Services
The impact of Information Technology on Radiology ServicesThe impact of Information Technology on Radiology Services
The impact of Information Technology on Radiology Services
Erik R. Ranschaert, MD, PhD
 
Image data beyond radiology: new developments
Image data beyond radiology: new developmentsImage data beyond radiology: new developments
Image data beyond radiology: new developments
Erik R. Ranschaert, MD, PhD
 

More from Erik R. Ranschaert, MD, PhD (20)

Les réseaux sociaux en radiologie
Les réseaux sociaux en radiologieLes réseaux sociaux en radiologie
Les réseaux sociaux en radiologie
 
A.I. in Radiology: Hype or Hope?
A.I. in Radiology: Hype or Hope?A.I. in Radiology: Hype or Hope?
A.I. in Radiology: Hype or Hope?
 
Wat betekent A.I. voor de radiologie?
Wat betekent A.I. voor de radiologie?Wat betekent A.I. voor de radiologie?
Wat betekent A.I. voor de radiologie?
 
Protection of patient data in EU vs. US
Protection of patient data in EU vs. USProtection of patient data in EU vs. US
Protection of patient data in EU vs. US
 
IT en Radiologie
IT en RadiologieIT en Radiologie
IT en Radiologie
 
The impact of Information Technology on Radiology Services
The impact of Information Technology on Radiology ServicesThe impact of Information Technology on Radiology Services
The impact of Information Technology on Radiology Services
 
Use of Social Media in Radiology
Use of Social Media in RadiologyUse of Social Media in Radiology
Use of Social Media in Radiology
 
Comparison of ESR & ACR Teleradiology White Papers
Comparison of ESR & ACR Teleradiology White PapersComparison of ESR & ACR Teleradiology White Papers
Comparison of ESR & ACR Teleradiology White Papers
 
iPad for (tele)radiology, a critical appraisal
iPad for (tele)radiology, a critical appraisaliPad for (tele)radiology, a critical appraisal
iPad for (tele)radiology, a critical appraisal
 
State-of-the-art Cardiac CT of the coronary arteries
State-of-the-art Cardiac CT of the coronary arteriesState-of-the-art Cardiac CT of the coronary arteries
State-of-the-art Cardiac CT of the coronary arteries
 
Radiologie anno 2012
Radiologie anno 2012Radiologie anno 2012
Radiologie anno 2012
 
Radiologie in 2012: hollen of stilstaan?
Radiologie in 2012: hollen of stilstaan?Radiologie in 2012: hollen of stilstaan?
Radiologie in 2012: hollen of stilstaan?
 
Teleradiology, European perspective
Teleradiology, European perspectiveTeleradiology, European perspective
Teleradiology, European perspective
 
Ct Cardiac Nvmbr2012
Ct Cardiac Nvmbr2012Ct Cardiac Nvmbr2012
Ct Cardiac Nvmbr2012
 
Teleradiology: Concepts and Evolution
Teleradiology: Concepts and EvolutionTeleradiology: Concepts and Evolution
Teleradiology: Concepts and Evolution
 
CT colon voor diagnostiek en screening
CT colon voor diagnostiek en screeningCT colon voor diagnostiek en screening
CT colon voor diagnostiek en screening
 
Image data beyond radiology: new developments
Image data beyond radiology: new developmentsImage data beyond radiology: new developments
Image data beyond radiology: new developments
 
CT Cardiac, Bossche Samenscholingsdagen 2010
CT Cardiac, Bossche Samenscholingsdagen 2010CT Cardiac, Bossche Samenscholingsdagen 2010
CT Cardiac, Bossche Samenscholingsdagen 2010
 
Abdominal diffusion-MRI
Abdominal diffusion-MRIAbdominal diffusion-MRI
Abdominal diffusion-MRI
 
CT-Colonoscopie
CT-ColonoscopieCT-Colonoscopie
CT-Colonoscopie
 

Recently uploaded

Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetTirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171
Call Girls Service Gurgaon
 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
adityaroy0215
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
russian goa call girl and escorts service
 
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Sheetaleventcompany
 
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Sheetaleventcompany
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
priyashah722354
 
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Sheetaleventcompany
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
gragmanisha42
 
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetraisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetJalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhChandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Sheetaleventcompany
 

Recently uploaded (20)

Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetTirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510
 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
 
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
 
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
 
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
 
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetraisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetJalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
 
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhChandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
 

Security and ethical issues of mobile device technology

  • 1. Security and ethical issues of mobile device technology Erik Ranschaert, MD, PhD Vice-president EUSOMII
  • 2. Disclosure • No conflicts of interest 2© E R Ranschaert, ECR 2017
  • 3. Introduction • After this lecture you should know about: 1. The secure use of mobile devices in medicine and radiology 2. The ethical issues involved in using mobile devices for medical purposes © E R Ranschaert, ECR 2017 3
  • 4. HCPs and Mobile Devices • Healthcare Professionals are globally rapidly adapting to mobile technology. • Smartphones and tablets are regarded as “the most popular technological development for providers since the invention of the stethoscope”. © E R Ranschaert, ECR 2017 4 Source: “The road to telehealth 2.0 is mobile”, http://www.telenor.com/media/in-focus/the-socio-economic- impact-of-mhealth
  • 5. HCPs Mobile Technology Policies © E R Ranschaert, ECR 2017 5 2015 HIMSS Mobile Technology Survey • 2015 HIMSS Mobile Technology Survey – Only 57 % of HCPs’ organizations has a mobile technology policy. – Mobile device security is indicated as a key component of current and future mobile technology policies.
  • 6. Mobile Operating Systems • 5 out of 6 new phones are running Android • 1 in 7 are running iOS • Mobile devices contain valuable personal information • Smartphones become increasingly attractive to criminals* © E R Ranschaert, ECR 2017 6 *Symantic Internet Security Threat Report 2016
  • 7. What’s in it for radiologists? © E R Ranschaert, ECR 2017 7http://www.acr.org/Advocacy/Informatics/IT-Reference-Guide • Radiology is on the leading front of the medical field’s adoption of mobile technologies • Primary purpose of mobile devices is to trade the traditional desktop displays for a more compact display, to be used only occasionally while on the go.
  • 8. Mobile devices in radiology Devices • Smartphones and tablets – High res graphical displays: 1920 x 1080 pixels – Pixel sizes smaller than what human retina can resolve – Displays can surpass resolution of many PACS monitors • Hardware and dedicated radiology reviewing apps allow radiologists to incorporate them into their workflow Operating Systems • Apple iOS – Runs only on hardware designed by Apple • Google Android (≈ Linux) Some features of open source SW, no full access to code • Many common (security) features © E R Ranschaert, ECR 2017 8
  • 9. Security risks • Mobile devices = vulnerable to loss/theft • Patient-related data might be stored on device • Public cloud apps (social media etc.) for storing & sharing of medical data – These apps/platforms are NOT designed for MEDICAL purposes – Patient privacy is not sufficiently protected © E R Ranschaert, ECR 2017 9 McEntee et al: 5 April 2012; Proc. of SPIE Vol. 8318 DOI: 10.1117/12.913754
  • 10. RANSOM Survey • RANSOM survey • March - May 2015 • 516 radiologists © E R Ranschaert, ECR 2017 10 J Digit Imaging. 2016 Aug;29(4):443-9. doi: 10.1007/s10278-016-9865-1. Radiologists' Usage of Social Media: Results of the RANSOM Survey. Ranschaert ER1, Van Ooijen PM2, McGinty GB3, Parizel PM4.
  • 11. Major concerns in survey Insufficient legislation, guidelines and policies for SoMe in healthcare 75% Risk for privacy of the patients 39% Risk for privacy of radiologists 39% Insufficient knowledge about social media among radiologists 37% Distraction from clinical activities 28% Deprivation from real social contact with others 18% Danger of negative comments on our practice 13% © E R Ranschaert, ECR 2017 11
  • 12. Security issues 1. Device-based – passcode access, encryption, remote wiping, viruses, malware 2. Software-based – wireless security, application availability, enterprise security Security measures to protect patient information are of critical importance. © E R Ranschaert, ECR 2017 12
  • 13. Device-based security Access to the device • Multiple security options • 4-digit code • HIPAA and other best-practice guidelines require more complex passcodes: – More digits/symbols – Configurable tracing pattern – Biometric access • Stolen devices: remote tracking, reset passcodes, data erasure etc. Local Encryption • Data stored on electronic HD (flash RAM) • Physical access possible • Content mostly not protected • iOS + Android support encryption of data • Stored personal health information should be encrypted • Encryption also protects data from malware or viruses • Apps should run in “virtual sandbox” © E R Ranschaert, ECR 2017 13 EDPS Guidelines: https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/Supervision/Guidelines/15-12-17_Mobile_devices_EN.pdf
  • 14. Sandboxing • Sandbox is security mechanism for separating running programs • Uses “scratch space” on disk and memory • To execute untested/untrusted programs without risking harm to host device or OS • Other apps can’t steal info © E R Ranschaert, ECR 2017 14
  • 15. Software-based security Apple iOS • Stringent control over app store and OS => less threats than Android • Not immune for malware • Non-jailbroken device is much more difficult to compromise Google Android • Much more mobile malware than iOS – Larger market share – Greater openness of Android, multiple distribution methods of apps • Increase in volume of attacks – 230% increase (2015) – More “stealthy” *Symantic Internet Security Threat Report 2016 © E R Ranschaert, ECR 2017 15
  • 16. Enterprise IT-security •The BYOD concept brings unique security challenges for institutional IT depts. •Most hospitals tolerate these devices, provided that they adhere to institutional security policies. BYOD Bring Your Own Device •The existing security features in iOS and Android should be implemented •Institutional security policies for mobile devices should be enforced •Third-party mobile device management tools for monitoring and detection of malicious behavior of apps should be used. Mobile device management © E R Ranschaert, ECR 2017 16
  • 17. Messaging Apps E. R. Ranschaert, EUSOMII Valencia, 2016
  • 18. WhatsApp from radiologist • “I got this picture of an angiogram at 11 PM from another radiologist. The patient was in coma, almost dead.” • “He wanted to know what this structure on the angiogram is. I’m specialised in cerebral stroke and could see that it was a thrombosis of the basilar artery with a rare anatomic variant.” • “I could explain the colleague how to deal with this abnormality so the patient could be treated quickly. The patient woke up after treatment and could go home.” E. R. Ranschaert, EUSOMII Valencia, 2016 Croonen H. Veilig whatsappen een must voor dokters. Med Contact 2015(48):2312-5.
  • 19. News 24 Feb. 2016 • Dutch DPA : “WhatsApp does not meet the standards for sharing medical data.” • The individual doctor and/or institution may receive a fine for breaching protection of personal data • Medical doctors should find alternative solutions © E R Ranschaert, ECR 2017 19 http://linkis.com/medischcontact.nl/oRWkJ
  • 20. Dedicated apps © E R Ranschaert, ECR 2017 20 Secure and dedicated alternatives are being tested in Dutch hospitals Secure file transfer State of the art encryption Secure authentication
  • 21. Figure 1: patient privacy • Patients' faces are automatically obscured • Users must manually block identifying marks (e.g. tattoos). • Each picture is reviewed by moderators before storage in data base © E R Ranschaert, ECR 2017 21
  • 22. Ethical concerns 1. Security and Privacy are ETHICAL issues 2. Main ethical concern = hacking of mobile devices 3. Patient-centred principle: do not harm patients 4. Ethical guidance can prevent all risks. 5. Guidelines need to be re(de)fined © E R Ranschaert, ECR 2017 22
  • 23. Golden Rule “If you would like to discuss a patient case via social media, then the patient should thereby remain anonymous or the patient must have given explicit consent.” © E R Ranschaert, ECR 2017 23 Hooghiemstra TF, Nouwt S. Een juridische blik op trends in e-Health. Ned Tijdschr Geneeskd 2014;158:A8423.
  • 24. What should radiologists use? • “It’s the responsibility of the radiologist to securely and effectively utilize mobile technology in the best interests of patient care.” © E R Ranschaert, ECR 2017 24 http://www.acr.org/Advocacy/Informatics/IT-Reference-Guide
  • 25. How secure are radiology data? © E R Ranschaert, ECR 2017 25
  • 26. Security study of DICOM servers • 2744 Unprotected DICOM servers • 719 Completely open to communication with patient data • Downloading of pt data was theoretically possible and easy • Geographic differences in lack of DICOM server security: – Iran: 34/40 (85%) – Thailand: 10/14 (71%) – Spain: 11/23 (48%) – Argentina: 6/13 (46%) – Russia: 8/18 (44%) – Germany: 9/22 (41%) – USA: 346/1335 (26%) 26 Stites, M., & Pianykh, O. S. (2016). How Secure Is Your Radiology Department? Mapping Digital Radiology Adoption and Security Worldwide. American Journal of Roentgenology, 206(4), 797–804. http://doi.org/10.2214/AJR.15.15283
  • 27. European legislation • Protection of natural persons with regard to processing of personal data by competent authorities for purposes of prevention, investigation, detection, prosecution of criminal offences or execution of criminal penalties, and on free movement of such data • The protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such data • Guarantees the processing of personal data and the protection of privacy in the electronic communications sector • Protection of natural persons with regard to the processing of personal data and on the free movement of such data Regulation 2016/679 GDPR 25 May 2018 ePrivacy Regulation (Proposal jan.’17) 25 May 2018 Directive 2016/680 May 2018 Regulation 45/2001 © E R Ranschaert, ECR 2017 27
  • 28. General Data Protection Regulation • Move to 1 single regulation for EU, replaces patchwork of national laws (May 2018) • GDPR facilitates free flow of patient data within EU. • It ensures that personal data can only be gathered under strict conditions and for legitimate purposes. • Data controllers have to respect rights of data subject. • Cloud provider (data processor) must protect information on behalf of data controller. © E R Ranschaert, ECR 2017 28 Data subject Data controller Data processor
  • 29. Conclusions • It’s the responsibility of the radiologist to securely and effectively utilize mobile technology in the best interests of patient care. • Guidelines and additional training of radiologists are needed to support the use of mobile devices and to protect the patient’s privacy & security. • Effective implementation of security settings within the enterprise setting can maximize the benefit of mobile devices to patients. • The existing EU privacy legislation should be implemented and respected. © E R Ranschaert, ECR 2017 29DOI: http://dx.doi.org/10.1148/rg.2015140039

Editor's Notes

  1. iPads and LCDs show similar performance in the detection of pulmonary nodules. McEntee et al 2012 Risk to the security of patient records if they are stored on the tablet computer using applications such as Mobile MIM