This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Rene asked for an outline of Security topics for FHIR for an upcoming tutorial he is giving. The easy answer is go read all my blog articles under the #FHIR topic The second easy answer is to point at the FHIR security pages. There are efforts underway to create a Privacy Consent Directive modeled in FHIR.
I have been asked quite often to explain how to secure FHIR. The basics of Security for FHIR are written up on the FHIR Specification. Don’t worry about security The first answer is the one I give to those in HL7 that are working on developing FHIR, or just getting their feet wet learning FHIR. Not too big.
As FHIR matures, the security topic becomes more and more important. In fact the specification they have " FHIR OAuth 2 " is not open for review, yet. It is made up of a set of strings that represent a few FHIR resources. It is not a complete list of FHIR resource types.
IHE Connectathon did informal testing of Mobile access to Health Documents (aka #MHD - #XDS on #FHIR. MHD has a wide variety of deployment models, leveraging the simplicity of HTTP REST and the data model and interaction model defined in FHIR. Each of these we discussed how to resolve. For more on mHealth
There is some strong discussion going on at HL7 around privacy concerns, especially now that HL7 FHIR has enabled easy application writing. The discussion started with an article " Warning mHealth security fears are opening doors to app and device innovation " summarizing a study done by Ketchum.
mHealth Insight. If they bring something to the table that inspires consumers to care (and Apple knows how to do this), that could be transformational” I’ve found lots of Doctors mistakenly think statements like “Medical record data is not that compelling from a consumer perspective” are valid. Or so it seems.
who is a Primary Care Physician, Professor at UCSF & coFounder at Open mHealth (follow her on Twitter @IdaSim ). mHealth Insights. 44 FHIR allows external third-party apps to integrate into the EHR workflow. Authored by Ida Sim, M.D., More than 40% of U.S.
We organize all of the trending information in your field so you don't have to. Join 48,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content