[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

Tech Policy

A rule or regulation put into place by governing bodies on technology practices, access of user devices, patents and intellectual property, provider regulations, and much more.

Share tech news, updates, or what's on your mind.

Sign up to Post

Artificial intelligence (AI) is changing tech and business. Today, AI is commonplace. This article discusses AI and a few of the different aspects of AI that we should all be aware of.
1
Prepare for an Exciting Career in Cybersecurity
Prepare for an Exciting Career in Cybersecurity

Help prevent cyber-threats and provide solutions to safeguard our global digital economy. Earn your MS in Cybersecurity. WGU’s MSCSIA degree program curriculum features two internationally recognized certifications from the EC-Council at no additional time or cost.

Being too curious can sometimes get you into big and costly trouble.
0
LVL 39

Expert Comment

by:BillDL
Comment Utility
Although it is not detailed in your article, nor on the Information Commissioner's Office pages linked to, I assume the named people accessed patient records using computers rather than looking at hardcopy records.  That's the only real way that multiple instances of access could realistically have been logged.

I wonder whether the National Health Service (or any of the affected Health care Trusts) have actually placed any restrictions on who is permitted (and I refer to user account status here) to gain access to various areas of their IT databases in the wake of these breaches?

The main subject of your article, namely Clare Lawson, was a Staff Nurse. In such a position there would normally be a Charge Nurse (equivalent to Supervisor in other vocational disciplines) above her on that ward and also a Matron or Sister (a "Manager" nurse) covering that ward and perhaps others.  It isn't known from the available information whether any staff of those ranks would consistently be on duty at the same times as the subject, but if they were then they are the supervisory members of staff who should have access to patient records, not the standard nursing staff.  There may be some situations, however, where a Staff Nurse could have been in charge and therefore may have required legitimate access to records during a shift.  This is not to say that even a higher ranking member of nursing staff may be tempted to excessive and knowingly wrong patient record accesses, but keeping permission to those of a certain ranking and above would reduce the likelihood.  

The second subject (Nicola Wren) was an Administrator and it is possible that in such a position whe would have have required access to patient records.  There isn't much that could be done by way of restriction in such a case, but it looks as though this woman was frequently checking for updates in records relating to a friend, acquaintance, or relative over the 3 week period.

There is absolutely no reason why the third subject, Marian Waddell, should have had access to patient records held in computer databases because she was a Nursing Auxiliary.  This position is sometimes referred to by the title "Healthcare Assistant".  Often these positions are occupied by ex-nurses or midwives who returned to healthcare after long periods of absence during which their qualifications lapsed.  They are either part-qualified or unqualified "nurses".  I'm not saying they don't know what they are doing, because some know more than doctors or nurses, but their duties are restricted.  Again though, the ICO web page relating to Marian Waddell does not specify whether she accessed a computer record or a hardcopy record.  All it says is that she accessed the records of one patient.

What I am most curious about is the statement made by the Director of Investigations for the ICO:
"This abuse of a position of trust has caused significant distress to a number of people".
Obviously there would be some distress caused to fellow nursing staff who might feel betrayed and let down by a colleague's actions, but were the patients themselves informed about the unlawful accesses of their records?
0
LVL 5

Author Comment

by:Adrian McGarry
Comment Utility
Thanks for the comments BillDL.

I agree, this must have been captured via computer security audit logging, but is not the sort of detail that was released by the ICO.

We would all hope that appropriate measures are taken for securing highly sensitive information, such as patient records, especially in large organisations such as the NHS in the UK.

Unfortunately (& I am going to link this to information security lapses, like with the Wannacry incident) it is very apparent the NHS is not a good example for information security and data governance.

Even this week we have seen the reports of how much Wannacry cost the NHS https://www.google.co.uk/amp/s/www.zdnet.com/google-amp/article/this-is-how-much-the-wannacry-ransomware-attack-cost-the-nhs/ £92m.  How much would it have cost the NHS to deploy a 0-day threat system to protect against this and countless other malware attacks, let alone the human cost of this malpractice.

You really only need to prove this by looking at the UK ICO https://ico.org.uk/action-weve-taken/ to see how many NHS trusts have been involved in action enforcements.

And is this any different for other countries?  This article covers recent Australian data breaches within the healthcare system http://www.mondaq.com/australia/x/743342/data+protection/Data+breaches+on+the+rise+in+the+health+sector

We see far too many organisations with very bad practices, poor security and no training for staff.

To teach basic security skills, providing training to all employees is common-sense, which is why I write about this subject, train people and organisations about this subject and sometimes can get very emotive about data protection and security.

Does this make me a bit geeky about this subject, maybe!  But there is a human cost to this.  Not only with these NHS examples but with each data breach that occurs because of negligence, malpractice and just plain incompetence, it’s unnecessary and can be stopped by raising awareness.
0
It’s been a while since the GDPR came into force and the world hasn’t come to an end! In this article we are going to look at the news headlines and expand on the stories with an interesting series of opinions.
0
With great difficulty, I'm trying to implement a parser for reading sib codes and analyzing cells tower. I convert a particular ASN.1 EUTRA_RRC_Definitions structure in a C# DLL. In theory I can decode the code and get a file XML structured. I searched everywhere online for examples, but I found nothing.

This is my code that I'm trying to get it works:


public static byte[] StringToByteArray(string hex)
    {
        return Enumerable.Range(0, hex.Length)
                         .Where(x => x % 2 == 0)
                         .Select(x => Convert.ToByte(hex.Substring(x, 2), 16))
                         .ToArray();
    }

    static void Main(string[] args)
    {

        BCCH_BCH_Message sib = new BCCH_BCH_Message();
        sib.Init();
        const string V = "694c4224198860c1312a984c031807c06e493ab212103108b4890000";
        var buffer = StringToByteArray(V);
        sib.Decode(new Com.Objsys.Asn1.Runtime.Asn1OerDecodeBuffer(buffer));
    }
}

Open in new window



And this is the exception I get: Com.Objsys.Asn1.Runtime.Asn1Exception: 'base class decode method invoked';
I hope someone had already faced with this issue.
0

In the United States, 2.3 million Americans without transportation live more than one mile away from the nearest supermarket. These areas are called food deserts. Technology can help this population eat better and save money.


A population that’s expanding in an environment that consists of limited resources poses a problem for the future of mankind. As more industries seek and implement sustainable solutions, society is slowly undergoing a change where business leaders are starting to think about the impact that enterprise activities have on the environment. Resultingly, enterprise leaders and researchers are turning to technology to find ways to sustain the environment and humanity.


Researchers estimate that the world’s food producers must double production by the year 2030 to fulfill the dietary needs generated by the planet’s forecast population growth to 9 billion people by the year 2050. This is an enormous challenge in a world where the United Nations (UN) is also working to end all hunger by the year 2030. Technology provides faster solutions for learning about and solving these kinds of problems. Innovations such as the Internet of Things (IoT) and big data systems are helping scientists make great advancements in sustainability research. They’re discovering valuable ways to preserve the environment by improving the ways that enterprises conduct business.


The Logistics of Putting Food on the Table

Technology makes transportation more efficient. To reduce the impact on the environment, scientists urge consumers to make more use of public transportation such as buses, ride shares and trains. If consumers were to follow the recommendations of researchers and use public transportation, they could reduce annual carbon dioxide emissions by 37 million metric tons and gasoline consumption by 4.2 billion gallons.


Food often travels great distance before it makes it to the meal table. In fact, this is a great source of debate in the scientific community. With some food products, transport is a significant source of greenhouse emissions. Some researchers argue that the carbon use of organic crops does more harm to the environment than the carbon emission generated by transporting food. Other researchers note that the sum of all current agriculture activities produce the maximum estimated level of organic emissions that scientists forecast the planet can withstand in total by the year 2050. Either way, food waste contributes to this problem double fold by requiring producers to grow more goods and then transport them to consumers.


The Growing Need for Accessible Nutrition

The American Nutrition Association designates regions that lack a sufficient supply of fresh fruits, vegetables and whole foods as “food deserts.” These are generally impoverished areas occupied by underserved populations. In food deserts, it’s difficult for consumers to access healthy and culturally relevant foods. Technology, however, is a solution for accessing nutritious and desirable nourishment. It makes it possible for supermarkets to deliver food to consumers. With innovations such as smartphone apps, even consumers who don’t live near supermarkets and are without transportation have access to healthy foods in select regions.


Researchers hope that technology will help them find more solutions for providing access to food for consumers who live in food deserts. Meanwhile, nonprofit organizations, social workers and government agencies are conducting outreach work to help consumers who live in these areas, including initiatives such as nutrition training and health advocacy. The entities also work to promote awareness of food deserts and distribute information about how to help people who live in these areas. Together, these individuals and organizations can help the residents of food deserts live healthier lives.


Sustainability in Food Distribution

Public demand has prompted enterprises to understand and mitigate the impact that their goods have on the environment. Innovative technologies have given enterprises this ability and resulted in a new supply chain term called “hyper-transparency.” Today, connected supply chain systems provide enterprises with detailed sourcing data. In the future, technology experts hope that the Internet of Things (IoT) will allow manufacturers and food producers to track goods throughout their entire lifecycle – from production to recycling and on through repurposing. Companies can already monitor inventories in real-time, and as more technologies evolve, their combined utilities spawn new, exciting - and sometimes unforeseen - applications.


Technology is transforming the world, and more enterprises are using it to take better care of the environment. One day, engineers hope that they can develop technologies that can measure the impact that all products leave on the environment. The development of this kind of empowering innovation requires the skills of experts trained in STEM sciences who can develop technologies into new and beneficial iterations.

0
LVL 5

Author Comment

by:Ryan Ayers
Comment Utility
Thank you! Glad you like it.
0
0

Expert Comment

by:Alba Richi
Thank you, I will definitely try your checklist!
1
LVL 5

Author Comment

by:Adrian McGarry
If you like the checklist, try our GDPR product
0
0
1
Has Powershell sent you back into the Stone Age?
LVL 8
Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Healthcare has made massive developments over the past decade, thanks largely to technological advancement. Yet despite that these advancements are saving our lives, few truly understand how much healthcare has changed, and where it is headed.
0
LVL 56

Expert Comment

by:Martin Liss
Comment Utility
I had some spare time so I went ahead and read the article and here are a few minor grammar changes you might want to consider..

Where you have "In an article by Bradley University they cite research", I would suggest either
In an article by Bradley University, they cite research
or
An article by Bradley University cites research

Where you have "Incentives are being put into place to encourage the changes" I would suggest
Incentives are being put in place to encourage the changes

I would also change "Some of the tools that are being implemented to improve outpatient care includes:"
to  Some of the tools that are being implemented to improve outpatient care include:

And

"will be able to find the services that suits their needs."
to
will be able to find the services that suit their needs.
1
LVL 5

Author Comment

by:Ryan Ayers
Comment Utility
Nope! We can definitely take out the link if you'd like.
0
We talk to business owners about the GDPR. Quite often they say,‘ I have a department that deals with all that legal stuff, they will sort it out.’ As a business owner when it comes to a data breach, you are libel, not your department. Know your data!  http://bit.ly/2CdtRAM
BCA512F8-ADC8-4100-915A-283D13E8013.jpeg
0
2B42C08B-62FB-4CA6-AF79-1E33240CFD7.jpeg
Don't put it in the bin! How many of your employees are aware of the new data regulations? Ask them. http://bit.ly/2GBbhl2

Have a go!

Read the article, then tell me what and how many potential breaches you can spot?
0
0
Here’s our take on explaining GDPR compliance in a infographic
https://www.beinfoready.co.uk/compliance-explained/

Sign-up to the course.
£50 for the years subscription of our be.GDPR training modules

0
0
Big Business Goals? Which KPIs Will Help You
Big Business Goals? Which KPIs Will Help You

The most successful MSPs rely on metrics – known as key performance indicators (KPIs) – for making informed decisions that help their businesses thrive, rather than just survive. This eBook provides an overview of the most important KPIs used by top MSPs.

Welcome to 2018! Exciting things lie ahead in the world of tech. To start things off, we compiled great member articles on how to stay safe, ways to learn, and much more! Read on to start your new year right.
0
Last month, the FCC voted to repeal Title II, the framework supporting net neutrality across all broadband ISPs. We sat down with Doug Walton, database administrator at Experts Exchange to gauge his opinion of what will happen next.
0
LVL 25

Expert Comment

by:dgrafx
Comment Utility
We want LESS regulation and we DO NOT want the government to control the internet!
Stand AGAINST Net Neutrality! Don't listen to the scare tactics!
Twitter and Facebook and Google and many other repressive corps are FOR Net Neutrality - that says it all doesn't it?
Say something the SJW's don't like and you are banned on Twitter and Facebook! Google simply skews your search results.

Freedom not Totalitarianism!
0
20 things you need to know about GDPR in simple form. Who does it affect? What impact will Brexit have and are you really ready for it? Expertise, knowledge and advice are at your fingertips. Read more:
http://bit.ly/2BfnbOq
0
Since today is the "big day", Just have a question about net neutrality to further my understanding of the issue.

If NN rules were not enforced until 2015, why is repealing these rules supposedly the "end of internet as we know it"?  We all had basically the same internet before 2015.  

What are the worst case scenarios moving forward, and how come we did not see these senarios in the past?
0
The be.Infoready brand was created to help organisations like yours comply with new GDPR (General Data Protection Regulation) and data protection laws (Data Protection Act).

Our aims and goals have always been about improving the learning experience.

https://lnkd.in/e6vxP9c
0
0

Tech Policy

A rule or regulation put into place by governing bodies on technology practices, access of user devices, patents and intellectual property, provider regulations, and much more.

Top Experts In
Tech Policy
<
Monthly
>