Securing Clinical Data in Honduras: Exploring Cybersecurity Regulations and the Role of Blockchain

Article Preview

Abstract:

The existence of cybersecurity regulations in Honduras aimed at safeguarding clinical data remains uncertain, leaving the populace’s health information vulnerable due to the absence of robust legal frameworks. This study sheds light on the current landscape concerning health information protection in the country, underscoring its profound impact on securing medical information systems and the realm of Internet of Things (IoT). It underscores the potential of blockchain technology to provide an innovative solution to address security challenges in this domain. Employing a systematic approach, the research delineates a timeline to elucidate the evolution of legal measures against cybercrime in Honduras, consolidating pertinent governmental documents associated with cybersecurity and the protection of medical data. Furthermore, it underscores the healthcare sector’s susceptibility to cyber threats and the primary privacy apprehensions pertaining to IoT applications in medicine. The study concludes that Honduras lacks a dedicated data protection statute, posing a significant impediment to cybersecurity regulatory efforts. This legal void impedes the effective implementation of measures to safeguard clinical information and shield it from potential cyber risks amidst the proliferation of IoT initiatives and healthcare-related ventures. Nonetheless, this circumstance may present an opportunity for the adoption of technologies such as blockchain. By enabling the establishment of tailored regulatory frameworks, blockchain can adapt to its unique attributes, thereby facilitating its integration in fortifying clinical data protection and enhancing overall cybersecurity protocols.

You might also be interested in these eBooks

Info:

Pages:

105-116

Citation:

Online since:

September 2024

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2024 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Kuliha y S. Verma, «Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain», International Journal of Intelligent Networks, mar. 2024.

DOI: 10.1016/j.ijin.2024.03.001

Google Scholar

[2] B. Coutinho, J. Ferreira, I. Yevseyeva, y V. Basto-Fernandes, «Integrated cybersecurity methodology and supporting tools for healthcare operational information systems», Computers & Security, vol. 129, p.103189, jun. 2023.

DOI: 10.1016/j.cose.2023.103189

Google Scholar

[3] International Telecommunication Union (ITU), Global Cybersecurity Index 2020, 4.a ed. Geneva, Switzerland, 2021.

Google Scholar

[4] Asamblea Nacional Constituyente, CONSTITUCIÓN POLÍTICA DE 1982, ene. 1982, p.17.

Google Scholar

[5] Código Penal De Honduras Decreto No.130-2017, 25 de enero 2021. Republica de Honduras: OIM S.A. de C.V., 2019, pp.186-189.

Google Scholar

[6] INSTITUTO DE ACCESO A LA INFORMACION PÚBLICA, «Ley de Transparencia y Acceso a la Informacion Publica», Tegucigalpa, M.D.C., dic. 2006.

DOI: 10.3145/epi.2012.sep.09

Google Scholar

[7] Poder Judicial de Honduras, «LEY ESPECIAL SOBRE VIH/SIDA», Corte Suprema de Justicia, Tegucigalpa, M.D.C., sep. 1999.

Google Scholar

[8] Colegio Medico de Honduras, «CÓDIGO DE ÉTICA DEL COLEGIO MEDICO DE HONDURAS », Colegio Médico de Honduras, Tegucigalpa M.D.C., 2006.

DOI: 10.36576/summa.29160

Google Scholar

[9] Banco Interamericano de Desarroll, «Reporte-Ciberseguridad-2020-riesgos-avances-y-elcamino- a-seguir-en-America-Latina-y-el-Caribe.pdf». 2020. [En línea]. Disponible en: www.observatoriociberseguridad.com

DOI: 10.18235/0002513

Google Scholar

[10] INSTITUTO DE ACCESO A LA INFORMACION PÚBLICA, «Anteproyecto de Ley de Proteccion de Datos Personales y Accion de Habeas Data de Honduras Final», Instituto de Acceso a la información Pública, Tegucigalpa M.D.C., 2014. Accedido: 22 de mayo de 2023. [En línea].

DOI: 10.2307/jj.16192242.6

Google Scholar

[11] Unidad Reguladora y de Control de Datos Personales, «LOS DATOS PERSONALES Y SU PROTECCIÓN URUGUAY». 24 de enero de 2022. Accedido: 14 de junio de 2023. [En línea].

DOI: 10.2307/j.ctv1tqcx2c.7

Google Scholar

[12] Comisión Nacional de Bioética,Secretaria deSalud de Mexico, «Proteccion datos personales salud Mexico». marzo de 2014. [En línea].

Google Scholar

[13] C. S. Kruse, B. Frederick, T. Jacobson, y D. K. Monticone, «Cybersecurity in healthcare: A systematic review of modern threats and trends», THC, vol. 25, n.º 1, pp.1-10, feb. 2017.

DOI: 10.3233/THC-161263

Google Scholar

[14] S. G. Langer, «Cyber-Security Issues in Healthcare Information Technology», J Digit Imaging, vol. 30, n.o 1, pp.117-125, feb. 2017.

DOI: 10.1007/s10278-016-9913-x

Google Scholar

[15] A. Fraile Hernández, «Ciberseguridad: clave en el sector sanitario», I+S: Revista de la Sociedad Española de Informática y Salud, n.º 139, pp.32-33, 2020.

Google Scholar

[16] Consejo Europeo, «Convenio de Sobre la Ciberdelincuencia». 2001. Accedido: 8 de mayo de 2023. [En línea]. Disponible en: https://www.oas.org/juridico/english/cyb_pry_ convenio.pdf

Google Scholar

[17] División de Ciberdelincuencia, «Adhesión al Convenio sobre la Ciberdelincuencia: Beneficios ». 04 de 2023. [En línea]. Disponible en: https://rm.coe.int/cyber-buda-benefits-junio2022- es-final/1680a6f9f4

Google Scholar

[18] F. A. Martins, M. S. Ruiz, S. F. de P. Monken, L. Ferreira da Silva, y E. Del Rosario Santibanez Gonzalez, «Risk management focusing on the best practices of data security systems for healthcare », International Journal of Innovation: IJI Journal, vol. 9, n.o 1 (Jan./Apr.), pp.45-78, 2021.

DOI: 10.5585/iji.v9i1.18246

Google Scholar

[19] S. Ghafur, E. Grass, N. R. Jennings, y A. Darzi, «The challenges of cybersecurity in health care: the UK National Health Service as a case study», The Lancet Digital Health, vol. 1, n.o 1, pp. e10-e12, may 2019.

DOI: 10.1016/S2589-7500(19)30005-6

Google Scholar

[20] H. S. Lallie et al., «Cyber security in the age of COVID-19: A timeline and analysis of cybercrime and cyber-attacks during the pandemic», Computers & Security, vol. 105, p.102248, jun. 2021.

DOI: 10.1016/j.cose.2021.102248

Google Scholar

[21] European Union Agency for Law Enforcement Cooperation, «Pandemic profiteering: how criminals exploit the COVID-19 crisis». 27 de marzo de 2020. Accedido: 15 de junio de 2023. [En línea].

Google Scholar

[22] P. Daly, «"Writing on a curved surface" The operational response to the cyber-attack on the Irish health service», Médecine de Catastrophe - Urgences Collectives, vol. 6, n.o 4, pp.275-277, dic. 2022.

DOI: 10.1016/j.pxur.2022.10.002

Google Scholar

[23] G. Martin, J. Kinross, y C. Hankin, «Effective cybersecurity is fundamental to patient safety», BMJ, p. j2375, may 2017.

DOI: 10.1136/bmj.j2375

Google Scholar

[24] S. Ghafur, S. Kristensen, K. Honeyford, G. Martin, A. Darzi, y P. Aylin, «A retrospective impact analysis of the WannaCry cyberattack on the NHS», npj Digit. Med., vol. 2, n.o 1, p.98, oct. 2019.

DOI: 10.1038/s41746-019-0161-6

Google Scholar

[25] Cyber Security Policy y Department of Health and Social Care, «Securing cyber resilience in health and care». octubre de 2018. [En línea].

Google Scholar

[26] S. Devi, «Cyber-attacks on health-care systems», The Lancet Oncology, vol. 24, n.o 4, p. e148, abr. 2023.

DOI: 10.1016/S1470-2045(23)00119-5

Google Scholar

[27] N. M. Thomasian y E. Y. Adashi, «Cybersecurity in the Internet of Medical Things», Health Policy and Technology, vol. 10, n.o 3, p.100549, sep. 2021.

DOI: 10.1016/j.hlpt.2021.100549

Google Scholar

[28] A. Strielkina, D. Uzun, y V. Kharchenko, «Modelling of healthcare IoT using the queueing theory », en 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Bucharest: IEEE, sep. 2017, pp.849-852.

DOI: 10.1109/IDAACS.2017.8095207

Google Scholar

[29] ISO/IEC 27032:2012., Guidelines for cybesesurity. UK, The international organization of standardization. (2012)

Google Scholar

[30] ISO/IEC 62304:2006, Medical device software. Software lifecircle. UK, The international organization of standardization. 2006.

Google Scholar

[31] A. Strielkina, O. Illiashenko, M. Zhydenko, y D. Uzun, «Cybersecurity of healthcare IoT-based systems: Regulation and case-oriented assessment», en 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine: IEEE, may 2018, pp.67-73.

DOI: 10.1109/DESSERT.2018.8409101

Google Scholar

[32] I. Keshta, «AI-driven IoT for smart health care: Security and privacy issues», Informatics in Medicine Unlocked, vol. 30, p.100903, ene. 2022.

DOI: 10.1016/j.imu.2022.100903

Google Scholar

[33] B. Singhal, G. Dhameja, y P. S. Panda, Beginning Blockchain. Berkeley, CA: Apress, 2018.

DOI: 10.1007/978-1-4842-3444-0

Google Scholar

[34] I. Bashir, Blockchain Consensus: An Introduction to Classical, Blockchain, and Quantum Consensus Protocols. 2022.

DOI: 10.1007/978-1-4842-8179-6

Google Scholar

[35] H. S. A. Fang, T. H. Tan, Y. F. C. Tan, y C. J. M. Tan, «Blockchain Personal Health Records: Systematic Review», J Med Internet Res, vol. 23, n.o 4, p. e25094, abr. 2021.

DOI: 10.2196/25094

Google Scholar

[36] M. P. McBee y C. Wilcox, «Blockchain Technology: Principles and Applications in Medical Imaging», J Digit Imaging, vol. 33, n.o 3, pp.726-734, jun. 2020, doi: 10.1007/s10278-019- 00310-3.

DOI: 10.1007/s10278-019-00310-3

Google Scholar

[37] X. Liu, Z. Wang, C. Jin, F. Li, y G. Li, «A Blockchain-Based Medical Data Sharing and Protection Scheme», IEEE Access, vol. 7, pp.118943-118953, 2019, doi: 10.1109/ACCESS. 2019.2937685.

DOI: 10.1109/access.2019.2937685

Google Scholar

[38] N. Ettaloui, S. Arezki, y T. Gadi, «An Overview of Blockchain-Based Electronic Health Records and Compliance with GDPR and HIPAA», Data and Metadata, vol. 2, pp.166-166, dic. 2023.

DOI: 10.56294/dm2023166

Google Scholar