SlideShare a Scribd company logo
Webinar

Patient remote monitoring
system
Privacy, medical devices and IP related issues of patient
remote monitoring systems and wearable technologies in
the healthcare sector
Global Lawyers Association
Giulio Coraggio
DLA Piper Italy
giulio.coraggio@dlapiper.com
December 19, 2013
We already talked about wearable tech…

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

2
Wearable technologies in the healthcare
sector

Remote patient monitoring (RPM), also called homecare
telehealth, is a type of ambulatory healthcare that allows a
patient to use a mobile medical device to perform a routine test
and send the test data to a healthcare professional in real-time.

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

3
What type of technologies are
relevant?

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

4
How does it work? Cloud projects!

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

5
Potential legal issues…

 Privacy – collection, transfer and processing of patients'
personal data;

 Medical device regulations – potential qualification of
hardware and software as medical devices;
 IP rights – how to protect the technology and the exclusivity
rights on its exploitation

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

6
Processing of patients' data
 Which data protection law applies?
 Opinion of the EU Working Party
 What consent and authorizations are required and from who?
 And in the case of biometric data?

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

7
Who does what?
 Understanding of the entities involved
 hospitals
 patients
 sponsor
 technology provider

 What are their roles?
 data controller
 data processor
 sub-processor

 Consequences on the purposes of processing of collected
data
 anonymous data
Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

8
Transfers of patients' data outside of the
European Union
 Approval from hospitals (data controller) as part of public
tenders
 When can it be implied? Is it negotiable? Can the denial be
challenged?

 Privacy-related options
 Patients' consent
 Binding corporate rules
 Safe Harbor program

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

9
Most common approach to manage
data transfers
 EU Model clauses
 data controller, data processor, sub-processor
 possible restrictions if the data processor is within the European
Union and the sub-processor(s) is (are) located outside of the
European Union

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

10
What other privacy issues to consider?
 What consent and authorizations are required? and in the case
of biometric data?
 What security measures shall be adopted?
 What data can be accessed? and by who?
 For what purposes personal data can be used?
 patient treatment
 clinical trials?
 articles on journals?

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

11
Is hardware treated as a medical device?
 Qualification of the hardware:
 hardware which may also be used within the medical environment
are normally not considered as medical devices, unless they are
specifically assigned a medical role
 hardware utilized together with the software in such a way that the
software may not otherwise run (i.e. the software would not run on
any other device), then the hardware should be regarded as MD
itself

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

12
Is software treated as a medical devices?
 Qualification of the software – this may be regarded as a
medical device when either:
 his purpose of use falls under one of the categories listed in the
definition of medical device; or
 it is intended to control or influence the functioning of a medical
device; or

 it is intended for the analysis of patient data generated by a
medical device with a view to diagnosis and monitoring; or
 it is intended for use for/by patients to diagnose or treat a physical
or mental condition or disease.

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

13
What is the impact on the growth of
this technology?
 Time to market?
 CE Marking
 Issues for updates/upgrades

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

14
How are these devices protected?
 IP rights on the technology?
 Patentability of the software/hardware?
 Trademark protection of generic terms by technology
companies?

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

15
Thank you!

Giulio Coraggio
DLA Piper Italy
T +39 02 80 618 619
M +39 334 68 81 147
E giulio.coraggio@dlapiper.com
Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

16

More Related Content

What's hot

Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Darek Czuchaj
 
Remote patient monitoring system
Remote patient monitoring systemRemote patient monitoring system
Remote patient monitoring system
carlajong
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
AT Internet
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPR
Tripwire
 
GDPR Jan 2018 1
GDPR  Jan 2018 1GDPR  Jan 2018 1
GDPR Jan 2018 1
Jason Chapman
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
Frederick Penaud
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
CIO Edge
 
A Focus on Data, Best's Review, September 2018
A Focus on Data, Best's Review, September 2018A Focus on Data, Best's Review, September 2018
A Focus on Data, Best's Review, September 2018
Gates Ouimette
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
Dimitri Sirota
 
Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
Trish McGinity, CCSK
 
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
TrustArc
 
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality
Susan Moran
 
Webianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection frameworkWebianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection framework
Leigh Hill
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
Sagara Gunathunga
 
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
TrustArc
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
Symantec
 
5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You
TrustArc
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
TrustArc
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
bradley_g
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
James Mulhern
 

What's hot (20)

Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
 
Remote patient monitoring system
Remote patient monitoring systemRemote patient monitoring system
Remote patient monitoring system
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPR
 
GDPR Jan 2018 1
GDPR  Jan 2018 1GDPR  Jan 2018 1
GDPR Jan 2018 1
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
 
A Focus on Data, Best's Review, September 2018
A Focus on Data, Best's Review, September 2018A Focus on Data, Best's Review, September 2018
A Focus on Data, Best's Review, September 2018
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
 
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
 
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality
 
Webianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection frameworkWebianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection framework
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 

Viewers also liked

Scommesse sportive online in Italia, come invertire il declino
Scommesse sportive online in Italia, come invertire il declinoScommesse sportive online in Italia, come invertire il declino
Scommesse sportive online in Italia, come invertire il declino
Giulio Coraggio
 
Intellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industryIntellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industry
Giulio Coraggio
 
Webinar italy remote gaming regulations
Webinar italy remote gaming regulationsWebinar italy remote gaming regulations
Webinar italy remote gaming regulations
Giulio Coraggio
 
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Giulio Coraggio
 
Legal requirements for operating in a videolottery market
Legal requirements for operating in a videolottery marketLegal requirements for operating in a videolottery market
Legal requirements for operating in a videolottery market
Giulio Coraggio
 
Cyber risk e assicurazioni
Cyber risk e assicurazioniCyber risk e assicurazioni
Cyber risk e assicurazioni
Giulio Coraggio
 
Drones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle themDrones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle them
Giulio Coraggio
 
Open API e problematiche legali al tempo del PSD2
Open API e problematiche legali al tempo del PSD2Open API e problematiche legali al tempo del PSD2
Open API e problematiche legali al tempo del PSD2
Giulio Coraggio
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property RightsShwet Kamal
 
Implementation of patient monitoring system using gsm technology
Implementation of patient monitoring system using gsm technologyImplementation of patient monitoring system using gsm technology
Implementation of patient monitoring system using gsm technologyIAEME Publication
 
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
Mirjana Acimovic
 
Guide to Unlawful Internet Gambling Enforcement Act of 2006
Guide to Unlawful Internet Gambling Enforcement Act of 2006Guide to Unlawful Internet Gambling Enforcement Act of 2006
Guide to Unlawful Internet Gambling Enforcement Act of 2006Manish Mandhyan
 
Information Technology and Compliance at KMCO Gaming
Information Technology and Compliance at KMCO GamingInformation Technology and Compliance at KMCO Gaming
Information Technology and Compliance at KMCO Gaming
houselan
 
Catherine Beardshaw: Driving efficiency with new technology
Catherine Beardshaw: Driving efficiency with new technologyCatherine Beardshaw: Driving efficiency with new technology
Catherine Beardshaw: Driving efficiency with new technology
Nuffield Trust
 
Efficiency of Remote Technical Support for the ICD follow-up outpatients
Efficiency of Remote Technical Support for the ICD follow-up outpatientsEfficiency of Remote Technical Support for the ICD follow-up outpatients
Efficiency of Remote Technical Support for the ICD follow-up outpatients
NayaMed
 
AML/CTF Compliance Presentation - Gaming
AML/CTF Compliance Presentation - GamingAML/CTF Compliance Presentation - Gaming
AML/CTF Compliance Presentation - Gaming
Narelle Davidson Hospitality Compliance Consultant
 
Dr Shommen Datta Patient Centric Healthcare
Dr Shommen Datta Patient Centric HealthcareDr Shommen Datta Patient Centric Healthcare
Dr Shommen Datta Patient Centric Healthcare
Enda Madden
 

Viewers also liked (17)

Scommesse sportive online in Italia, come invertire il declino
Scommesse sportive online in Italia, come invertire il declinoScommesse sportive online in Italia, come invertire il declino
Scommesse sportive online in Italia, come invertire il declino
 
Intellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industryIntellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industry
 
Webinar italy remote gaming regulations
Webinar italy remote gaming regulationsWebinar italy remote gaming regulations
Webinar italy remote gaming regulations
 
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
 
Legal requirements for operating in a videolottery market
Legal requirements for operating in a videolottery marketLegal requirements for operating in a videolottery market
Legal requirements for operating in a videolottery market
 
Cyber risk e assicurazioni
Cyber risk e assicurazioniCyber risk e assicurazioni
Cyber risk e assicurazioni
 
Drones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle themDrones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle them
 
Open API e problematiche legali al tempo del PSD2
Open API e problematiche legali al tempo del PSD2Open API e problematiche legali al tempo del PSD2
Open API e problematiche legali al tempo del PSD2
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Implementation of patient monitoring system using gsm technology
Implementation of patient monitoring system using gsm technologyImplementation of patient monitoring system using gsm technology
Implementation of patient monitoring system using gsm technology
 
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
 
Guide to Unlawful Internet Gambling Enforcement Act of 2006
Guide to Unlawful Internet Gambling Enforcement Act of 2006Guide to Unlawful Internet Gambling Enforcement Act of 2006
Guide to Unlawful Internet Gambling Enforcement Act of 2006
 
Information Technology and Compliance at KMCO Gaming
Information Technology and Compliance at KMCO GamingInformation Technology and Compliance at KMCO Gaming
Information Technology and Compliance at KMCO Gaming
 
Catherine Beardshaw: Driving efficiency with new technology
Catherine Beardshaw: Driving efficiency with new technologyCatherine Beardshaw: Driving efficiency with new technology
Catherine Beardshaw: Driving efficiency with new technology
 
Efficiency of Remote Technical Support for the ICD follow-up outpatients
Efficiency of Remote Technical Support for the ICD follow-up outpatientsEfficiency of Remote Technical Support for the ICD follow-up outpatients
Efficiency of Remote Technical Support for the ICD follow-up outpatients
 
AML/CTF Compliance Presentation - Gaming
AML/CTF Compliance Presentation - GamingAML/CTF Compliance Presentation - Gaming
AML/CTF Compliance Presentation - Gaming
 
Dr Shommen Datta Patient Centric Healthcare
Dr Shommen Datta Patient Centric HealthcareDr Shommen Datta Patient Centric Healthcare
Dr Shommen Datta Patient Centric Healthcare
 

Similar to Wearable technologies and remote patient remote monitoring system

Wearable Tech Privacy and Intellectual Property
Wearable Tech Privacy and Intellectual PropertyWearable Tech Privacy and Intellectual Property
Wearable Tech Privacy and Intellectual PropertyMike Evans
 
Ensure UDI Success!
Ensure UDI Success!Ensure UDI Success!
Ensure UDI Success!
david_h
 
Digital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences JulyDigital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences JulyPaul Gulbin
 
Up conf-2013-m2 m-and-patient-care-final
Up conf-2013-m2 m-and-patient-care-finalUp conf-2013-m2 m-and-patient-care-final
Up conf-2013-m2 m-and-patient-care-finalsapenov
 
Freyr UDI Services
Freyr UDI ServicesFreyr UDI Services
Freyr UDI Services
Yasser Mohammad
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratch
Techugo
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know
Sarah Crabb
 
Presentation: The challenges of regulating direct to consumer digital medical...
Presentation: The challenges of regulating direct to consumer digital medical...Presentation: The challenges of regulating direct to consumer digital medical...
Presentation: The challenges of regulating direct to consumer digital medical...
TGA Australia
 
The challenges of regulating direct to consumer digital medical devices
The challenges of regulating direct to consumer digital medical devicesThe challenges of regulating direct to consumer digital medical devices
The challenges of regulating direct to consumer digital medical devices
TGA Australia
 
The integration of mobile and medical technologies
The integration of mobile and medical technologies  The integration of mobile and medical technologies
The integration of mobile and medical technologies
UBMCanon
 
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
The Petrie-Flom Center for Health Law Policy, Biotechnology, and Bioethics
 
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
pselonen
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devices
Flaskdata.io
 
eHealth and mhealth presentation
eHealth and mhealth presentationeHealth and mhealth presentation
eHealth and mhealth presentation
Erik Vollebregt
 
Development Standards and Regulations for HealthTech
Development Standards and Regulations for HealthTechDevelopment Standards and Regulations for HealthTech
Development Standards and Regulations for HealthTech
Elinext
 
UDI Article
UDI ArticleUDI Article
UDI Articlekgrygiel
 
Breakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesBreakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical Devices
Healthegy
 
Silicon Peel Meetup #18
Silicon Peel Meetup #18Silicon Peel Meetup #18
Silicon Peel Meetup #18
riccentre2
 
The regulation of software: Medicines, biologicals, blood, tissues and devices
The regulation of software: Medicines, biologicals, blood, tissues and devicesThe regulation of software: Medicines, biologicals, blood, tissues and devices
The regulation of software: Medicines, biologicals, blood, tissues and devices
TGA Australia
 
DTx Development
DTx DevelopmentDTx Development
DTx Development
Emily Kunka, MS, CCRP
 

Similar to Wearable technologies and remote patient remote monitoring system (20)

Wearable Tech Privacy and Intellectual Property
Wearable Tech Privacy and Intellectual PropertyWearable Tech Privacy and Intellectual Property
Wearable Tech Privacy and Intellectual Property
 
Ensure UDI Success!
Ensure UDI Success!Ensure UDI Success!
Ensure UDI Success!
 
Digital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences JulyDigital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences July
 
Up conf-2013-m2 m-and-patient-care-final
Up conf-2013-m2 m-and-patient-care-finalUp conf-2013-m2 m-and-patient-care-final
Up conf-2013-m2 m-and-patient-care-final
 
Freyr UDI Services
Freyr UDI ServicesFreyr UDI Services
Freyr UDI Services
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratch
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know
 
Presentation: The challenges of regulating direct to consumer digital medical...
Presentation: The challenges of regulating direct to consumer digital medical...Presentation: The challenges of regulating direct to consumer digital medical...
Presentation: The challenges of regulating direct to consumer digital medical...
 
The challenges of regulating direct to consumer digital medical devices
The challenges of regulating direct to consumer digital medical devicesThe challenges of regulating direct to consumer digital medical devices
The challenges of regulating direct to consumer digital medical devices
 
The integration of mobile and medical technologies
The integration of mobile and medical technologies  The integration of mobile and medical technologies
The integration of mobile and medical technologies
 
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
 
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devices
 
eHealth and mhealth presentation
eHealth and mhealth presentationeHealth and mhealth presentation
eHealth and mhealth presentation
 
Development Standards and Regulations for HealthTech
Development Standards and Regulations for HealthTechDevelopment Standards and Regulations for HealthTech
Development Standards and Regulations for HealthTech
 
UDI Article
UDI ArticleUDI Article
UDI Article
 
Breakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesBreakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical Devices
 
Silicon Peel Meetup #18
Silicon Peel Meetup #18Silicon Peel Meetup #18
Silicon Peel Meetup #18
 
The regulation of software: Medicines, biologicals, blood, tissues and devices
The regulation of software: Medicines, biologicals, blood, tissues and devicesThe regulation of software: Medicines, biologicals, blood, tissues and devices
The regulation of software: Medicines, biologicals, blood, tissues and devices
 
DTx Development
DTx DevelopmentDTx Development
DTx Development
 

More from Giulio Coraggio

Come conformarsi al Regolamento DORA sulla cybersecurity
Come conformarsi al Regolamento DORA sulla cybersecurityCome conformarsi al Regolamento DORA sulla cybersecurity
Come conformarsi al Regolamento DORA sulla cybersecurity
Giulio Coraggio
 
Infografica sulle 5 regole privacy per i programmi di fidelizzazione
Infografica sulle 5 regole privacy per i programmi di fidelizzazioneInfografica sulle 5 regole privacy per i programmi di fidelizzazione
Infografica sulle 5 regole privacy per i programmi di fidelizzazione
Giulio Coraggio
 
Direttiva NIS2 - Nuovi obblighi legali di cybersecurity
Direttiva NIS2 - Nuovi obblighi legali di cybersecurityDirettiva NIS2 - Nuovi obblighi legali di cybersecurity
Direttiva NIS2 - Nuovi obblighi legali di cybersecurity
Giulio Coraggio
 
Decreti di adeguamento ai regolamenti MDR e IVDR
Decreti di adeguamento ai regolamenti MDR e IVDRDecreti di adeguamento ai regolamenti MDR e IVDR
Decreti di adeguamento ai regolamenti MDR e IVDR
Giulio Coraggio
 
Nuove normativa sulla accessibilità applicabili a qualsiasi sito web
Nuove normativa sulla accessibilità applicabili a qualsiasi sito webNuove normativa sulla accessibilità applicabili a qualsiasi sito web
Nuove normativa sulla accessibilità applicabili a qualsiasi sito web
Giulio Coraggio
 
New Italian rules on accessibility of websites
New Italian rules on accessibility of websitesNew Italian rules on accessibility of websites
New Italian rules on accessibility of websites
Giulio Coraggio
 
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
Giulio Coraggio
 
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenzeDOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
Giulio Coraggio
 
Good practices and common pitfalls on advertising of medical devices in Italy
Good practices and common pitfalls on advertising of medical devices in ItalyGood practices and common pitfalls on advertising of medical devices in Italy
Good practices and common pitfalls on advertising of medical devices in Italy
Giulio Coraggio
 
Le modifiche del Codice del Consumo, come impattano sulle aziende
Le modifiche del Codice del Consumo, come impattano sulle aziendeLe modifiche del Codice del Consumo, come impattano sulle aziende
Le modifiche del Codice del Consumo, come impattano sulle aziende
Giulio Coraggio
 
Good practices and common pitfalls on advertising of tobacco products in Italy
Good practices and common pitfalls on advertising of tobacco products in ItalyGood practices and common pitfalls on advertising of tobacco products in Italy
Good practices and common pitfalls on advertising of tobacco products in Italy
Giulio Coraggio
 
Good practices and common pitfalls on advertising of alcoholic products in Italy
Good practices and common pitfalls on advertising of alcoholic products in ItalyGood practices and common pitfalls on advertising of alcoholic products in Italy
Good practices and common pitfalls on advertising of alcoholic products in Italy
Giulio Coraggio
 
Good practices and common pitfalls on advertising of medicines in Italy
Good practices and common pitfalls on advertising of medicines in ItalyGood practices and common pitfalls on advertising of medicines in Italy
Good practices and common pitfalls on advertising of medicines in Italy
Giulio Coraggio
 
Good practices and common pitfalls on advertising of cosmetics in Italy
Good practices and common pitfalls on advertising of cosmetics in ItalyGood practices and common pitfalls on advertising of cosmetics in Italy
Good practices and common pitfalls on advertising of cosmetics in Italy
Giulio Coraggio
 
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
Giulio Coraggio
 
Italian Gambling Advertising Ban – Don'ts and Do's
Italian Gambling Advertising Ban – Don'ts and Do'sItalian Gambling Advertising Ban – Don'ts and Do's
Italian Gambling Advertising Ban – Don'ts and Do's
Giulio Coraggio
 
Good practices and common pitfalls on ESG advertising in Italy
Good practices and common pitfalls on ESG advertising in ItalyGood practices and common pitfalls on ESG advertising in Italy
Good practices and common pitfalls on ESG advertising in Italy
Giulio Coraggio
 
Come gestire gli obblighi privacy di un attacco ransomware
Come gestire gli obblighi privacy di un attacco ransomwareCome gestire gli obblighi privacy di un attacco ransomware
Come gestire gli obblighi privacy di un attacco ransomware
Giulio Coraggio
 
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
Giulio Coraggio
 
Come gestire un data breach da attacco ransomware
Come gestire un data breach da attacco ransomwareCome gestire un data breach da attacco ransomware
Come gestire un data breach da attacco ransomware
Giulio Coraggio
 

More from Giulio Coraggio (20)

Come conformarsi al Regolamento DORA sulla cybersecurity
Come conformarsi al Regolamento DORA sulla cybersecurityCome conformarsi al Regolamento DORA sulla cybersecurity
Come conformarsi al Regolamento DORA sulla cybersecurity
 
Infografica sulle 5 regole privacy per i programmi di fidelizzazione
Infografica sulle 5 regole privacy per i programmi di fidelizzazioneInfografica sulle 5 regole privacy per i programmi di fidelizzazione
Infografica sulle 5 regole privacy per i programmi di fidelizzazione
 
Direttiva NIS2 - Nuovi obblighi legali di cybersecurity
Direttiva NIS2 - Nuovi obblighi legali di cybersecurityDirettiva NIS2 - Nuovi obblighi legali di cybersecurity
Direttiva NIS2 - Nuovi obblighi legali di cybersecurity
 
Decreti di adeguamento ai regolamenti MDR e IVDR
Decreti di adeguamento ai regolamenti MDR e IVDRDecreti di adeguamento ai regolamenti MDR e IVDR
Decreti di adeguamento ai regolamenti MDR e IVDR
 
Nuove normativa sulla accessibilità applicabili a qualsiasi sito web
Nuove normativa sulla accessibilità applicabili a qualsiasi sito webNuove normativa sulla accessibilità applicabili a qualsiasi sito web
Nuove normativa sulla accessibilità applicabili a qualsiasi sito web
 
New Italian rules on accessibility of websites
New Italian rules on accessibility of websitesNew Italian rules on accessibility of websites
New Italian rules on accessibility of websites
 
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
 
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenzeDOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
 
Good practices and common pitfalls on advertising of medical devices in Italy
Good practices and common pitfalls on advertising of medical devices in ItalyGood practices and common pitfalls on advertising of medical devices in Italy
Good practices and common pitfalls on advertising of medical devices in Italy
 
Le modifiche del Codice del Consumo, come impattano sulle aziende
Le modifiche del Codice del Consumo, come impattano sulle aziendeLe modifiche del Codice del Consumo, come impattano sulle aziende
Le modifiche del Codice del Consumo, come impattano sulle aziende
 
Good practices and common pitfalls on advertising of tobacco products in Italy
Good practices and common pitfalls on advertising of tobacco products in ItalyGood practices and common pitfalls on advertising of tobacco products in Italy
Good practices and common pitfalls on advertising of tobacco products in Italy
 
Good practices and common pitfalls on advertising of alcoholic products in Italy
Good practices and common pitfalls on advertising of alcoholic products in ItalyGood practices and common pitfalls on advertising of alcoholic products in Italy
Good practices and common pitfalls on advertising of alcoholic products in Italy
 
Good practices and common pitfalls on advertising of medicines in Italy
Good practices and common pitfalls on advertising of medicines in ItalyGood practices and common pitfalls on advertising of medicines in Italy
Good practices and common pitfalls on advertising of medicines in Italy
 
Good practices and common pitfalls on advertising of cosmetics in Italy
Good practices and common pitfalls on advertising of cosmetics in ItalyGood practices and common pitfalls on advertising of cosmetics in Italy
Good practices and common pitfalls on advertising of cosmetics in Italy
 
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
 
Italian Gambling Advertising Ban – Don'ts and Do's
Italian Gambling Advertising Ban – Don'ts and Do'sItalian Gambling Advertising Ban – Don'ts and Do's
Italian Gambling Advertising Ban – Don'ts and Do's
 
Good practices and common pitfalls on ESG advertising in Italy
Good practices and common pitfalls on ESG advertising in ItalyGood practices and common pitfalls on ESG advertising in Italy
Good practices and common pitfalls on ESG advertising in Italy
 
Come gestire gli obblighi privacy di un attacco ransomware
Come gestire gli obblighi privacy di un attacco ransomwareCome gestire gli obblighi privacy di un attacco ransomware
Come gestire gli obblighi privacy di un attacco ransomware
 
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
 
Come gestire un data breach da attacco ransomware
Come gestire un data breach da attacco ransomwareCome gestire un data breach da attacco ransomware
Come gestire un data breach da attacco ransomware
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 

Wearable technologies and remote patient remote monitoring system

  • 1. Webinar Patient remote monitoring system Privacy, medical devices and IP related issues of patient remote monitoring systems and wearable technologies in the healthcare sector Global Lawyers Association Giulio Coraggio DLA Piper Italy giulio.coraggio@dlapiper.com December 19, 2013
  • 2. We already talked about wearable tech… Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 2
  • 3. Wearable technologies in the healthcare sector Remote patient monitoring (RPM), also called homecare telehealth, is a type of ambulatory healthcare that allows a patient to use a mobile medical device to perform a routine test and send the test data to a healthcare professional in real-time. Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 3
  • 4. What type of technologies are relevant? Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 4
  • 5. How does it work? Cloud projects! Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 5
  • 6. Potential legal issues…  Privacy – collection, transfer and processing of patients' personal data;  Medical device regulations – potential qualification of hardware and software as medical devices;  IP rights – how to protect the technology and the exclusivity rights on its exploitation Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 6
  • 7. Processing of patients' data  Which data protection law applies?  Opinion of the EU Working Party  What consent and authorizations are required and from who?  And in the case of biometric data? Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 7
  • 8. Who does what?  Understanding of the entities involved  hospitals  patients  sponsor  technology provider  What are their roles?  data controller  data processor  sub-processor  Consequences on the purposes of processing of collected data  anonymous data Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 8
  • 9. Transfers of patients' data outside of the European Union  Approval from hospitals (data controller) as part of public tenders  When can it be implied? Is it negotiable? Can the denial be challenged?  Privacy-related options  Patients' consent  Binding corporate rules  Safe Harbor program Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 9
  • 10. Most common approach to manage data transfers  EU Model clauses  data controller, data processor, sub-processor  possible restrictions if the data processor is within the European Union and the sub-processor(s) is (are) located outside of the European Union Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 10
  • 11. What other privacy issues to consider?  What consent and authorizations are required? and in the case of biometric data?  What security measures shall be adopted?  What data can be accessed? and by who?  For what purposes personal data can be used?  patient treatment  clinical trials?  articles on journals? Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 11
  • 12. Is hardware treated as a medical device?  Qualification of the hardware:  hardware which may also be used within the medical environment are normally not considered as medical devices, unless they are specifically assigned a medical role  hardware utilized together with the software in such a way that the software may not otherwise run (i.e. the software would not run on any other device), then the hardware should be regarded as MD itself Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 12
  • 13. Is software treated as a medical devices?  Qualification of the software – this may be regarded as a medical device when either:  his purpose of use falls under one of the categories listed in the definition of medical device; or  it is intended to control or influence the functioning of a medical device; or  it is intended for the analysis of patient data generated by a medical device with a view to diagnosis and monitoring; or  it is intended for use for/by patients to diagnose or treat a physical or mental condition or disease. Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 13
  • 14. What is the impact on the growth of this technology?  Time to market?  CE Marking  Issues for updates/upgrades Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 14
  • 15. How are these devices protected?  IP rights on the technology?  Patentability of the software/hardware?  Trademark protection of generic terms by technology companies? Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 15
  • 16. Thank you! Giulio Coraggio DLA Piper Italy T +39 02 80 618 619 M +39 334 68 81 147 E giulio.coraggio@dlapiper.com Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 16

Editor's Notes

  1. MedronicInsertable Cardiac Monitor: An insertable cardiac monitor is a small implantable device that continuously monitors heart rhythms and records them automatically or by using a hand-held patient activator. The device is implanted just beneath the skin in the upper chest area during a simple procedure. The insertable cardiac monitor is programmed to continuously monitor your heart’s activity in the form of an electrocardiogram (ECG). When a fainting spell occurs, you or your family member should immediately place a small hand-held activator over the cardiac monitor and press a button.
  2. deliberaworking party sulle appautorizzazione generale del Garantenotifica al Garante della privacy per profilazione e utilizzo di dati biometrici
  3. Aggiungi foto con mappa
  4. In this case, the software is a component and integral part of the MD and is not regarded as a medical device in its own. Therefore, hardware and software should fall automatically into the same class.