Skip to content
2000
image of Cybersecurity, Research Data Management (RDM), and Regulatory Compliance in Clinical Trials

Abstract

Introduction

The intersection of drug discovery and cybersecurity is becoming critical as the pharmaceutical sector adopts digital technologies to drive research and development. Drug discovery entails extensive collaboration and large volumes of data, making it highly susceptible to cyberattacks. Emerging technologies, such as big data analytics, artificial intelligence (AI), and cloud computing, hold significant innovation potential but also pose risks to the industry that can undermine intellectual property (IP), clinical trial results, and collaborative research. This review discusses the importance of cybersecurity in the drug discovery process. The focus is on determining major threats, defining best practices for protecting sensitive information, and ensuring compliance with regulatory requirements. The objective is to highlight the strategic significance of cybersecurity practices in protecting research integrity and fostering innovation.

Methods

The review-based approach is employed to analyze present-day trends in drug discovery cybersecurity. Emerging technologies, security issues, regulatory needs, and the security controls most frequently utilized in the industry, such as encryption, multi-factor authentication, and secure data sharing, are discussed in the chapter.

Results

The pharmaceutical sector has advanced significantly in securing sensitive research information through robust cybersecurity measures. However, the vulnerabilities remain for cloud security as well as for protecting AI models. Adhering to the regulatory guidelines of GDPR (General Data Protection Regulation) and HIPAA (Health Insurance Portability and Accountability Act) remains a concern as international norms evolve.

Discussion

As digital technologies transform drug discovery, cybersecurity has become crucial in protecting sensitive data and intellectual property rights. Strengthening compliance with evolving regulations is key to ensuring safety and innovative pharmaceutical research.

Conclusion

Cybersecurity is critical in preserving the integrity of drug discovery. With the increasing adoption of digital technologies, pharmaceutical firms must implement robust cybersecurity measures to protect sensitive information, ensure compliance, and foster innovation in a secure environment.

Loading

Article metrics loading...

/content/journals/rrct/10.2174/0115748871360236250901072442
2025-09-12
2025-10-31
Loading full text...

Full text loading...

References

  1. Chinnaiyan K. Mugundhan S.L. Narayanasamy D. Mohan M. Revolutionizing healthcare and drug discovery: The impact of artificial intelligence on pharmaceutical development. Curr. Drug Ther. 2024 19 1 6 10.2174/0115748855313948240711043701
    [Google Scholar]
  2. PiottoS.MarrafinoF.SessaL.Advancing drug discovery through integrative computational models and AI technologies.RExPO24 Conf20241 6 10.58647/REXPO.23000034.v1
    [Google Scholar]
  3. Dave P. How AI can revolutionize the pharmaceutical industry. J. Drug Deliv. Ther. 2024 14 6 179 183 10.22270/jddt.v14i6.6657
    [Google Scholar]
  4. Barua R. Das D. Biswas N. Revolutionizing drug discovery with artificial intelligence. Advances in Medical Technologies and Clinical Practice Book Series. Pennsylvania, USA IGI Global 2024 10.4018/979‑8‑3693‑2238‑3.ch004
    [Google Scholar]
  5. Sanjay K.D. Gadekar P.S. Patil K.V.T. Transforming drug discovery: The impact of artificial intelligence and machine learning from initial screening to clinical trials. Int. J. Res. Appl. Sci. Eng. Technol. 2024 12 8 503 508 10.22214/ijraset.2024.63936
    [Google Scholar]
  6. Marak B.N. Dowarah J. Khiangte L. Singh V.P. Step toward repurposing drug discovery for COVID ‐19 therapeutics through in silico approach. Drug Dev. Res. 2021 82 3 374 392 10.1002/ddr.21757
    [Google Scholar]
  7. Hole G. Hole A.S. McFalone-Shaw I. Digitalization in pharmaceutical industry: What to focus on under the digital implementation process? Int. J. Pharm. X 2021 3 100095 10.1016/j.ijpx.2021.100095
    [Google Scholar]
  8. Aljuraid R. Justinia T. Classification of challenges and threats in healthcare cybersecurity: A systematic review. Stud. Health Technol. Inform. 2022 295 362 365 10.3233/SHTI220739
    [Google Scholar]
  9. Nifakos S. Chandramouli K. Nikolaou C.K. Influence of human factors on cybersecurity within healthcare organizations: A systematic review. Sensors 2021 21 15 5119 10.3390/s21155119
    [Google Scholar]
  10. Ewoh P. Vartiainen T. Vulnerability to cyberattacks and sociotechnical solutions for healthcare systems: Systematic review. J. Med. Internet Res. 2024 26 46904 10.2196/46904
    [Google Scholar]
  11. Flavin A. O’Toole E. Murphy L. A national cyberattack affecting radiation therapy: The irish experience. Adv. Radiat. Oncol. 2022 7 5 100914 10.1016/j.adro.2022.100914
    [Google Scholar]
  12. Russell S.P. Fahey E. Curtin M. Rowley S. Kenny P. Cashman J. The irish national orthopaedic register under cyberattack: What happened, and what were the consequences? Clin. Orthop. Relat. Res. 2023 481 9 1763 1768 10.1097/CORR.0000000000002643
    [Google Scholar]
  13. Umscheid C.A. Margolis D.J. Grossman C.E. Key concepts of clinical trials: A narrative review. Postgrad. Med. 2011 123 5 194 204 10.3810/pgm.2011.09.2475
    [Google Scholar]
  14. Dodd LE Proschan MA Data and safety monitoring board monitoring of clinical trials for early efficacy. NEJM Evid 2022 1 3 10.1056/EVIDctw2100025
    [Google Scholar]
  15. Jongen P.J.H. Data handling in clinical trials: An ongoing debate. Mult. Scler. 1995 1 1 Suppl. S60 S63 10.1177/1352458519950101060
    [Google Scholar]
  16. Dixon D.O. Weiss S. Cahill K. Data and safety monitoring policy for National Institute of Allergy and Infectious Diseases clinical trials. Clin. Trials 2011 8 6 727 735 10.1177/1740774511425181
    [Google Scholar]
  17. Chen-Mok M. VanRaden M.J. Higgs E.S. Dominik R. Experiences and challenges in data monitoring for clinical trials within an international tropical disease research network. Clin. Trials 2006 3 5 469 477 10.1177/1740774506070710
    [Google Scholar]
  18. Role of the data safety and monitoring board in an international trial. AIDS 2007 21 Suppl. 2 S99 S102 10.1097/01.aids.0000266462.33891.0b
    [Google Scholar]
  19. Williams G.W. The other side of clinical trial monitoring; assuring data quality and procedural adherence. Clin. Trials 2006 3 6 530 537 10.1177/1740774506073104
    [Google Scholar]
  20. Brosteanu O. Houben P. Ihrig K. Risk analysis and risk adapted on-site monitoring in noncommercial clinical trials. Clin. Trials 2009 6 6 585 596 10.1177/1740774509347398
    [Google Scholar]
  21. Baban N.S. Saha S. Jancheska S. Material-level countermeasures for securing microfluidic biochips. Lab Chip 2023 23 19 4213 4231 10.1039/D3LC00335C
    [Google Scholar]
  22. Baban N.S. Zhou J. Elkhoury K. BioTrojans: Viscoelastic microvalve-based attacks in flow-based microfluidic biochips and their countermeasures. Sci. Rep. 2024 14 1 19806 10.1038/s41598‑024‑70703‑0
    [Google Scholar]
  23. Danazumi M.S. Bello B. Yakasai A.M. Kaka B. Two manual therapy techniques for management of lumbar radiculopathy: A randomized clinical trial. J Osteopath Med 2021 121 4 391 400 10.1515/jom‑2020‑0261
    [Google Scholar]
  24. Dias F.M. Martens M.L. Monken S.F.P. Silva L.F. Santibanez-Gonzalez E.D.R. Risk management focusing on the best practices of data security systems for healthcare. Inter J Innovat 2021 9 1 45 78 10.5585/iji.v9i1.18246
    [Google Scholar]
  25. Rakesh Nayak Role of data science and cybersecurity in fighting healthcare fraud. In: Cybersecurity and data management innovations for revolutionizing healthcare. Pennsylvania, USA IGI Global 2024 81 97 10.4018/979‑8‑3693‑7457‑3.ch004
    [Google Scholar]
  26. SaberiKamarposhti M Ng K-W Chua F-F Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data. Heliyon 2024 10 10 31406 10.1016/j.heliyon.2024.e31406
    [Google Scholar]
  27. Bhattacharya S. Saha C.N. Intellectual property rights: An overview and implications in pharmaceutical industry. J. Adv. Pharm. Technol. Res. 2011 2 2 88 93 10.4103/2231‑4040.82952
    [Google Scholar]
  28. Gomase V.S. Dhamane S.P. Jagdale S.C. Intellectual property rights effects on india pharmaceutical industry. Recent Pat. Biotechnol. 2025 2025 1 5
    [Google Scholar]
  29. Gomase V. Kemkar K. Potnis V. Intellectual property rights: Protection of biotechnological inventions in india. Recent Pat. Biotechnol. 2024 18 2 128 143 10.2174/1872208317666230612145600
    [Google Scholar]
  30. Kruse C.S. Frederick B. Jacobson T. Monticone D.K. Cybersecurity in healthcare: A systematic review of modern threats and trends. Technol. Health Care 2017 25 1 1 10 10.3233/THC‑161263
    [Google Scholar]
  31. Alanazi A.T. Clinicians’ perspectives on healthcare cybersecurity and cyber threats. Cureus 2023 15 10 47026 10.7759/cureus.47026
    [Google Scholar]
  32. Ibrahim A.M. Abdel-Aziz H.R. Mohamed H.A.H. Balancing confidentiality and care coordination: Challenges in patient privacy. BMC Nurs. 2024 23 1 564 10.1186/s12912‑024‑02231‑1
    [Google Scholar]
  33. Abbou B. Kessel B. Ben Natan M. When all computers shut down: The clinical impact of a major cyber-attack on a general hospital. Front Digit Health 2024 6 1321485 10.3389/fdgth.2024.1321485
    [Google Scholar]
  34. Lieneck C. McLauchlan M. Phillips S. Healthcare cybersecurity ethical concerns during the covid-19 global pandemic: A rapid review. Health Care 2023 11 22 2983 10.3390/healthcare11222983
    [Google Scholar]
  35. Coventry L. Branley D. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas 2018 113 48 52 10.1016/j.maturitas.2018.04.008
    [Google Scholar]
  36. Luna R. Rhine E. Myhra M. Sullivan R. Kruse C.S. Cyber threats to health information systems: A systematic review. Technol. Health Care 2016 24 1 1 9 10.3233/THC‑151102
    [Google Scholar]
  37. Bani Issa W. Al Akour I. Ibrahim A. Privacy, confidentiality, security and patient safety concerns about electronic health records. Int. Nurs. Rev. 2020 67 2 218 230 10.1111/inr.12585
    [Google Scholar]
  38. Kruse C.S. Smith B. Vanderlinden H. Nealand A. Security techniques for the electronic health records. J. Med. Syst. 2017 41 8 127 10.1007/s10916‑017‑0778‑4
    [Google Scholar]
  39. Wilson K. Khansa L. Migrating to electronic health record systems: A comparative study between the United States and the United Kingdom. Health Policy 2018 122 11 1232 1239 10.1016/j.healthpol.2018.08.013
    [Google Scholar]
  40. Elendu C. Omeludike E.K. Oloyede P.O. Obidigbo B.T. Omeludike J.C. Legal implications for clinicians in cybersecurity incidents. A review. Medicine 2024 103 39 39887 10.1097/MD.0000000000039887
    [Google Scholar]
  41. Maundrell N. Implementation of automation, IT support and cybersecurity in bioanalysis. Bioanalysis 2022 14 14 963 965 10.4155/bio‑2022‑0113
    [Google Scholar]
  42. Wylde V. Rawindaran N. Lawrence J. Cybersecurity, data privacy and blockchain: A review. SN Comput Sci 2022 3 2 127 10.1007/s42979‑022‑01020‑4
    [Google Scholar]
  43. Lee S. Kim J. Kwon Y. Kim T. Cho S. Privacy preservation in patient information exchange systems based on blockchain: System design study. J. Med. Internet Res. 2022 24 3 29108 10.2196/29108
    [Google Scholar]
  44. Alamri B. Crowley K. Richardson I. Cybersecurity risk management framework for blockchain identity management systems in health IoT. Sensors 2022 23 1 218 10.3390/s23010218
    [Google Scholar]
  45. Hassan J. Saeed S.M. Deka L. Uddin M.J. Das D.B. Applications of machine learning (ML) and mathematical modeling (MM) in healthcare with special focus on cancer prognosis and anticancer therapy: Current status and challenges. Pharmaceutics 2024 16 2 260 10.3390/pharmaceutics16020260
    [Google Scholar]
  46. Harries D. Yellowlees P.M. Cyberterrorism: Is the U.S. healthcare system safe? Telemed. J. E Health 2013 19 1 61 66 10.1089/tmj.2012.0022
    [Google Scholar]
  47. Sendelj R. Ognjanovic I. Cybersecurity challenges in healthcare. Stud. Health Technol. Inform. 2022 300 190 202 10.3233/SHTI220951
    [Google Scholar]
  48. Spanakis E.G. Bonomi S. Sfakianakis S. Cyber-attacks and threats for healthcare - a multi-layer thread analysis. Annu. Int. Conf. IEEE Eng. Med. Biol. Soc. 2020 2020 5705 5708 10.1109/EMBC44109.2020.9176698
    [Google Scholar]
  49. Fayans I. Motro Y. Rokach L. Oren Y. Moran-Gilad J. Cyber security threats in the microbial genomics era: Implications for public health. Euro Surveill. 2020 25 6 1900574 10.2807/1560‑7917.ES.2020.25.6.1900574
    [Google Scholar]
  50. Tully J. Selzer J. Phillips J.P. O’Connor P. Dameff C. Healthcare challenges in the era of cybersecurity. Health Secur. 2020 18 3 228 231 10.1089/hs.2019.0123
    [Google Scholar]
  51. Sullivan N. Tully J. Dameff C. Opara C. Snead M. Selzer J. A national survey of hospital cyber attack emergency operation preparedness. Disaster Med. Public Health Prep. 2023 17 363 10.1017/dmp.2022.283
    [Google Scholar]
  52. Dameff C. Tully J. Chan T.C. Ransomware attack associated with disruptions at adjacent emergency departments in the US. JAMA Netw. Open 2023 6 5 2312270 10.1001/jamanetworkopen.2023.12270
    [Google Scholar]
  53. Keogh R.J. Harvey H. Brady C. Dealing with digital paralysis: Surviving a cyberattack in a National Cancer center. J. Cancer Policy 2024 39 100466 10.1016/j.jcpo.2023.100466
    [Google Scholar]
  54. Pham T.T. Loo T.M. Malhotra A. Ransomware cyberattack associated with cardiac arrest incidence and outcomes at untargeted, adjacent hospitals. Crit. Care Explor. 2024 6 4 1079 10.1097/CCE.0000000000001079
    [Google Scholar]
  55. Dullea E. Budke C. Enko P. Cybersecurity update: Recent ransomware attacks against healthcare providers. Mo. Med. 2020 117 6 533 534
    [Google Scholar]
  56. Byrne M.D. Cybersecurity and the new age of ransomware attacks. J. Perianesth. Nurs. 2021 36 5 594 596 10.1016/j.jopan.2021.07.004
    [Google Scholar]
  57. Mohammed Yakubu A. Chen Y.P.P. Ensuring privacy and security of genomic data and functionalities. Brief. Bioinform. 2020 21 2 511 526 10.1093/bib/bbz013
    [Google Scholar]
  58. Oh S.R. Seo Y.D. Lee E. Kim Y.G. A comprehensive survey on security and privacy for electronic health data. Int. J. Environ. Res. Public Health 2021 18 18 9668 10.3390/ijerph18189668
    [Google Scholar]
  59. Saadat A. Siddiqui T. Taseen S. Mughal S. Revolutionising impacts of artificial intelligence on health care system and its related medical in-transparencies. Ann. Biomed. Eng. 2024 52 6 1546 1548 10.1007/s10439‑023‑03343‑6
    [Google Scholar]
  60. Liang C. Wagstaff J. Aharony N. Schmit V. Manheim D. Managing the transition to widespread metagenomic monitoring: Policy considerations for future biosurveillance. Health Secur. 2023 21 1 34 45 10.1089/hs.2022.0029
    [Google Scholar]
  61. Simalatsar A. Synthetic biomedical data generation in support of In Silico Clinical Trials. Front Big Data 2023 6 1085571 10.3389/fdata.2023.1085571
    [Google Scholar]
  62. Mehtälä J. Ali M. Miettinen T. Utilization of anonymization techniques to create an external control arm for clinical trial data. BMC Med. Res. Methodol. 2023 23 1 258 10.1186/s12874‑023‑02082‑5
    [Google Scholar]
  63. Pilgram L. Meurers T. Malin B. Schaeffner E. Eckardt K.U. Prasser F. The costs of anonymization: Case study using clinical data. J. Med. Internet Res. 2024 26 49445 10.2196/49445
    [Google Scholar]
  64. Zuo Z. Watson M. Budgen D. Hall R. Kennelly C. Al Moubayed N. Data anonymization for pervasive health care: Systematic literature mapping study. JMIR Med. Inform. 2021 9 10 29871 10.2196/29871
    [Google Scholar]
  65. Dal-Ré R. Clinical trial transparency and access to anonymized individual participant data. Rev. Psiquiatr. Salud Ment. 2017 10 1 1 6 10.1016/j.rpsmen.2016.11.006
    [Google Scholar]
  66. Smith J.S. Roitberg A.E. Isayev O. Transforming computational drug discovery with machine learning and AI. ACS Med. Chem. Lett. 2018 9 11 1065 1069 10.1021/acsmedchemlett.8b00437
    [Google Scholar]
  67. Vemula D. Jayasurya P. Sushmitha V. Kumar Y.N. Bhandari V. CADD, AI and ML in drug discovery: A comprehensive review. Eur. J. Pharm. Sci. 2023 181 106324 10.1016/j.ejps.2022.106324
    [Google Scholar]
  68. Sarkar C. Das B. Rawat V.S. Artificial intelligence and machine learning technology driven modern drug discovery and development. Int. J. Mol. Sci. 2023 24 3 2026 10.3390/ijms24032026
    [Google Scholar]
  69. Kolluri S. Lin J. Liu R. Zhang Y. Zhang W. Machine learning and artificial intelligence in pharmaceutical research and development: A review. AAPS J. 2022 24 1 19 10.1208/s12248‑021‑00644‑3
    [Google Scholar]
  70. Vashishat A. Gupta G.D. Kurmi B.D. Revolutionizing drug discovery: The role of ai and machine learning. Curr. Pharm. Des. 2023 29 39 3087 3088 10.2174/0113816128287941231206050340
    [Google Scholar]
  71. Domarkienė I. Ambrozaitytė L. Bukauskas L. CyberGenomics: Application of behavioral genetics in cybersecurity. Behav. Sci. 2021 11 11 152 10.3390/bs11110152
    [Google Scholar]
  72. Ayatollahi H. Shagerdi G. Information security risk assessment in hospitals. Open Med. Inform. J. 2017 11 1 37 43 10.2174/1874431101711010037
    [Google Scholar]
  73. King Z.M. Henshel D.S. Flora L. Cains M.G. Hoffman B. Sample C. Characterizing and measuring maliciousness for cybersecurity risk assessment. Front. Psychol. 2018 9 39 10.3389/fpsyg.2018.00039
    [Google Scholar]
  74. Alsaedi M. Ghaleb F. Saeed F. Ahmad J. Alasli M. Cyber threat intelligence-based malicious url detection model using ensemble learning. Sensors 2022 22 9 3373 10.3390/s22093373
    [Google Scholar]
  75. Dalal R.S. Howard D.J. Bennett R.J. Posey C. Zaccaro S.J. Brummel B.J. Organizational science and cybersecurity: Abundant opportunities for research at the interface. J. Bus. Psychol. 2022 37 1 1 29 10.1007/s10869‑021‑09732‑9
    [Google Scholar]
  76. Harvey H. Carroll H. Murphy V. The impact of a national cyberattack affecting clinical trials: The cancer trials ireland experience. JCO Clin. Cancer Inform. 2023 7 7 2200149 10.1200/CCI.22.00149
    [Google Scholar]
  77. Nelson C.J. Lester-Coll N.H. Li P.C. Development of rapid response plan for radiation oncology in response to cyberattack. Adv. Radiat. Oncol. 2021 6 1 100613 10.1016/j.adro.2020.11.001
    [Google Scholar]
  78. Yi B. Sawant A. Chen S. Lee S.W. Zhang B. Readiness for radiation treatment continuity: Survey on contingency plans against cyberattacks. Adv. Radiat. Oncol. 2022 7 5 100990 10.1016/j.adro.2022.100990
    [Google Scholar]
  79. Nguyen T.T. Reddi V.J. Deep reinforcement learning for cyber security. IEEE Trans. Neural Netw. Learn. Syst. 2023 34 8 3779 3795 10.1109/TNNLS.2021.3121870
    [Google Scholar]
  80. Gruber K. The growing threat of cyberwarfare in cancer healthcare. Nat. Can. 2023 4 12 1615 1617 10.1038/s43018‑023‑00659‑z
    [Google Scholar]
  81. Upendra P. Selecting a passive network monitoring solution for medical device cybersecurity management. Biomed. Instrum. Technol. 2021 55 4 121 130 10.2345/0899‑8205‑55.4.121
    [Google Scholar]
  82. Clarke M. Martin K. Managing cybersecurity risk in healthcare settings. Healthc. Manage. Forum 2024 37 1 17 20 10.1177/08404704231195804
    [Google Scholar]
  83. Cartwright A.J. The elephant in the room: Cybersecurity in healthcare. J. Clin. Monit. Comput. 2023 37 5 1123 1132 10.1007/s10877‑023‑01013‑5
    [Google Scholar]
  84. Burke W. Stranieri A. Oseni T. Gondal I. The need for cybersecurity self-evaluation in healthcare. BMC Med. Inform. Decis. Mak. 2024 24 1 133 10.1186/s12911‑024‑02551‑x
    [Google Scholar]
  85. Omidian H. Razmara J. Parvizpour S. Tabrizchi H. Masoudi-Sobhanzadeh Y. Omidi Y. Tracing drugs from discovery to disposal. Drug Discov. Today 2023 28 5 103538 10.1016/j.drudis.2023.103538
    [Google Scholar]
  86. Hijji M. Alam G. Cybersecurity awareness and training (CAT) framework for remote working employees. Sensors 2022 22 22 8663 10.3390/s22228663
    [Google Scholar]
  87. Argyridou E. Nifakos S. Laoudias C. Cyber hygiene methodology for raising cybersecurity and data privacy awareness in health care organizations: Concept study. J. Med. Internet Res. 2023 25 41294 10.2196/41294
    [Google Scholar]
  88. Arndt R.Z. Frequent employee training helps stave off ransomware. Mod. Healthc. 2017 47 23 16 18
    [Google Scholar]
  89. Alqahtani A. Sheldon F.T. A survey of crypto ransomware attack detection methodologies: An evolving outlook. Sensors 2022 22 5 1837 10.3390/s22051837
    [Google Scholar]
  90. Cybersecurity and patient protection. Lancet 2018 391 10127 1238 10.1016/S0140‑6736(18)30711‑6
    [Google Scholar]
  91. Ross J. Cybersecurity: A real threat to patient safety. J. Perianesth. Nurs. 2017 32 4 370 372 10.1016/j.jopan.2017.05.005
    [Google Scholar]
  92. Coucke P.A. Cybersecurity in the health care sector Rev. Med. Liege 2020 75 2 125 129 [ 32030939
    [Google Scholar]
  93. Zelmer J. Cybersecurity in health: A 21st century imperative. Healthc. Policy 2018 13 4 6 7 10.12927/hcpol.2018.25535
    [Google Scholar]
  94. Katsikas Sokratis Kokolakis Spyros High level security policies for health care establishments. Stud. Health Technol. Inform. 2004 103 407 415 10.3233/978‑1‑60750‑946‑2‑407
    [Google Scholar]
  95. Jalali M.S. Kaiser J.P. Cybersecurity in hospitals: A systematic, organizational perspective. J. Med. Internet Res. 2018 20 5 10059 10.2196/10059
    [Google Scholar]
  96. Kwon J. Johnson M.E. Security practices and regulatory compliance in the healthcare industry. J. Am. Med. Inform. Assoc. 2013 20 1 44 51 10.1136/amiajnl‑2012‑000906
    [Google Scholar]
  97. Schoppmann M.J. Sanders D.L. HIPAA compliance: The law, reality, and recommendations. J. Am. Coll. Radiol. 2004 1 10 728 733 10.1016/j.jacr.2004.03.017
    [Google Scholar]
  98. Allender M. HIPAA compliance in the OR. AORN J. 2002 75 1 121 125 10.1016/S0001‑2092(06)61719‑5
    [Google Scholar]
  99. Andriole K.P. Security of electronic medical information and patient privacy: What you need to know. J. Am. Coll. Radiol. 2014 11 12 1212 1216 10.1016/j.jacr.2014.09.011
    [Google Scholar]
  100. Reed M. Audit trails: HIPAA’s system of checks and balances. J. AHIMA 2003 74 2 44 45
    [Google Scholar]
  101. Hussein R. Wurhofer D. Strumegger E.M. General data protection regulation (GDPR) toolkit for digital health. Stud. Health Technol. Inform. 2022 290 222 226 10.3233/SHTI220066
    [Google Scholar]
  102. Lawton A. General data protection regulation: What does this mean in terms of law and ethics? Arch. Dis. Child. Educ. Pract. Ed. 2020 105 5 294 295 10.1136/archdischild‑2019‑318519
    [Google Scholar]
  103. Lopes I.M. Guarda T. Oliveira P. General data protection regulation in health clinics. J. Med. Syst. 2020 44 2 53 10.1007/s10916‑020‑1521‑0
    [Google Scholar]
  104. Chico V. The impact of the general data protection regulation on health research. Br. Med. Bull. 2018 128 1 109 118 10.1093/bmb/ldy038
    [Google Scholar]
  105. Kolasa K. Ken Redekop W. Berler A. Zah V. Asche C.V. Future of data analytics in the era of the general data protection regulation in europe. PharmacoEconomics 2020 38 10 1021 1029 10.1007/s40273‑020‑00927‑1
    [Google Scholar]
  106. Thomas L. Udofia I. FDA offers guidance on cybersecurity and medical devices. J. AHIMA 2015 86 2 42 43
    [Google Scholar]
  107. Stern A.D. Gordon W.J. Landman A.B. Kramer D.B. Cybersecurity features of digital medical devices: An analysis of FDA product summaries. BMJ Open 2019 9 6 025374 10.1136/bmjopen‑2018‑025374
    [Google Scholar]
  108. FDA issues reminder on cybersecurity for networked medical devices. Biomed. Instrum. Technol. 2010 ••• 4 [Suppl.
    [Google Scholar]
  109. Argaw S.T. Bempong N.E. Eshaya-Chauvin B. Flahault A. The state of research on cyberattacks against hospitals and available best practice recommendations: A scoping review. BMC Med. Inform. Decis. Mak. 2019 19 1 10 10.1186/s12911‑018‑0724‑5
    [Google Scholar]
  110. van Kessel R. Haig M. Mossialos E. Strengthening cybersecurity for patient data protection in europe. J. Med. Internet Res. 2023 25 48824 10.2196/48824
    [Google Scholar]
/content/journals/rrct/10.2174/0115748871360236250901072442
Loading
/content/journals/rrct/10.2174/0115748871360236250901072442
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test