{"id":10645,"date":"2026-02-10T16:34:14","date_gmt":"2026-02-10T14:34:14","guid":{"rendered":"https:\/\/inprojournal.org\/?page_id=10645"},"modified":"2026-02-10T16:34:15","modified_gmt":"2026-02-10T14:34:15","slug":"2019-3-12","status":"publish","type":"page","link":"https:\/\/inprojournal.org\/en\/2019-3-12\/","title":{"rendered":"2019-3-12"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"734\" height=\"1024\" src=\"https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-734x1024.jpg\" alt=\"\" class=\"wp-image-3609\" style=\"width:217px;height:302px\" srcset=\"https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-734x1024.jpg 734w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-215x300.jpg 215w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-768x1071.jpg 768w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-1101x1536.jpg 1101w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-1468x2048.jpg 1468w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-scaled.jpg 1835w\" sizes=\"auto, (max-width: 734px) 100vw, 734px\" \/><\/figure>\n\n\n\n<div style=\"height:26px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-small-font-size\">Theory and practice of intellectual property<br>\u2116 3 \/ 2019<\/p>\n\n\n\n<p class=\"has-small-font-size\">ISSN (Print) 2308-0361<br>ISSN (Online) 2519-2744<\/p>\n\n\n\n<div class=\"wp-block-buttons has-custom-font-size is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-fdcfc74e wp-block-buttons-is-layout-flex\" style=\"font-size:10px\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-black-color has-text-color has-custom-font-size wp-element-button\" href=\"https:\/\/drive.google.com\/file\/d\/1KyBKCeY3uk5XncENyJL1tDR69oXOWrJb\/view\" style=\"border-radius:10px;font-size:10px\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"14\" height=\"14\" class=\"wp-image-362\" style=\"width: 14px;\" src=\"https:\/\/test.inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153.png\" alt=\"\" srcset=\"https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153.png 512w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153-300x300.png 300w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153-150x150.png 150w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153-450x450.png 450w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153-106x106.png 106w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153-80x80.png 80w\" sizes=\"auto, (max-width: 14px) 100vw, 14px\" \/> PDF (Ukrainian)<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:26px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-small-font-size\">DOI: <a href=\"https:\/\/doi.org\/10.33731\/32019.173819\">https:\/\/doi.org\/10.33731\/32019.173819<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">Published \u00a0\u00a0\u00a0\u00a0\u00a02019-07-19<\/p>\n\n\n\n<div style=\"height:8px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/inprojournal.org\/wp-content\/uploads\/2025\/11\/CC-2.png\" alt=\"\" class=\"wp-image-6960\" style=\"width:131px;height:auto\"\/><\/figure>\n\n\n\n<p class=\"has-small-font-size\"><\/p>\n\n\n\n<p class=\"has-small-font-size\"><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-medium-font-size\"><strong>Cybercrime in health care: demand for protection<\/strong><\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Inna Volynets<\/strong><br>Ukraine<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Abstract<br><\/strong>The study aimed to analyze problems of countering cybercrime as a potential threat for healthcare. The scope of the term \u00abcybercrime\u00bb is provided. The causes and consequences of the influence of cyberattack are identified. Legislation of Ukraine on information threat protection was analyzed. Examples of cyberattack in health care are provided in accordance with types characteristics of cybercrime (ransomware, denial-of-service attack (DoS attack), Insider Threats etc.). Since the beginning of the realization of electronic healthcare system in Ukraine, there is a certain possibility of a threat for information security. The importance of theoretical and practical improvement of counteraction against cyberattacks is argued in compliance with modern foreign practices in combating cybercrime and personal data protection. The relevance of implementation of data protection guidelines at the legislative level is noted. Recommendation CM\/Rec (2019) 2 of the Committee of Ministers to member States on the protection of health-related data was studied in relation to its implementation to national legislation.<\/p>\n\n\n\n<p><strong>Keywords: <\/strong>cybercrime, computer hacker, cyberattacks, healthcare, personal data protection, cybersecurity, register<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>Morgan S.Top 5 IndustriesAtRiskOfCyber-Attacks.<br><a href=\"https:\/\/www.forbes.com\/sites\/stevemorgan\/2016\/05\/13\/list-of-the-5-mostcyber-attacked-industries\/#22d4c536715e\">https:\/\/www.forbes.com\/sites\/stevemorgan\/2016\/05\/13\/list-of-the-5-mostcyber-attacked-industries\/#22d4c536715e<\/a><\/p>\n\n\n\n<p>Perakslis Eric D.Cybersecurity in Health Care. <br><a href=\"https:\/\/www.nejm.org\/doi\/full\/10.1056\/NEJMp1404358?url_ver=Z39.88-2003&#038;rfr_id=ori%3Arid%3Acrossref.org&#038;rfr_dat=cr_pub%3Dpubmed\">https:\/\/www.nejm.org\/doi\/full\/10.1056\/NEJMp1404358?url_ver=Z39.88-2003&#038;rfr_id=ori%3Arid%3Acrossref.org&#038;rfr_dat=cr_pub%3Dpubmed<\/a><\/p>\n\n\n\n<p>Kruse C. S., Frederick B., Jacobson T.,MonticoneK. Cybersecurity in healthcare: A systematic review of modern threats and trends. TechnologyandHealthCare. 2017. vol. 25. P. 1\u201310. <br><a href=\"https:\/\/content.iospress.com\/download\/technology-andhealth-care\/thc1263?id=technology-and-health-care%2Fthc1263\">https:\/\/content.iospress.com\/download\/technology-andhealth-care\/thc1263?id=technology-and-health-care%2Fthc1263<\/a><\/p>\n\n\n\n<p>Raul L. Rhine E., Myhra M., Sullivan R., Kruse C.S. Cyberthreatstohealthinformationsystems: A systematicreview. Technology and Health Care. 2016. vol. 24. 1. P. 1\u20139. <br><a href=\"https:\/\/content.iospress.com\/articles\/technology-and-healthcare\/thc1102\">https:\/\/content.iospress.com\/articles\/technology-and-healthcare\/thc1102<\/a><\/p>\n\n\n\n<p>CoventryL., BranleyD.Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas. 2018. vol. 113. P. 48\u201352. <br><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0378512218301658?via%3Dihub#\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0378512218301658?via%3Dihub#<\/a><\/p>\n\n\n\n<p>\u041f\u0440\u043e \u043e\u0441\u043d\u043e\u0432\u043d\u0456 \u0437\u0430\u0441\u0430\u0434\u0438 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0423\u043a\u0440\u0430\u0457\u043d\u0438 : \u0417\u0430\u043a\u043e\u043d \u0423\u043a\u0440\u0430\u0457\u043d\u0438 \u0432\u0456\u0434 08.07.2018 \u0440. \u2116 2163-VIII. \u0412\u0456\u0434\u043e\u043c\u043e\u0441\u0442\u0456 \u0412\u0435\u0440\u0445\u043e\u0432\u043d\u043e\u0457 \u0420\u0430\u0434\u0438 \u0423\u043a\u0440\u0430\u0457\u043d\u0438. 2017. \u2116 45. \u0421\u0442. 403.<\/p>\n\n\n\n<p>\u041f\u0440\u043e \u0440\u0456\u0448\u0435\u043d\u043d\u044f \u0420\u0430\u0434\u0438 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0456 \u043e\u0431\u043e\u0440\u043e\u043d\u0438 \u0423\u043a\u0440\u0430\u0457\u043d\u0438 : \u0423\u043a\u0430\u0437 \u041f\u0440\u0435\u0437\u0438\u0434\u0435\u043d\u0442\u0430 \u0423\u043a\u0440\u0430\u0457\u043d\u0438 \u0432\u0456\u0434 27.01.2016 \u0440. \u00ab\u041f\u0440\u043e \u0421\u0442\u0440\u0430\u0442\u0435\u0433\u0456\u044e \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0423\u043a\u0440\u0430\u0457\u043d\u0438\u00bb. \u041e\u0444\u0456\u0446\u0456\u0439\u043d\u0438\u0439 \u0432\u0456\u0441\u043d\u0438\u043a \u041f\u0440\u0435\u0437\u0438\u0434\u0435\u043d\u0442\u0430 \u0423\u043a\u0440\u0430\u0457\u043d\u0438. 2016. \u2116 10. \u0421\u0442. 39. \u0441\u0442\u0430\u0442\u0442\u044f 198.<\/p>\n\n\n\n<p>\u041a\u0440\u0438\u043c\u0456\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u043a\u043e\u0434\u0435\u043a\u0441 \u0423\u043a\u0440\u0430\u0457\u043d\u0438 \u0432\u0456\u0434 26.02.2019 \u0440. \u21162341-III. \u0412\u0456\u0434\u043e\u043c\u043e\u0441\u0442\u0456 \u0412\u0435\u0440\u0445\u043e\u0432\u043d\u043e\u0457 \u0420\u0430\u0434\u0438 \u0423\u043a\u0440\u0430\u0457\u043d\u0438. 2001. \u2116 25\u221226. \u0421\u0442.131.<\/p>\n\n\n\n<p>\u041a\u043e\u043d\u0432\u0435\u043d\u0446\u0456\u044f \u043f\u0440\u043e \u043a\u0456\u0431\u0435\u0440\u0437\u043b\u043e\u0447\u0438\u043d\u043d\u0456\u0441\u0442\u044c. \u0420\u0430\u0442\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u044f \u0432\u0456\u0434 07.09.2005 \u0440. \u2116 994_575. \u041e\u0444\u0456\u0446\u0456\u0439\u043d\u0438\u0439 \u0432\u0456\u0441\u043d\u0438\u043a \u0423\u043a\u0440\u0430\u0457\u043d\u0438. 2007. \u2116 65. \u0421\u0442. 107.<\/p>\n\n\n\n<p>\u041f\u0440\u043e \u0440\u0430\u0442\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u044e \u041a\u043e\u043d\u0432\u0435\u043d\u0446\u0456\u0457 \u043f\u0440\u043e \u043a\u0456\u0431\u0435\u0440\u0437\u043b\u043e\u0447\u0438\u043d\u043d\u0456\u0441\u0442\u044c: \u0417\u0430\u043a\u043e\u043d \u0423\u043a\u0440\u0430\u0457\u043d\u0438 \u0432\u0456\u0434 14.10.2010 \u0440. \u2116 2824-IV. \u0412\u0456\u0434\u043e\u043c\u043e\u0441\u0442\u0456 \u0412\u0435\u0440\u0445\u043e\u0432\u043d\u043e\u0457 \u0420\u0430\u0434\u0438 \u0423\u043a\u0440\u0430\u0457\u043d\u0438. 2006. \u2116 5. \u0421\u0442. 128.<\/p>\n\n\n\n<p>Forms of cybercrime. Cyber crime takes many forms, and it is therefore difficult to fight. <br><a href=\"https:\/\/www.government.nl\/topics\/cybercrime\/forms-of-cybercrime\">https:\/\/www.government.nl\/topics\/cybercrime\/forms-of-cybercrime<\/a><\/p>\n\n\n\n<p>Types of Cybercrime. <br><a href=\"https:\/\/www.pandasecurity.com\/mediacenter\/panda-security\/types-of-cybercrime\">https:\/\/www.pandasecurity.com\/mediacenter\/panda-security\/types-of-cybercrime<\/a><\/p>\n\n\n\n<p>\u041a\u0438\u0431\u0435\u0440-\u043f\u0430\u043d\u0434\u0435\u043c\u0438\u044f: \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0438 \u0432 \u0441\u0444\u0435\u0440\u0435 \u0437\u0434\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f. <br><a href=\"https:\/\/habr.com\/company\/panda\/blog\/304382\">https:\/\/habr.com\/company\/panda\/blog\/304382<\/a><\/p>\n\n\n\n<p>Ransomware: In the Health care Sector. <br><a href=\"https:\/\/www.cisecurity.org\/ransomware-in-the-healthcare-sector\">https:\/\/www.cisecurity.org\/ransomware-in-the-healthcare-sector<\/a><\/p>\n\n\n\n<p>Jones S.NHS seeks to recover from global cyber-attack as security concerns resurface. <br><a href=\"https:\/\/www.theguardian.com\/society\/2017\/may\/12\/hospitalsacross-england-hit-by-large-scale-cyber-attack\">https:\/\/www.theguardian.com\/society\/2017\/may\/12\/hospitalsacross-england-hit-by-large-scale-cyber-attack<\/a><\/p>\n\n\n\n<p>\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043e\u0446\u0435\u043d\u0438\u043b\u0438 \u0443\u0449\u0435\u0440\u0431 \u043e\u0442 \u0432\u0438\u0440\u0443\u0441\u0430 WANNACRY \u0432 $ 1 \u043c\u043b\u0440\u0434. \u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u043f\u043e\u0434\u0441\u0447\u0438\u0442\u0430\u043b\u0438 \u0443\u0449\u0435\u0440\u0431, \u043d\u0430\u043d\u0435\u0441\u0435\u043d\u043d\u044b\u0439 \u0432\u0438\u0440\u0443\u0441\u043e\u043c WannaCrypt0r \u0437\u0430 \u043f\u0435\u0440\u0432\u044b\u0435 \u0447\u0435\u0442\u044b\u0440\u0435 \u0434\u043d\u044f \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u043e\u0439 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438. <br><a href=\"http:\/\/runews24.ru\/internet\/25\/05\/2017\/3deb290a821bd12cc946653ea418e439\">http:\/\/runews24.ru\/internet\/25\/05\/2017\/3deb290a821bd12cc946653ea418e439<\/a><\/p>\n\n\n\n<p>Security Tip (ST04-015). Understanding Denial-of-Service Attacks. <br><a href=\"https:\/\/www.us-cert.gov\/ncas\/tips\/ST04-015\">https:\/\/www.us-cert.gov\/ncas\/tips\/ST04-015<\/a><\/p>\n\n\n\n<p>DDoS Attacks: In the Healthcare Sector. <br><a href=\"https:\/\/www.cisecurity.org\/ddosattacks-in-the-healthcare-sector\">https:\/\/www.cisecurity.org\/ddosattacks-in-the-healthcare-sector<\/a><\/p>\n\n\n\n<p>Anyoneis a Target: DoS Attack Case Analysis on Boston Children\u2019s Hospital. <br><a href=\"https:\/\/security.radware.com\/...\/DownloadAsset.aspx?id=873\">https:\/\/security.radware.com\/&#8230;\/DownloadAsset.aspx?id=873<\/a><\/p>\n\n\n\n<p>Henry J.These 5 Types of Insider Threats Could Lead to Costly Data Breaches. <br><a href=\"https:\/\/securityintelligence.com\/these-5-types-of-insider-threats-couldlead-to-costly-data-breaches\">https:\/\/securityintelligence.com\/these-5-types-of-insider-threats-couldlead-to-costly-data-breaches<\/a><\/p>\n\n\n\n<p>Insider Threats: In the Healthcare Sector. <br><a href=\"https:\/\/www.cisecurity.org\/blog\/insider-threats-in-the-healthcare-sector\">https:\/\/www.cisecurity.org\/blog\/insider-threats-in-the-healthcare-sector<\/a><\/p>\n\n\n\n<p>PoulsenK.Leader of hacker gang sentenced to 9 years for hospital malware. <br><a href=\"https:\/\/www.wired.com\/2011\/03\/ghostexodus-2\">https:\/\/www.wired.com\/2011\/03\/ghostexodus-2<\/a><\/p>\n\n\n\n<p>Former security guard, who hacked into hospital\u2019s computer system, is sentenced to 110 months in federal prison. Defendant Posted Video of Himself Compromising a Hospital\u2019s Computer System on YouTube. <br><a href=\"https:\/\/www.justice.gov\/sites\/default\/files\/criminalccips\/legacy\/2012\/03\/15\/mcgrawSent.pdf\">https:\/\/www.justice.gov\/sites\/default\/files\/criminalccips\/legacy\/2012\/03\/15\/mcgrawSent.pdf<\/a><\/p>\n\n\n\n<p>Morgan S.Why healthcare cybersecurity spending will exceed $65B over the next 5 years. Hospitals and healthcare providers remain under cyber attack, causing organizations to spend more to protect their systems and patient data. <br><a href=\"https:\/\/www.csoonline.com\/article\/3252343\/cyber-attacks-espionage\/whyhealthcare-cybersecurity-spending-will-exceed-65b-over-the-next-5-years.html\">https:\/\/www.csoonline.com\/article\/3252343\/cyber-attacks-espionage\/whyhealthcare-cybersecurity-spending-will-exceed-65b-over-the-next-5-years.html<\/a><\/p>\n\n\n\n<p>About Panda Security. <br><a href=\"https:\/\/www.pandasecurity.com\/ukraine\/company-profile\">https:\/\/www.pandasecurity.com\/ukraine\/company-profile<\/a><\/p>\n\n\n\n<p>\u0406\u043b\u0438\u043a \u0420. \u0424\u0430\u0440\u043c\u043f\u043e\u043b\u0456\u0442\u0438\u043a\u0430 2019. \u0426\u0456\u043b\u0456 \u0442\u0430 \u043d\u043e\u0432\u0456 \u0432\u0438\u043a\u043b\u0438\u043a\u0438. \u0421\u0442\u0440\u0430\u0442\u0435\u0433i\u044f \u043bi\u043a\u0430\u0440\u0441\u044c\u043a\u0438\u0445 \u0437\u0430\u0441\u043e\u0431i\u0432 \u0434\u043e 2025. \u0410\u043f\u0442\u0435\u0447\u043d\u0438\u0439 \u0441\u0430\u043c\u0456\u0442 \u0423\u043a\u0440\u0430\u0457\u043d\u0438 \u2013 2018 : \u043c\u0430\u0442\u0435\u0440\u0456\u0430\u043b\u0438 \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0456\u0457. \u041a\u0438\u0457\u0432. 06.12.2018.<\/p>\n\n\n\n<p>\u041f\u0440\u043e \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u0456 \u0444\u0456\u043d\u0430\u043d\u0441\u043e\u0432\u0456 \u0433\u0430\u0440\u0430\u043d\u0442\u0456\u0457 \u043c\u0435\u0434\u0438\u0447\u043d\u043e\u0433\u043e \u043e\u0431\u0441\u043b\u0443\u0433\u043e\u0432\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430\u0441\u0435\u043b\u0435\u043d\u043d\u044f : \u0417\u0430\u043a\u043e\u043d \u0423\u043a\u0440\u0430\u0457\u043d\u0438 \u0432\u0456\u0434 19.10.2017 \u0440. \u2116 2168-VIII. \u0412\u0456\u0434\u043e\u043c\u043e\u0441\u0442\u0456 \u0412\u0435\u0440\u0445\u043e\u0432\u043d\u043e\u0457 \u0420\u0430\u0434\u0438 \u0423\u043a\u0440\u0430\u0457\u043d\u0438. 2018. \u2116 5. \u0421\u0442. 5.<\/p>\n\n\n\n<p>\u0414\u0435\u044f\u043a\u0456 \u043f\u0438\u0442\u0430\u043d\u043d\u044f \u0435\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0457 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u043e\u0445\u043e\u0440\u043e\u043d\u0438 \u0437\u0434\u043e\u0440\u043e\u0432\u2019\u044f : \u043f\u043e\u0441\u0442\u0430\u043d\u043e\u0432\u0430 \u041a\u0430\u0431\u0456\u043d\u0435\u0442\u0443 \u041c\u0456\u043d\u0456\u0441\u0442\u0440\u0456\u0432 \u0423\u043a\u0440\u0430\u0457\u043d\u0438 \u0432\u0456\u0434 25.04.2018 \u0440. \u2116 411. \u041e\u0444\u0456\u0446\u0456\u0439\u043d\u0438\u0439 \u0432\u0456\u0441\u043d\u0438\u043a \u0423\u043a\u0440\u0430\u0457\u043d\u0438. 2018. \u2116 46. \u0421\u0442. 14.<\/p>\n\n\n\n<p>Recommendation CM\/Rec(2019)2 of the Committee of Ministers to member States on the protection of health-related data. <br><a href=\"https:\/\/search.coe.int\/cm\/pages\/result_details.aspx?objectid=090000168093b26e\">https:\/\/search.coe.int\/cm\/pages\/result_details.aspx?objectid=090000168093b26e<\/a><\/p>\n\n\n\n<p>Protection of health-related data: Council of Europe issues new guidelines. <br><a href=\"https:\/\/search.coe.int\/directorate_of_communications\/Pages\/result_details.aspx?ObjectId=090000168093b57d\">https:\/\/search.coe.int\/directorate_of_communications\/Pages\/result_details.aspx?ObjectId=090000168093b57d<\/a><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Theory and practice of intellectual property\u2116 3 \/ 2019 ISSN (Print) 2308-0361ISSN (Online) 2519-2744 DOI: https:\/\/doi.org\/10.33731\/32019.173819 Published \u00a0\u00a0\u00a0\u00a0\u00a02019-07-19 Cybercrime in health care: demand for protection Inna VolynetsUkraine AbstractThe study aimed to analyze problems of countering cybercrime as a potential threat for healthcare. The scope of the term \u00abcybercrime\u00bb is provided. The causes and consequences of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-10645","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/pages\/10645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/comments?post=10645"}],"version-history":[{"count":2,"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/pages\/10645\/revisions"}],"predecessor-version":[{"id":10647,"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/pages\/10645\/revisions\/10647"}],"wp:attachment":[{"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/media?parent=10645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}