Posted in HealthCare Law

Wetsvoorstel winstuitkering zorgverzekeraars aangenomen

Interesting development in the Dutch Healthcare Law: when the current system had been set up, the government foresaw a ban on profits distribution to shareholders, given the public interest of social healthcare.

The ban has been extended from time to time and the nth extension is about to arrive.

The original purpose of this law was to force companies to lower their premium but this is not automatically the outcome. In fact, in order to preserve quality and accessibility, the law also prohibits profits to be used to lower premia.

Last but not least, this makes it harder for new players to enter this market.

Is it just, is it not? What is just? To be or not to be?

Source

Posted in HealthCare Law, Privacy

Privacy bij online zelftests niet goed afgeschermd

Some websites (CZ, Menzis and Trimbos) offer medical tests online but their Privacy Policy are not the best ones, watch out!
More specificallly:

  • connection is insecure.
  • cookies may be placed without users’ consent.

One of the possible consequences may be third parties breaching in your life, offering you products to solve your diseases, spamming or even blackmailing you.

What can you do?

  • First off, check my post where I advice on how not being tracked by Facebook and similar internet service providers.
  • Provide as many true data as possible. if necessary, 10minutesmail.com allows you to create temporary e-mail addresses.

Source

Posted in HealthCare Law, Privacy

France Unveils its Information System Security Plan in the Health Care Sector

France’s Health Minister is stepping up against cyber(in)security, given that 90% of cyber attacks generally targets hospital and healthcare institutions.

THe proposed plan foresees 3 levels of measures to be implemented in, respectively, 6, 12 and 18 months.

First layer: installation of an antivirus program, the use of strong passwords, and their frequent renewal, as well as a backup carried out on a regular basis

Second and third layer: bolster security of users’ accounts, of access to the wireless internet, segregation of the information systems, and an audit of the risks of information systems

Source