Telemedicine | Health Apps |
Online Health Communities | E-Learning For Health Professionals |
Health Information Systems | Digital Therapeutics |
Remote Monitoring | Health Education Online |
Mobile applications designed to support personal health management and wellness through various features like tracking, reminders, and information. | A method of providing healthcare remotely using technology, allowing patients to consult with healthcare providers without needing to travel. |
Online educational programs designed to enhance the skills and knowledge of medical practitioners, improving overall healthcare delivery. | Web-based platforms where individuals can connect, share experiences, and provide support related to health conditions or wellness goals. |
Evidence-based therapeutic interventions delivered through software to prevent, manage, or treat medical conditions. | Integrated technologies used to collect, store, manage, and analyze health data, improving decision-making and patient care. |
Access to information and resources about health and wellness via the internet, empowering individuals to make informed decisions about their health. | The use of technology to continuously monitor patients' health conditions outside of traditional clinical settings, facilitating proactive care. |
Digital Addiction | Eye Strain |
Poor Posture | Sleep Disturbances |
Isolation | Cyberbullying |
Data | Online Privacy |
Discomfort or vision problems resulting from prolonged screen use, often leading to headaches and fatigue. | A compulsive behavior that leads to excessive use of digital devices, impacting daily functioning. |
Disruptions to normal sleep patterns, frequently caused by screen exposure before bedtime. | The alignment of the body that can lead to musculoskeletal issues, often exacerbated by extended computer use. |
Online harassment that can severely affect an individual's mental well-being. | A feeling of detachment from social interactions, which can occur despite increased online communication. |
An individual's entitlement to govern and safeguard their personal information as well as monitor their activities carried out on the internet. | Information, facts, or statistics that are gatherable, dissectible, and actionable for a multitude of reasons. |
Encryption | Cookies |
Cybersecurity | Anonymity |
Data Breach | Phishing |
Digital Footprint | Privacy Policy |
Small text files are stored on a user's device, which are utilized for monitoring and storing information regarding their browsing activities. | The process of encoding information in a manner that permits access and comprehension solely by authorized parties. |
The condition of being anonymous is characterized by the absence or concealment of a person's identity or personal information. | Protecting computer systems, networks, and data from unauthorized access, attacks, and breaches is the practice of safeguarding digital assets. |
A deceitful online method that dupes individuals into divulging their personal or sensitive information is known as a fraudulent activity. | Unauthorized individuals gain access to and exploit sensitive or confidential data when they gain entry to information intended to be kept private or classified. |
A statement or document that illustrates the methods by which an organization gathers, utilizes, and safeguards the personal information of its users or customers. | The collection of data and information created from an individual's online activities and engagements that are left as evidence. |
Data Privacy | Security Breach |
Identity Theft | Data Breaches |
Tracking | Consent |
Accuracy | Retention |
An incident where unauthorized individuals gain access to confidential or sensitive data, potentially leading to privacy violations. | The protection of personal information and sensitive data from unauthorized access, use, or disclosure. |
Incidents where unauthorized individuals gain access to data, often resulting in potential harm or privacy violations. | The fraudulent acquisition and use of an individual's personal information, usually for financial gain, without their consent. |
The voluntary granting of permission by an individual for the collection, use, and sharing of their personal data. | The act of monitoring and recording the online activities, behaviors, and preferences of individuals without their explicit consent. |
the practice of keeping and storing data for a specific period of time, as legally required or for business purposes | the degree to which data correctly represents the real-world scenario or situation |
Data Protection Laws | Personal Data |
Data Subject | Data Controller |
Data Minimization | Anonymization |
Any information that can identify an individual, such as their name, address, phone number, or social security number. | A set of regulations and guidelines that govern the handling and safeguarding of personal data to ensure the privacy and security of individuals. |
A person or organization that collects, determines the purposes of, and is responsible for the processing of personal data. | An individual who can be identified by their personal data and has certain rights over its processing and protection. |
The process of removing personally identifiable information from data, making it impossible to associate with a specific individual. | Reducing the amount of personal data collected and processed to only what is necessary for a specific purpose. |