{"id":507544,"date":"2022-09-13T11:51:46","date_gmt":"2022-09-13T09:51:46","guid":{"rendered":"https:\/\/www.capgemini.com\/?p=800214"},"modified":"2025-03-26T09:17:43","modified_gmt":"2025-03-26T09:17:43","slug":"the-patient-data-security-blindspot","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/","title":{"rendered":"The patient data security blindspot"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>The Patient Data Security Blindspot<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2021\/08\/cg-logo.png?w=330?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Capgemini<\/h5><h5 class=\"blog-date\">13 Sep 2022<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/&amp;text=The patient data security blindspot\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/&amp;text=The patient data security blindspot\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">For the sake of patients, doctors and healthcare institutions, we need to safely and responsibly unlock patient data.<\/h2><p class=\"intro-para-content\">In the wrong hands patient data can be a nightmare. Managed correctly, it\u2019s a source of immense value. It\u2019s time to advance a new patient data ecosystem that combines unwavering security with responsible access.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-the-problem\">THE PROBLEM<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-an-example-scenario-what-we-re-missing\">An example scenario: what we\u2019re missing<\/h3>\n\n\n\n<p>A middle-aged patient is rushed into the emergency department of his local hospital, noncommunicative and alone. His medical files reveal a broken wrist, some dermatology concerns, a bone marrow donation and grief counselling. Each entry a story; together they represent a life. But right now, the lead cardiologist doesn\u2019t need a novel. He needs precise information about the man\u2019s heart \u2013 fast \u2013 so that he can save his life.<\/p>\n\n\n\n<p>In a perfect world, what data would hospitals like their surgery teams to see the moment they open a patient\u2019s file?<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-patient-record-number-emergency-contact\"><strong>Patient record number + emergency contact<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Allergies<\/li>\n\n\n\n<li>Current medications<\/li>\n\n\n\n<li>Health issues [heart condition]<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/09\/arrow.png\" alt=\"\" class=\"wp-image-800254\" style=\"width:54px;height:54px\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Status of heart condition<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Most recent coronary event\n<ul class=\"wp-block-list\">\n<li>Course of action<\/li>\n\n\n\n<li>Past coronary events\n<ul class=\"wp-block-list\">\n<li>Course of action<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Doctors\u2019 notes in descending order<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>A different set of information would be available to his attending nurses. Another would inform his physical therapist. And for the patient, a clear and readable version would help him understand his condition and course of treatment in the language he understands. If you could organize data in the proper usage context, doctors, patients and other healthcare workers would all be able to see <em>at a glance<\/em> the information most relevant to them, and would use it to inform their decisions.<\/p>\n\n\n\n<p>Of course, patient data is <em>not<\/em> like any other data. Unrestricted sharing of patients&#8217; intimate health information would be an unforgivable violation \u2013 emotionally and financially. And given the immense profit motive involved, the risk of disreputable players getting their hands on patient data is ever present. However, the solution up to now \u2013 locking patient data far, far away \u2013 is no longer viable. Without the ability to access and manage patient data, vital information from years past gets buried under newer files. Results are lost or forgotten, and tremendous opportunities in everything from AI to patient engagement are missed. In the age of connected health, security is not enough: patient data must also be accessible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-current-data-security-puts-a-burden-on-patients\">Current data security puts a burden on patients&#8230;<\/h2>\n\n\n\n<p>Health problems are among the most stressful events in our lives. Healthcare systems have an ethical duty not to add to that stress with overly complex, difficult systems. Not only does this put an emotional strain on patients, it\u2019s often outright unmanageable. What for you and me may be a hassle, for an elderly patient is often impossible, which is one reason why <a href=\"https:\/\/labblog.uofmhealth.org\/industry-dx\/half-of-older-adults-dont-use-patient-portals-for-health-care\">about half of older patients never use their online portals<\/a>. (The other main reason? <a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC5662789\/\">Privacy and security issues<\/a>.) The same goes for a patient who\u2019s in shock, on strong pain medication \u2013 the list goes on. Health problems and byzantine systems don\u2019t mix, and we should have no illusions of being patient-centric if patients are struggling to access and understand their own files. <\/p>\n\n\n\n<p>Ironically, some of the solutions in use today are so behind the times that they add a different kind of burden. Fax machines are no longer ubiquitous. For a patient to send or receive data by fax often requires a special trip to a family member\u2019s office or some other public place, creating both a hassle and a security risk. Security measures need to be moving forward to meet the needs of new forms of patient data, such as smart home devices and IoT equipment. Expecting patients to use son-in-law&#8217;s secretary\u2019s fax machine is no longer an option.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-and-costs-doctors-valuable-time\">&#8230;and costs doctors valuable time<\/h2>\n\n\n\n<p>Doctors face a different kind of pressure \u2013 time. Doctors\u2019 time is precious. It takes over a decade to train one doctor, and much more than that to gain expertise. The idea that doctors should be spending <em>any <\/em>of their limited time searching through files and databases is mind-boggling. But they do. One study in the UK found an average of about <a href=\"https:\/\/pubmed.ncbi.nlm.nih.gov\/31931523\/\">16 minutes per visit are devoted to the patient\u2019s records<\/a>. (Some of which is necessary. The report cites chart review (33%), documentation (24%), and ordering (17%). ) Assuming doctors do unearth the necessary data, they\u2019re presented with a series of disconnected snapshots of their patients \u2013 separate files from various visits and tests from multiple institutions (not always complete), perhaps with many critical findings buried within. Sometimes data is missing altogether. One study found that <em><a href=\"https:\/\/www.prnewswire.com\/news-releases\/230-954-151-us-medical-records-lost-exposed-or-stolen-between-2009-2019--study-by-privacyaffairs-finds-301130943.html\">over 200 million healthcare records were lost, exposed or stolen<\/a><\/em> over the past decade in the US alone. Modern data management technology needs to be more secure, while also providing intelligent access to patient records \u2013 turning data from a cost into a source of immense value.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-solution\">THE SOLUTION<\/h2>\n\n\n\n<figure class=\"wp-block-image alignleft size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/09\/iStock-502388234-2.jpg?w=960\" alt=\"\" class=\"wp-image-807740\"\/><figcaption class=\"wp-element-caption\">Caregiver showing diet tracker to the patient<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-government-can-make-patient-data-secure-and-accessible\">How government can make patient data secure <em>and <\/em>accessible<\/h3>\n\n\n\n<p>The good news is: solutions already exist. Banks are already sharing data securely, because they need to. (You can\u2019t perform a transfer if you don\u2019t share at least some data.) This is the shift that healthcare must take: from a focus solely on data security, towards the science of compliance and enablement.<\/p>\n\n\n\n<p>Individual institutions can\u2019t do much on their own. The change needs to come from the governing bodies that set the security regulations for patient data. In many countries that may be a government body such as the EU, or it could be a private consortium comprising a group of hospitals and other patient care institutions.<\/p>\n\n\n\n<p>Around the world approaches differ. A common choice is the centralized system, where one organ (the government) controls all data and regulations. Germany is currently in the process of rolling out a federated identity management approach to access data \u2013 putting the identification process in the hands of intermediaries (hospitals, insurance companies), while giving patients ultimate control of their data. However, <a href=\"https:\/\/www.healthcare-computing.de\/epa-kaum-grund-zum-feiern-a-1094613\/\">for a variety of reasons<\/a> it has proven unpopular among patients and doctors. In The Netherlands, ambitious legislation is in the works that would put complete data sovereignty in patients\u2019 hands. Three solutions need to be in place to improve patient data security and make it accessible: <\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-shared-apis\"><strong>Shared APIs<\/strong><\/h4>\n\n\n\n<p>APIs aren\u2019t the only solution to sharing large volumes of patient data (the above-mentioned German system prohibits the use of APIs for all but anonymized data), but they are one of the best. Around the world, <a href=\"https:\/\/ecqi.healthit.gov\/fhir\">Fast Healthcare Interoperability Resources (FHIR)<\/a> has arisen as the gold standard for storing and structuring patient data. APIs can then be used to access this structured data using certain operations (defined as \u201cinteractions\u201d by FHIR), thus enabling data to flow within or between institutions. The operating system doesn\u2019t matter, only the recipient. Which leads to the central question: how do you decide which data can be shared, and with whom? <\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-centralized-authorization\"><strong>Centralized authorization<\/strong><\/h4>\n\n\n\n<p>The solution is a comprehensive set of rules governing who has access to what. It is neither short, nor simple, but it is achievable. (If banks can do it, so can healthcare institutions.) This authorization engine consists of a set of rules, spliced with special allowances for unique situations and specific people. (For example, HIV status will be classified as among the most private, least sharable data. However, an allowance must be made for doctors certifying blood donations.) Note that <em>authorization<\/em> (deciding who has authority to do what) is a different process entirely from <em>authentication<\/em> (verifying an individual\u2019s identity), to which we turn next. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-frictionless-authentication\"><strong>Frictionless authentication<\/strong><\/h4>\n\n\n\n<p>Patients are not going to carry around passwords in their memories. (If they could, the passwords would be too weak.) Biometric identification such as retinal scans, fingerprints and facial recognition are likewise unreliable during many health emergencies. There are, however, some intriguing solutions out there. Many are based on smartphone apps, including <a href=\"https:\/\/fidoalliance.org\/fido2\/\">Fido2<\/a> \u2013 an alliance that lets users confirm their identity with common devices, including smartphones.<\/p>\n\n\n\n<p>In Norway, many people carry a <a href=\"https:\/\/www.yubico.com\/\">Youbikey<\/a> \u2013 an ingenious little device that plugs into a computer\u2019s USB portal and provides strong two-factor identification. Norwegians use their Youbikeys to speed up payment, for banking, and for other activities that require identification. With frictionless authentication, patients and healthcare workers can instantly be provided with exactly the data which is appropriate for them, when and where they need it. The importance of creating a user-friendly interface cannot be overstated. Governments have poured immense resources into their patient data systems, only to watch them flounder due to weak user experience. People today expect the intuitive design of Amazon or iTunes, and they make their judgement <a href=\"https:\/\/usabilitygeek.com\/first-time-use-how-to-reduce-initial-friction-of-app-usage\/\">within seconds<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-future-of-connected-health\">The future of connected health<\/h3>\n\n\n\n<p>The ability to access and organize patients\u2019 data is the first step for advances in multiple directions. It provides the framework around which predictive and personalized medicine can evolve. It is the foundation for a new generation of connected health. Patterns and connections are waiting to be discovered: in an individual patient\u2019s files, and in the combined data of multiple patients. Artificial intelligence excels at exactly the kind of pattern recognition that could be helping patients find solutions to their ailments, but first it needs access to that data.<\/p>\n\n\n\n<p>Solutions already exist with the power to keep patient data secure <em>and<\/em> accessible when needed. Ensuring excellent user experience is already a requisite for commercial products. Healthcare systems don\u2019t need to start from scratch; the tools are already here. Capgemini has decades of experience working with complex data systems, data consortiums and digital transformation. We\u2019ve provided change management for partners around the world and helped transform customer engagement. We&#8217;re looking at the challenges that healthcare is facing up close, and we see an immense opportunity to apply recent advances in data science and user experience to healthcare. When that happens it will be a true leap forward in patient care. <\/p>\n\n\n\n<p>What could your institution do with intelligent access to patient data? Contact us below to discuss your institution\u2019s data needs, and keep up with the latest on data security, sustainability and more. Find out more about our services in <a href=\"\/pt-en\/industries\/public-sector\/health-and-social-care\/\">health and social care<\/a>.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Our Expert<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2021\/05\/Anne-Stahl-1.jpg\" alt=\"Anne Stahl\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/annestahl\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Anne Stahl<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Managing UX Strategy Consultant, GER<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/annestahl\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>For the sake of patients, doctors and healthcare institutions, we need to safely and responsibly unlock patient data<\/p>\n","protected":false},"author":264,"featured_media":507545,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"952d101e-ce43-4ca7-98a2-b8e613ba6059\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":false,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[],"service":[],"industry":[],"partners":[],"blog-topic":[244],"content-group":[],"class_list":["post-507544","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","blog-topic-healthcare"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The patient data security blindspot - Capgemini Portugal<\/title>\n<meta name=\"description\" content=\"For the sake of patients, doctors and healthcare institutions, we need to safely and responsibly unlock patient data Connected health runs on data, but what if the most valuable data is locked away?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The patient data security blindspot - Capgemini Portugal\" \/>\n<meta property=\"og:description\" content=\"For the sake of patients, doctors and healthcare institutions, we need to safely and responsibly unlock patient data Connected health runs on data, but what if the most valuable data is locked away?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Portugal\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-13T09:51:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-26T09:17:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/New-Web-preview-global.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Capgemini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rashmiadarshshetty\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/\",\"url\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/\",\"name\":\"The patient data security blindspot - Capgemini Portugal\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/09\/PS_Data-Security_dotCom_Banner_2880x1800px_02.jpg\",\"datePublished\":\"2022-09-13T09:51:46+00:00\",\"dateModified\":\"2025-03-26T09:17:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/042f09e0cfa2a52587f0a9970014bb51\"},\"description\":\"For the sake of patients, doctors and healthcare institutions, we need to safely and responsibly unlock patient data Connected health runs on data, but what if the most valuable data is locked away?\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/09\/PS_Data-Security_dotCom_Banner_2880x1800px_02.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/09\/PS_Data-Security_dotCom_Banner_2880x1800px_02.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/pt-en\/\",\"name\":\"Capgemini Portugal\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/pt-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/042f09e0cfa2a52587f0a9970014bb51\",\"name\":\"rashmiadarshshetty\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f6eaed744e43d2a7bdfc18084629fd7f1b880b767ec288ec858672db64519dd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f6eaed744e43d2a7bdfc18084629fd7f1b880b767ec288ec858672db64519dd?s=96&d=mm&r=g\",\"caption\":\"rashmiadarshshetty\"},\"url\":\"https:\/\/www.capgemini.com\/pt-en\/author\/rashmiadarshshetty\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The patient data security blindspot - Capgemini Portugal","description":"For the sake of patients, doctors and healthcare institutions, we need to safely and responsibly unlock patient data Connected health runs on data, but what if the most valuable data is locked away?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/","og_locale":"en_US","og_type":"article","og_title":"The patient data security blindspot - Capgemini Portugal","og_description":"For the sake of patients, doctors and healthcare institutions, we need to safely and responsibly unlock patient data Connected health runs on data, but what if the most valuable data is locked away?","og_url":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/","og_site_name":"Capgemini Portugal","article_published_time":"2022-09-13T09:51:46+00:00","article_modified_time":"2025-03-26T09:17:43+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/New-Web-preview-global.jpg","type":"image\/jpeg"}],"author":"Capgemini","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rashmiadarshshetty","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/","url":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/","name":"The patient data security blindspot - Capgemini Portugal","isPartOf":{"@id":"https:\/\/www.capgemini.com\/pt-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/09\/PS_Data-Security_dotCom_Banner_2880x1800px_02.jpg","datePublished":"2022-09-13T09:51:46+00:00","dateModified":"2025-03-26T09:17:43+00:00","author":{"@id":"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/042f09e0cfa2a52587f0a9970014bb51"},"description":"For the sake of patients, doctors and healthcare institutions, we need to safely and responsibly unlock patient data Connected health runs on data, but what if the most valuable data is locked away?","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/#primaryimage","url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/09\/PS_Data-Security_dotCom_Banner_2880x1800px_02.jpg","contentUrl":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/09\/PS_Data-Security_dotCom_Banner_2880x1800px_02.jpg","width":2880,"height":1800},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/pt-en\/#website","url":"https:\/\/www.capgemini.com\/pt-en\/","name":"Capgemini Portugal","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/pt-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/042f09e0cfa2a52587f0a9970014bb51","name":"rashmiadarshshetty","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f6eaed744e43d2a7bdfc18084629fd7f1b880b767ec288ec858672db64519dd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f6eaed744e43d2a7bdfc18084629fd7f1b880b767ec288ec858672db64519dd?s=96&d=mm&r=g","caption":"rashmiadarshshetty"},"url":"https:\/\/www.capgemini.com\/pt-en\/author\/rashmiadarshshetty\/"}]}},"blog_topic_info":[{"id":244,"name":"Healthcare"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"blog-topic":[{"id":244,"name":"Healthcare","slug":"healthcare"}],"following_users":[{"id":143,"name":"automator","slug":"automator"},{"id":330,"name":"rashmiadarshshetty","slug":"rashmiadarshshetty"},{"id":419,"name":"vitordiogotavares","slug":"vitordiogotavares"}],"ef_usergroup":[{"id":276,"name":"Site Admins","slug":"ef-usergroup-site-admins"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"The patient data security blindspot","url":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/09\/PS_Data-Security_dotCom_Banner_2880x1800px_02.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/09\/PS_Data-Security_dotCom_Banner_2880x1800px_02.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Portugal","logo":""},"keywords":[],"dateCreated":"2022-09-13T09:51:46Z","datePublished":"2022-09-13T09:51:46Z","dateModified":"2025-03-26T09:17:43Z"},"rendered":"<meta name=\"parsely-title\" content=\"The patient data security blindspot\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/the-patient-data-security-blindspot\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/09\/PS_Data-Security_dotCom_Banner_2880x1800px_02.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2022-09-13T09:51:46Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/09\/PS_Data-Security_dotCom_Banner_2880x1800px_02.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/09\/PS_Data-Security_dotCom_Banner_2880x1800px_02.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Portugal","distributor_original_site_url":"https:\/\/www.capgemini.com\/pt-en","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/09\/PS_Data-Security_dotCom_Banner_2880x1800px_02.jpg","author_title":"Capgemini","author_thumbnail_url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2021\/08\/cg-logo.png?w=330","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/posts\/507544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/users\/264"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/comments?post=507544"}],"version-history":[{"count":7,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/posts\/507544\/revisions"}],"predecessor-version":[{"id":528945,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/posts\/507544\/revisions\/528945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/media\/507545"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/media?parent=507544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/categories?post=507544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/tags?post=507544"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/brand?post=507544"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/service?post=507544"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/industry?post=507544"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/partners?post=507544"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/blog-topic?post=507544"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/content-group?post=507544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}