SlideShare a Scribd company logo
3
Most read
9
Most read
12
Most read
Webinar

Patient remote monitoring
system
Privacy, medical devices and IP related issues of patient
remote monitoring systems and wearable technologies in
the healthcare sector
Global Lawyers Association
Giulio Coraggio
DLA Piper Italy
giulio.coraggio@dlapiper.com
December 19, 2013
We already talked about wearable tech…

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

2
Wearable technologies in the healthcare
sector

Remote patient monitoring (RPM), also called homecare
telehealth, is a type of ambulatory healthcare that allows a
patient to use a mobile medical device to perform a routine test
and send the test data to a healthcare professional in real-time.

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

3
What type of technologies are
relevant?

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

4
How does it work? Cloud projects!

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

5
Potential legal issues…

 Privacy – collection, transfer and processing of patients'
personal data;

 Medical device regulations – potential qualification of
hardware and software as medical devices;
 IP rights – how to protect the technology and the exclusivity
rights on its exploitation

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

6
Processing of patients' data
 Which data protection law applies?
 Opinion of the EU Working Party
 What consent and authorizations are required and from who?
 And in the case of biometric data?

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

7
Who does what?
 Understanding of the entities involved
 hospitals
 patients
 sponsor
 technology provider

 What are their roles?
 data controller
 data processor
 sub-processor

 Consequences on the purposes of processing of collected
data
 anonymous data
Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

8
Transfers of patients' data outside of the
European Union
 Approval from hospitals (data controller) as part of public
tenders
 When can it be implied? Is it negotiable? Can the denial be
challenged?

 Privacy-related options
 Patients' consent
 Binding corporate rules
 Safe Harbor program

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

9
Most common approach to manage
data transfers
 EU Model clauses
 data controller, data processor, sub-processor
 possible restrictions if the data processor is within the European
Union and the sub-processor(s) is (are) located outside of the
European Union

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

10
What other privacy issues to consider?
 What consent and authorizations are required? and in the case
of biometric data?
 What security measures shall be adopted?
 What data can be accessed? and by who?
 For what purposes personal data can be used?
 patient treatment
 clinical trials?
 articles on journals?

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

11
Is hardware treated as a medical device?
 Qualification of the hardware:
 hardware which may also be used within the medical environment
are normally not considered as medical devices, unless they are
specifically assigned a medical role
 hardware utilized together with the software in such a way that the
software may not otherwise run (i.e. the software would not run on
any other device), then the hardware should be regarded as MD
itself

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

12
Is software treated as a medical devices?
 Qualification of the software – this may be regarded as a
medical device when either:
 his purpose of use falls under one of the categories listed in the
definition of medical device; or
 it is intended to control or influence the functioning of a medical
device; or

 it is intended for the analysis of patient data generated by a
medical device with a view to diagnosis and monitoring; or
 it is intended for use for/by patients to diagnose or treat a physical
or mental condition or disease.

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

13
What is the impact on the growth of
this technology?
 Time to market?
 CE Marking
 Issues for updates/upgrades

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

14
How are these devices protected?
 IP rights on the technology?
 Patentability of the software/hardware?
 Trademark protection of generic terms by technology
companies?

Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

15
Thank you!

Giulio Coraggio
DLA Piper Italy
T +39 02 80 618 619
M +39 334 68 81 147
E giulio.coraggio@dlapiper.com
Giulio Coraggio - DLA Piper

giulio.coraggio@dlapiper.com

16

More Related Content

PPTX
Wearable technologies, privacy and intellectual property rights
PPT
What changes for Internet of Things technologies with the EU Data Protection ...
PDF
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
PDF
Come cambia la cybersecurity con il regolamento privacy europeo
PPTX
Legal issues on social media
PPTX
Legal issues of the Internet of Things
PPTX
What changes with the EU Data Protection Regulation for Gambling Companies
PDF
How privacy by design can be the key of your success at the time of the digit...
Wearable technologies, privacy and intellectual property rights
What changes for Internet of Things technologies with the EU Data Protection ...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
Come cambia la cybersecurity con il regolamento privacy europeo
Legal issues on social media
Legal issues of the Internet of Things
What changes with the EU Data Protection Regulation for Gambling Companies
How privacy by design can be the key of your success at the time of the digit...

What's hot (16)

PPTX
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
PPT
Remote patient monitoring system
PPTX
Data Privacy: What you need to know about privacy, from compliance to ethics
PPTX
An Essential Guide to EU GDPR
PPT
GDPR Jan 2018 1
PPTX
GDPR security services - Areyou ready ?
PPTX
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
PDF
A Focus on Data, Best's Review, September 2018
PPTX
BigID GDPR Compliance Automation Webinar Slides
PDF
Csa privacy by design & gdpr austin chambers 11-4-17
PPTX
GDPR – The Practicalities of a New Reality
PPTX
Webianr: GDPR: How to build a data protection framework
PPTX
Privacy by Design as a system design strategy - EIC 2019
PDF
The Evolution of Data Privacy: 3 things you didn’t know
PPT
Enlightened Privacy – by Design for a Smarter Grid
PPTX
Privacy by Design - taking in account the state of the art
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Remote patient monitoring system
Data Privacy: What you need to know about privacy, from compliance to ethics
An Essential Guide to EU GDPR
GDPR Jan 2018 1
GDPR security services - Areyou ready ?
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
A Focus on Data, Best's Review, September 2018
BigID GDPR Compliance Automation Webinar Slides
Csa privacy by design & gdpr austin chambers 11-4-17
GDPR – The Practicalities of a New Reality
Webianr: GDPR: How to build a data protection framework
Privacy by Design as a system design strategy - EIC 2019
The Evolution of Data Privacy: 3 things you didn’t know
Enlightened Privacy – by Design for a Smarter Grid
Privacy by Design - taking in account the state of the art
Ad

Viewers also liked (17)

PPTX
Scommesse sportive online in Italia, come invertire il declino
PPTX
Intellectual property models in the electronic gaming industry
PDF
Webinar italy remote gaming regulations
PPTX
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
PDF
Legal requirements for operating in a videolottery market
PPT
Cyber risk e assicurazioni
PPTX
Drones and logistics - What legal issues and how to handle them
PDF
Open API e problematiche legali al tempo del PSD2
PPTX
Intellectual Property Rights
PDF
Implementation of patient monitoring system using gsm technology
PPT
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
KEY
Guide to Unlawful Internet Gambling Enforcement Act of 2006
PPT
Information Technology and Compliance at KMCO Gaming
PDF
Catherine Beardshaw: Driving efficiency with new technology
PDF
Efficiency of Remote Technical Support for the ICD follow-up outpatients
PDF
AML/CTF Compliance Presentation - Gaming
PDF
Dr Shommen Datta Patient Centric Healthcare
Scommesse sportive online in Italia, come invertire il declino
Intellectual property models in the electronic gaming industry
Webinar italy remote gaming regulations
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Legal requirements for operating in a videolottery market
Cyber risk e assicurazioni
Drones and logistics - What legal issues and how to handle them
Open API e problematiche legali al tempo del PSD2
Intellectual Property Rights
Implementation of patient monitoring system using gsm technology
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
Guide to Unlawful Internet Gambling Enforcement Act of 2006
Information Technology and Compliance at KMCO Gaming
Catherine Beardshaw: Driving efficiency with new technology
Efficiency of Remote Technical Support for the ICD follow-up outpatients
AML/CTF Compliance Presentation - Gaming
Dr Shommen Datta Patient Centric Healthcare
Ad

Similar to Wearable technologies and remote patient remote monitoring system (20)

PPTX
EU cybersecurity requirements under current and future medical devices regula...
PPTX
Cybersecurity for medical devices in the EU
PPTX
Mma roadshow mHealth in the EU
PDF
Software and Smartphone Applications By E. Vollebregt - Axon Lawers (Qserve C...
PPTX
E health, mhealth and apps
PPT
ehealthandmhealthpresentation-130310142714-phpapp01.ppt
PPTX
[Wroclaw #6] Medical device security
PPTX
Wearable Tech Privacy and Intellectual Property
PDF
Cybersecurity in smart medical devices
PDF
Insight Guide 3 - Privacy & Regulation
PDF
From Servers to Medical Devices
PPT
MHRA - 18th March 2014
PPTX
How to Secure Medical Devices presentation.pptx
DOCX
Cybersecurity for Active Implantable Medical Devices.docx
PDF
Medical device security presentation - Frank Siepmann
PPT
Software design for_medical_devices_europe_conferent_19012011[1]
PPTX
MMA roadshow m health summit europe
PPTX
Cybersecurity in Medical Devices
PDF
The Future of Quality and Regulatory for SaMD
PPTX
Masterclass: Medical Device Approval Pathways in the USA and EU
EU cybersecurity requirements under current and future medical devices regula...
Cybersecurity for medical devices in the EU
Mma roadshow mHealth in the EU
Software and Smartphone Applications By E. Vollebregt - Axon Lawers (Qserve C...
E health, mhealth and apps
ehealthandmhealthpresentation-130310142714-phpapp01.ppt
[Wroclaw #6] Medical device security
Wearable Tech Privacy and Intellectual Property
Cybersecurity in smart medical devices
Insight Guide 3 - Privacy & Regulation
From Servers to Medical Devices
MHRA - 18th March 2014
How to Secure Medical Devices presentation.pptx
Cybersecurity for Active Implantable Medical Devices.docx
Medical device security presentation - Frank Siepmann
Software design for_medical_devices_europe_conferent_19012011[1]
MMA roadshow m health summit europe
Cybersecurity in Medical Devices
The Future of Quality and Regulatory for SaMD
Masterclass: Medical Device Approval Pathways in the USA and EU

More from Giulio Coraggio (20)

PDF
Come conformarsi al Regolamento DORA sulla cybersecurity
PDF
Infografica sulle 5 regole privacy per i programmi di fidelizzazione
PDF
Direttiva NIS2 - Nuovi obblighi legali di cybersecurity
PDF
Decreti di adeguamento ai regolamenti MDR e IVDR
PDF
Nuove normativa sulla accessibilità applicabili a qualsiasi sito web
PDF
New Italian rules on accessibility of websites
PPTX
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
PDF
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
PDF
Good practices and common pitfalls on advertising of medical devices in Italy
PDF
Le modifiche del Codice del Consumo, come impattano sulle aziende
PDF
Good practices and common pitfalls on advertising of tobacco products in Italy
PPTX
Good practices and common pitfalls on advertising of alcoholic products in Italy
PDF
Good practices and common pitfalls on advertising of medicines in Italy
PDF
Good practices and common pitfalls on advertising of cosmetics in Italy
PDF
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
PDF
Italian Gambling Advertising Ban – Don'ts and Do's
PDF
Good practices and common pitfalls on ESG advertising in Italy
PDF
Come gestire gli obblighi privacy di un attacco ransomware
PPTX
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
PPTX
Come gestire un data breach da attacco ransomware
Come conformarsi al Regolamento DORA sulla cybersecurity
Infografica sulle 5 regole privacy per i programmi di fidelizzazione
Direttiva NIS2 - Nuovi obblighi legali di cybersecurity
Decreti di adeguamento ai regolamenti MDR e IVDR
Nuove normativa sulla accessibilità applicabili a qualsiasi sito web
New Italian rules on accessibility of websites
Un altro anno di GDPR: analizziamolo sulla base del survey del IPTT per il 2022
DOP, Marchi Collettivi e Marchi Storici: forme di tutela delle eccellenze
Good practices and common pitfalls on advertising of medical devices in Italy
Le modifiche del Codice del Consumo, come impattano sulle aziende
Good practices and common pitfalls on advertising of tobacco products in Italy
Good practices and common pitfalls on advertising of alcoholic products in Italy
Good practices and common pitfalls on advertising of medicines in Italy
Good practices and common pitfalls on advertising of cosmetics in Italy
Infografica - Misure di protezione CSIRT contro rischi di cyber derivanti dal...
Italian Gambling Advertising Ban – Don'ts and Do's
Good practices and common pitfalls on ESG advertising in Italy
Come gestire gli obblighi privacy di un attacco ransomware
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...
Come gestire un data breach da attacco ransomware

Recently uploaded (20)

PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Modernising the Digital Integration Hub
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
STKI Israel Market Study 2025 version august
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
DP Operators-handbook-extract for the Mautical Institute
Module 1.ppt Iot fundamentals and Architecture
Modernising the Digital Integration Hub
Zenith AI: Advanced Artificial Intelligence
Group 1 Presentation -Planning and Decision Making .pptx
Final SEM Unit 1 for mit wpu at pune .pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
STKI Israel Market Study 2025 version august
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Getting Started with Data Integration: FME Form 101
WOOl fibre morphology and structure.pdf for textiles
observCloud-Native Containerability and monitoring.pptx
A novel scalable deep ensemble learning framework for big data classification...
Univ-Connecticut-ChatGPT-Presentaion.pdf
Assigned Numbers - 2025 - Bluetooth® Document
DP Operators-handbook-extract for the Mautical Institute

Wearable technologies and remote patient remote monitoring system

  • 1. Webinar Patient remote monitoring system Privacy, medical devices and IP related issues of patient remote monitoring systems and wearable technologies in the healthcare sector Global Lawyers Association Giulio Coraggio DLA Piper Italy giulio.coraggio@dlapiper.com December 19, 2013
  • 2. We already talked about wearable tech… Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 2
  • 3. Wearable technologies in the healthcare sector Remote patient monitoring (RPM), also called homecare telehealth, is a type of ambulatory healthcare that allows a patient to use a mobile medical device to perform a routine test and send the test data to a healthcare professional in real-time. Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 3
  • 4. What type of technologies are relevant? Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 4
  • 5. How does it work? Cloud projects! Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 5
  • 6. Potential legal issues…  Privacy – collection, transfer and processing of patients' personal data;  Medical device regulations – potential qualification of hardware and software as medical devices;  IP rights – how to protect the technology and the exclusivity rights on its exploitation Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 6
  • 7. Processing of patients' data  Which data protection law applies?  Opinion of the EU Working Party  What consent and authorizations are required and from who?  And in the case of biometric data? Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 7
  • 8. Who does what?  Understanding of the entities involved  hospitals  patients  sponsor  technology provider  What are their roles?  data controller  data processor  sub-processor  Consequences on the purposes of processing of collected data  anonymous data Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 8
  • 9. Transfers of patients' data outside of the European Union  Approval from hospitals (data controller) as part of public tenders  When can it be implied? Is it negotiable? Can the denial be challenged?  Privacy-related options  Patients' consent  Binding corporate rules  Safe Harbor program Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 9
  • 10. Most common approach to manage data transfers  EU Model clauses  data controller, data processor, sub-processor  possible restrictions if the data processor is within the European Union and the sub-processor(s) is (are) located outside of the European Union Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 10
  • 11. What other privacy issues to consider?  What consent and authorizations are required? and in the case of biometric data?  What security measures shall be adopted?  What data can be accessed? and by who?  For what purposes personal data can be used?  patient treatment  clinical trials?  articles on journals? Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 11
  • 12. Is hardware treated as a medical device?  Qualification of the hardware:  hardware which may also be used within the medical environment are normally not considered as medical devices, unless they are specifically assigned a medical role  hardware utilized together with the software in such a way that the software may not otherwise run (i.e. the software would not run on any other device), then the hardware should be regarded as MD itself Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 12
  • 13. Is software treated as a medical devices?  Qualification of the software – this may be regarded as a medical device when either:  his purpose of use falls under one of the categories listed in the definition of medical device; or  it is intended to control or influence the functioning of a medical device; or  it is intended for the analysis of patient data generated by a medical device with a view to diagnosis and monitoring; or  it is intended for use for/by patients to diagnose or treat a physical or mental condition or disease. Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 13
  • 14. What is the impact on the growth of this technology?  Time to market?  CE Marking  Issues for updates/upgrades Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 14
  • 15. How are these devices protected?  IP rights on the technology?  Patentability of the software/hardware?  Trademark protection of generic terms by technology companies? Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 15
  • 16. Thank you! Giulio Coraggio DLA Piper Italy T +39 02 80 618 619 M +39 334 68 81 147 E giulio.coraggio@dlapiper.com Giulio Coraggio - DLA Piper giulio.coraggio@dlapiper.com 16

Editor's Notes

  • #4: MedronicInsertable Cardiac Monitor: An insertable cardiac monitor is a small implantable device that continuously monitors heart rhythms and records them automatically or by using a hand-held patient activator. The device is implanted just beneath the skin in the upper chest area during a simple procedure. The insertable cardiac monitor is programmed to continuously monitor your heart’s activity in the form of an electrocardiogram (ECG). When a fainting spell occurs, you or your family member should immediately place a small hand-held activator over the cardiac monitor and press a button.
  • #8: deliberaworking party sulle appautorizzazione generale del Garantenotifica al Garante della privacy per profilazione e utilizzo di dati biometrici
  • #10: Aggiungi foto con mappa
  • #13: In this case, the software is a component and integral part of the MD and is not regarded as a medical device in its own. Therefore, hardware and software should fall automatically into the same class.