zScanner - open source mobile app for medical photo documentation
zScanner is a mobile application for clinical and medical photo documentation. zScanner enables doctors to take photos of patient medical records, and of injuries of the patients, and upload them to a hospital information system. zScanner is an application developed and used by IKEM, a major Czech hospital, and the largest center of clinical and experimental medicine in the Czech Republic.
The zScanner application contains very sensitive data, and therefore cyber-security is a very important element. IKEM decided to secure zScanner by employing TeskaLabs' cyber security platform SeaCat. SeaCat covers all cyber security and regulatory requirements, and moreover, it's very easy to integrate.
Why IKEM developed zScanner
IKEM needed to solve a long-standing problem: for years, visiting patients had been presenting their doctors critical medical records in printed format. These documents then had to be manually uploaded into the IKEM’s hospital information system. Doctors faced a dual dilemma: they had no time to perform these tasks and yet they needed to have quick access to this vital patient information.
An additional problem, current medical procedures require doctors to create photo documentation of patient injuries. IKEM formerly addressed this issue in a labour-intensive manner: the doctor had to use a camera, make a photo, and later upload the photo from the camera to a computer, and then upload it from the computer to the hospital information system. This was both time-consuming and subject to error.
To address this issue, IKEM has developed zScanner, a mobile application for clinical and medical photo documentation. zScanner enables doctors to use one device to make digital copies of patient medical records, and record pictures of patient injuries, and upload them to a hospital information system in one seamless action.
Security is a top priority
The zScanner application contains very sensitive data, and therefore cyber-security is a very important element. IKEM decided to secure zScanner by employing the TeskaLabs' cyber security platform SeaCat.
SeaCat is a cyber-security platform for mobile healthcare applications. SeaCat enables businesses to operate their applications in reliable, scalable and secure way. It also provides valuable insights into an app operation combined with a strong protection of a data. SeaCat enables detect, resolve, and mitigate all kinds of availability and security incidents before they impact the business.
“We use TeskaLabs' SeaCat to secure four mobile applications in our hospital. The main benefits are smooth integration, strong security and compliance with health care regulations."
Petr Raska, Head of IT, IKEM
zScanner enables the doctor to log in using name and password, or, by using a biometrical authentication, such as finger print.
After the doctor is logged in, he selects the relevant patient either by scanning his bar code, or, by searching the patient in the hospital information system database.
Insert validity of the examination
Doctor can fastly insert a date of validity of examination, which is then inscribed into the relevant photo record.
Select type of examination, or, document
zScanner enables the doctor to choose a type of examination from pre-defined list, without spending any time on creating a written specification. Doctor can also add his own notes, which will be then linked to the relevant photo documentation.
Take photos, and upload the document
zScanner enables doctor to take multiple photos of medical documents and patient injuries. When doctor finishes the photo documentation, zScanner uploads the photos into the hospital information system.
Start using open sourced zScanner in your hospital
Today, zScanner is used by dozens of doctors in the IKEM hospital. The doctors report that this application significantly increases their efficiency and saves them considerable time in performing clerical functions.
IKEM has decided to open source zScanner application to enable other hospitals, and medical facilities benefit from the work IKEM has invested in the development of the application.
TeskaLabs offers an out-of-box product consisting of zScanner application, secured by SeaCat cyber-security platform. TeskaLabs also offers professional implementation and support services for the application.
For more information about zScanner secured by SeaCat, please visit: https://teskalabs.com/products/zscanner/
Or, contact us directly at email@example.com
Institute for Clinical and Experimental Medicine (IKEM)
The Institute for Clinical and Experimental Medicine is the largest specialised clinical and science & research institute in the Czech Republic. IKEM is focused on the fields of cardiovascular diseases, organ transplants, diabetology and metabolism disorders. IKEM is a contributory organisation directly managed by the Ministry of Health of the Czech Republic.
The IKEM Cardiac Centre is the largest, most comprehensive and one of the oldest cardiology centres in the Czech Republic. The centre is focused on the therapy of cardiac and vascular diseases of adult patients in their entire spectrum – congenital and acquired. The IKEM Cardiac Centre is composed of four departments and units that offer patient care in the fields of cardiology and cardiosurgery. The centre is also focused on the prevention of civilisation diseases. It is not only a medical, but also a teaching and research centre.
The Transplantation Surgery Department is predominantly focused on transplantations of abdominal organs; abdominal surgical and vascular surgical procedures are also performed at the department. The division of abdominal organs transplantation has a long and successful tradition at TSD. Considering the number of performed procedures, it is the largest transplantation unit in the Czech Republic.
Diabetes Centre covers therapeutic and preventive, scientific and research, and educational activities in diabetology and in metabolism and nutrition disorders. It is the largest centre of diabetology in the Czech Republic. The centre is primarily focused on patients with organ complications, thus not only patients with diabetes in its initial stage, but especially patients with rather serious complications.
Contact for media:
+420 734 236 325
We, at TeskaLabs, believe that the digital world has to be safe. Today, as enterprises move toward mobile and Internet of Things (IoT), we help them build and operate mobile, desktop, web and IoT applications securely.
TeskaLabs is an award-winning product company committing to creating the world's most comprehensive application security technology for mobile, desktop, web and IoT apps. We are a proud member of Microsoft BizPark Plus, and a strategic partner of O2 Czech Republic.
Most Recent Articles
- C-ITS ITS-S Security microservice
- C-ITS PKI as a Service
- Creative Dock, TeskaLabs, Indermedica, Czech Ministry of Industry and Trade and Line 1212 launch the indicative test for new COVID-19 coronavirus
- Cyber-health with a password and an antivirus program is not enough
- TeskaLabs at the ETSI 1st C-V2X Plugtest
You Might Be Interested in Reading These Articles
Data encryption is a critical part of GDPR compliance although there are no explicit GDPR encryption requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures.
Published on May 16, 2018
Data masking (or suppression) represents the de fact standard of pseudonymisation. Pseudonymisation is a critical part of GDPR compliance although there are no explicit GDPR pseudonymisation requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures.
Published on June 11, 2018
The year 2018 will, at least in Europe, be a turning point for data privacy and personal information protection. In this article, I will focus on personal data processing. I describe methods of de-identification of personal data, such as pseudonymization, anonymization, and encryption.
Published on November 28, 2017