Indukern
Distribution of Chemical Products, APIs and Pharmaceutical Excipients
While the infrastructure necessary for widespread EHR use has grown in certain regions such as the US and Europe, data protection continues to remain an area of concern. Therefore, patient confidence in the use of personal EHRs remains critical for the growth of the EHR market.
The timeline of the infrastructure necessary for widespread EHR use predates the PC era. EHR has grown in certain regions such as the US and Europe, and data protection continues to remain an area of concern. Therefore, patient confidence in the use of personal EHRs remains critical for the growth of the EHR market.
1971 – The first computer virus, known as “The Creeper,” was purposely designed and released on ARPANET and copied itself to the remote system, displaying the words: “I am the Creeper: Catch me if you can.”
1972 – The Regenstrief Institute in Indianapolis develops the first EHR program.
1981 – The PC era begins.
1982 – The first large-scale computer virus outbreak was caused by “Elk Cloner,” a virus developed by a 15-year-old high school student as a practical joke. Elk Cloner was spread by floppy disks and affected the Apple II operating system.
1986 – The first Computer Fraud and Abuse Act was passed, defining Federal computerrelated crimes and associated penalties.
1988 – Cornell graduate Robert Morris created and deployed the first worm. It was an aggressive, self-propagating virus that crippled 10% of the 88,000 computers on the ARPANET, which by 1990 became the internet.
1996 – The Healthcare Insurance Portability and Accountability Act (HIPAA) was signed into law.
1999 – The Melissa and ILOVEYOU worms infected tens of millions of PCs across the world, causing email systems to fail.
2000 – The council of Europe drafted a Cybercrime Treaty to promote the international harmonization of laws against computer crimes.
2002 – A DDoS attack struck the 13 DNS root servers, knocking out all but five. This was the first attempt to disable the internet itself rather than individual hosts or enclaves.
2004 – The Office of the National Coordinator (ONC) of Health Information Technology (IT) is created.
2008 – The National Cybersecurity Division of the US Department of Homeland Security released the Common Attack Pattern Enumeration and Classification resource, a publicly accessible taxonomy of attack patterns.
2008 – National Security Presidential Directive 54/Homeland Security Presidential Directive 23 formalized the Comprehensive National Cyber-Security Initiative, which was intended to establish a frontline defense against a full spectrum of cyber threats.
2016 – Industry spends $40B in cloud data center-related capex, according to IDC.
2018 – The EU’s GDPR entered into force. GlobalData's TMT Themes 2021 Report tells you everything you need to know about disruptive tech themes and which companies are best placed to help you digitally transform your business.Related Report
Thematic Reports
Are you worried about the pace of innovation in your industry?
2019 – Public cloud services reach revenues of $31B.
2020 – Cloud data center-related capex will reach $60B, according to IDC.
2021 – The worldwide cybersecurity market is expected to reach $143B.
This is an edited extract from the Protection of Electronic Health Records – Thematic Research report produced by GlobalData Thematic Research.
Latest report from
Browse over 50,000 other reports on our store.
Visit GlobalData Store
Distribution of Chemical Products, APIs and Pharmaceutical Excipients
Development Services and Programmes for Healthcare Companies
Crushers and Lump Breakers