DHACA visits Lancaster University on 23rd September – come and join us!

The Digital Health & Care Alliance is holding its sixth one day event on 23rd September, at the University of Lancaster.

DHACA Days are aimed at informing members, seeking feedback on DHACA activities and encouraging special Interest Group (SIG) engagement in topics of importance to members. On this occasion we have a very special SIG event which is the launching of DHACA’s medical apps regulatory process description, which looks at all the things you need to do to get a medical app fully approved. The draft is already available for members to comment on.

In addition, in the morning we will have presentations from:

  • Prof Peter Sawyer, Professor of Software Systems Engineering, University of Lancaster:sensing cognitive health through monitoring computer interaction and through ambient technology – this is a most exciting (and I guess to some a bit scary) new area of research where you can sense someone’s cognitive health from how they use smartphones and other devices.
  • Prof Jon Whittle; Head of the School of Computing and Communications,University of Lancaster: the uses for temporary digital tattoos, and how to make them – this will in part be an interactive session in which members’ suggestions and, if appropriate, future involvement will be sought.
  • Jeremy Moyse, Strategic Development Manager, SEQOL: a provider’s view of how technology will help deliver changes in the health & care world – SEQOL is a ‘spin-out’ social enterprise formed in 2011 from the NHS Transforming Community Service programme and now delivers a broad range of health & care services in Swindon; as Jeremy will explain, it has grown massively since then, and collected a cabinet full of awards.
  • Prof Awais Rashid, University of Lancaster: secure IoT use in digital health – Prof Rashid is a world expert on this topic which has become particularly important since the FDA recently withdrew approval from an infusion pump because it was too easy to hack. He will explain the critical importance of IoT security, how to assess it and how best to achieve secure solutions.

(more…)