Innovating Works
SU-TDS-02-2018
SU-TDS-02-2018: Toolkit for assessing and reducing cyber risks in hospitals and care centres to protect privacy/data/infrastructures
Specific Challenge:Digital technologies such as Big data, Internet of Things, Robotics, Artificial Intelligence, High Performance Computing, Cloud and Cybersecurity offer new opportunities to transform healthcare systems and delivery, Connected medical devices, in particular if linked to Clinical Information Systems, can bring increased patient safety and efficiency into healthcare system(s). However, ICT infrastructures and data have become critical for the functioning of the hospitals and care systems and due to increasing connectivity, the exposure to risks of cyber-crime is constantly increasing. Healthcare ICT infrastructures are now considered to be part of the Critical Information Infrastructure. Cyberattacks are a potential danger to the safety of patients and to the privacy of sensitive health data.
Sólo fondo perdido 0 €
Europeo
Esta convocatoria está cerrada Esta línea ya está cerrada por lo que no puedes aplicar. Cerró el pasado día 25-04-2018.
Se espera una próxima convocatoria para esta ayuda, aún no está clara la fecha exacta de inicio de convocatoria.
Por suerte, hemos conseguido la lista de proyectos financiados!
Presentación: Consorcio Consorcio: Esta ayuda está diseñada para aplicar a ella en formato consorcio..
Esta ayuda financia Proyectos: Objetivo del proyecto:

Specific Challenge:Digital technologies such as Big data, Internet of Things, Robotics, Artificial Intelligence, High Performance Computing, Cloud and Cybersecurity offer new opportunities to transform healthcare systems and delivery, Connected medical devices, in particular if linked to Clinical Information Systems, can bring increased patient safety and efficiency into healthcare system(s). However, ICT infrastructures and data have become critical for the functioning of the hospitals and care systems and due to increasing connectivity, the exposure to risks of cyber-crime is constantly increasing. Healthcare ICT infrastructures are now considered to be part of the Critical Information Infrastructure. Cyberattacks are a potential danger to the safety of patients and to the privacy of sensitive health data.


Scope:Development and implementation of innovative methods, tools, guidelines or best practices addressing the need for cybersecurity in hospitals including remote care and homecare settings e.g. for assessing risks and vulnerabilities of hospitals w.r.t cyberattacks; innovative cybersecurity measures; identification/authentication systems within hospitals t... ver más

Specific Challenge:Digital technologies such as Big data, Internet of Things, Robotics, Artificial Intelligence, High Performance Computing, Cloud and Cybersecurity offer new opportunities to transform healthcare systems and delivery, Connected medical devices, in particular if linked to Clinical Information Systems, can bring increased patient safety and efficiency into healthcare system(s). However, ICT infrastructures and data have become critical for the functioning of the hospitals and care systems and due to increasing connectivity, the exposure to risks of cyber-crime is constantly increasing. Healthcare ICT infrastructures are now considered to be part of the Critical Information Infrastructure. Cyberattacks are a potential danger to the safety of patients and to the privacy of sensitive health data.


Scope:Development and implementation of innovative methods, tools, guidelines or best practices addressing the need for cybersecurity in hospitals including remote care and homecare settings e.g. for assessing risks and vulnerabilities of hospitals w.r.t cyberattacks; innovative cybersecurity measures; identification/authentication systems within hospitals taking into account cross-border requirements and usability; addressing cybersecurity in the whole lifecycle of a medical device including hardware with embedded software, such as e.g. pacemakers, …); solutions addressing the need for cybersecurity certification of products/devices and services in the health and care domain; standards for security-by-design covering the whole lifecycle of eHealth applications; cybersecurity in remote healthcare provisions including homecare settings and in IT infrastructures supporting integrated care; secure information sharing between healthcare organisations (including cross border); security for cloud solutions supporting healthcare services; cybersecurity for Internet of Things (IoT) components supporting healthcare organisations in Europe.

The Commission considers that proposals requesting a contribution from the EU of between EUR 3 and 5 million would allow this specific challenge to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.

Proposals under this topic may be subject to security scrutiny if they could potentially lead to security-sensitive results that should be classified (see guide for classification).


Expected Impact:The proposal should provide appropriate indicators to measure its progress and specific impact in the following areas:

Improved security of Health and Care services, data and infrastructures; Less risk of data privacy breaches caused by cyberattacks; Increased patient trust and safety.
Cross-cutting Priorities:Open Science


ver menos

Temáticas Obligatorias del proyecto: Temática principal:

Características del consorcio

Ámbito Europeo : La ayuda es de ámbito europeo, puede aplicar a esta linea cualquier empresa que forme parte de la Comunidad Europea.
Tipo y tamaño de organizaciones: El diseño de consorcio necesario para la tramitación de esta ayuda necesita de:

Características del Proyecto

Requisitos de diseño: Duración:
Requisitos técnicos: Specific Challenge:Digital technologies such as Big data, Internet of Things, Robotics, Artificial Intelligence, High Performance Computing, Cloud and Cybersecurity offer new opportunities to transform healthcare systems and delivery, Connected medical devices, in particular if linked to Clinical Information Systems, can bring increased patient safety and efficiency into healthcare system(s). However, ICT infrastructures and data have become critical for the functioning of the hospitals and care systems and due to increasing connectivity, the exposure to risks of cyber-crime is constantly increasing. Healthcare ICT infrastructures are now considered to be part of the Critical Information Infrastructure. Cyberattacks are a potential danger to the safety of patients and to the privacy of sensitive health data. Specific Challenge:Digital technologies such as Big data, Internet of Things, Robotics, Artificial Intelligence, High Performance Computing, Cloud and Cybersecurity offer new opportunities to transform healthcare systems and delivery, Connected medical devices, in particular if linked to Clinical Information Systems, can bring increased patient safety and efficiency into healthcare system(s). However, ICT infrastructures and data have become critical for the functioning of the hospitals and care systems and due to increasing connectivity, the exposure to risks of cyber-crime is constantly increasing. Healthcare ICT infrastructures are now considered to be part of the Critical Information Infrastructure. Cyberattacks are a potential danger to the safety of patients and to the privacy of sensitive health data.
¿Quieres ejemplos? Puedes consultar aquí los últimos proyectos conocidos financiados por esta línea, sus tecnologías, sus presupuestos y sus compañías.
Capítulos financiables: Los capítulos de gastos financiables para esta línea son:
Personnel costs.
Los costes de personal subvencionables cubren las horas de trabajo efectivo de las personas directamente dedicadas a la ejecución de la acción. Los propietarios de pequeñas y medianas empresas que no perciban salario y otras personas físicas que no perciban salario podrán imputar los costes de personal sobre la base de una escala de costes unitarios
Purchase costs.
Los otros costes directos se dividen en los siguientes apartados: Viajes, amortizaciones, equipamiento y otros bienes y servicios. Se financia la amortización de equipos, permitiendo incluir la amortización de equipos adquiridos antes del proyecto si se registra durante su ejecución. En el apartado de otros bienes y servicios se incluyen los diferentes bienes y servicios comprados por los beneficiarios a proveedores externos para poder llevar a cabo sus tareas
Subcontracting costs.
La subcontratación en ayudas europeas no debe tratarse del core de actividades de I+D del proyecto. El contratista debe ser seleccionado por el beneficiario de acuerdo con el principio de mejor relación calidad-precio bajo las condiciones de transparencia e igualdad (en ningún caso consistirá en solicitar menos de 3 ofertas). En el caso de entidades públicas, para la subcontratación se deberán de seguir las leyes que rijan en el país al que pertenezca el contratante
Amortizaciones.
Activos.
Otros Gastos.
Madurez tecnológica: La tramitación de esta ayuda requiere de un nivel tecnológico mínimo en el proyecto de TRL 5:. Los componentes se integran de forma que la configuración del sistema coincida con la aplicación final en casi todos los aspectos. Se prueba el rendimiento en un entorno operativo simulado. La diferencia principal con el TRL 4 es el aumento a una fidelidad media y la aplicación al entorno real. + info.
TRL esperado:

Características de la financiación

Intensidad de la ayuda: Sólo fondo perdido + info
Fondo perdido:
0% 25% 50% 75% 100%
1. Eligible countries: described in Annex A of the Work Programme.
A number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon 2020 projects. See the information in the Online Manual.
 
2. Eligibility and admissibility conditions: described in Annex B and Annex C of the Work Programme. 
Proposal page limits and layout: please refer to Part B of the proposal template in the submission system below.
 
3. Evaluation:
Evaluation criteria, scoring and thresholds are described in Annex H of the Work Programme.  
Submission and evaluation processes are described in the Online Manual.
4. Indicative time for evaluation and grant agreements:
Information on the outcome of evaluation (single-stage call): maximum 5 months from the deadline for submission.
Signature of grant agreements: maximum 8 months from the deadline for submission.
I
5. Proposal templates, evaluation forms and model grant agreements (MGA):
Research and Innovation Action:
Specific provisions and funding rates
Standard proposal template
Standard evaluation form
General MGA - Multi-Beneficiary
Annotated Grant Agreement
6. Additional provisions:
Horizon 2020 budget flexibility
Classified information
Technology readiness levels (TRL) &...
1. Eligible countries: described in Annex A of the Work Programme.
A number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon 2020 projects. See the information in the Online Manual.
 
2. Eligibility and admissibility conditions: described in Annex B and Annex C of the Work Programme. 
Proposal page limits and layout: please refer to Part B of the proposal template in the submission system below.
 
3. Evaluation:
Evaluation criteria, scoring and thresholds are described in Annex H of the Work Programme.  
Submission and evaluation processes are described in the Online Manual.
4. Indicative time for evaluation and grant agreements:
Information on the outcome of evaluation (single-stage call): maximum 5 months from the deadline for submission.
Signature of grant agreements: maximum 8 months from the deadline for submission.
I
5. Proposal templates, evaluation forms and model grant agreements (MGA):
Research and Innovation Action:
Specific provisions and funding rates
Standard proposal template
Standard evaluation form
General MGA - Multi-Beneficiary
Annotated Grant Agreement
6. Additional provisions:
Horizon 2020 budget flexibility
Classified information
Technology readiness levels (TRL) – where a topic description refers to TRL, these definitions apply
Members of consortium are required to conclude a consortium agreement, in principle prior to the signature of the grant agreement.
8. Additional documents:
1. Introduction WP 2018-20
8. Health, demographic change and well-being WP 2018-20
14. Secure societies – protecting freedom and security of Europe and its citizens WP 2018-20
18. Dissemination, Exploitation and Evaluation WP 2018-20
 General annexes to the Work Programme 2018-2020
Legal basis: Horizon 2020 Regulation of Establishment
Legal basis: Horizon 2020 Rules for Participation
Legal basis: Horizon 2020 Specific Programme
 
7. Open access must be granted to all scientific publications resulting from Horizon 2020 actions.
Where relevant, proposals should also provide information on how the participants will manage the research data generated and/or collected during the project, such as details on what types of data the project will generate, whether and how this data will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.
Open access to research data
The Open Research Data Pilot has been extended to cover all Horizon 2020 topics for which the submission is opened on 26 July 2016 or later. Projects funded under this topic will therefore by default provide open access to the research data they generate, except if they decide to opt-out under the conditions described in Annex L of the Work Programme. Projects can opt-out at any stage, that is both before and after the grant signature.
Note that the evaluation phase proposals will not be evaluated more favourably because they plan to open or share their data, and will not be penalised for opting out.
Open research data sharing applies to the data needed to validate the results presented in scientific publications. Additionally, projects can choose to make other data available open access and need to describe their approach in a Data Management Plan.
Projects need to create a Data Management Plan (DMP), except if they opt-out of making their research data open access. A first version of the DMP must be provided as an early deliverable within six months of the project and should be updated during the project as appropriate. The Commission already provides guidance documents, including a template for DMPs. See the Online Manual.
Eligibility of costs: costs related to data management and data sharing are eligible for reimbursement during the project duration.
The legal requirements for projects participating in this pilot are in the article 29.3 of the Model Grant Agreement.
 
Garantías:
No exige Garantías
No existen condiciones financieras para el beneficiario.

Información adicional de la convocatoria

Efecto incentivador: Esta ayuda tiene efecto incentivador, por lo que el proyecto no puede haberse iniciado antes de la presentación de la solicitud de ayuda. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
No Competitiva Competitiva Muy Competitiva
No conocemos el presupuesto total de la línea
Minimis: Esta línea de financiación NO considera una “ayuda de minimis”. Puedes consultar la normativa aquí.

Otras ventajas

Sello PYME: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.
H2020-SC1-FA-DTS-2018-2020 Toolkit for assessing and reducing cyber risks in hospitals and care centres to protect privacy/data/infrastructures Specific Challenge:Digital technologies such as Big data, Internet of Things, Robotics, Artificial Intelligence, High Performance Computing,...
Sin info.
SU-TDS-02-2018 Toolkit for assessing and reducing cyber risks in hospitals and care centres to protect privacy/data/infrastructures
en consorcio: Specific Challenge:Digital technologies such as Big data, Internet of Things, Robotics, Artificial Intelligence, High Performance Computing,...
Cerrada hace 6 años | Próxima convocatoria prevista para el mes de
SU-TDS-03-2018 Raising awareness and developing training schemes on cybersecurity in hospitals
en consorcio: Specific Challenge:ICT infrastructures and data have become critical for the functioning of the hospitals and care systems. Due to increasin...
Cerrada hace 6 años | Próxima convocatoria prevista para el mes de