Skip to main content

Privacy, Confidentiality, and Security of Public Health Information

  • Chapter
  • First Online:
Book cover Public Health Informatics and Information Systems

Part of the book series: Health Informatics ((HI))

Abstract

Public health organizations need to protect the confidentiality of sensitive, identifying information about individuals to maintain the willingness of individuals to disclose such information and to adhere to laws affecting the handling of health information. Safeguarding the privacy, confidentiality, and security of such information is an important undertaking. A public health organization needs to adhere to the basic principles of fair information practices, as incorporated into the Privacy Act of 1974, and to develop and enforce confidentiality policies that govern the handling and release of public health data. Among security measures that an organization can institute to protect the integrity of information and guard against unauthorized access to it are passwords, smart cards, biometrics, and cryptography. In addition, a public health organization needs to be especially vigilant about potential intrusions into its computer systems, and particularly of those systems that rely or reside on the Internet. The use of proxy servers, session password mechanisms, and firewalls can help guard against mischievous attacks from the Internet, while intrusion detection measures can help an organization detect efforts to compromise systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Westin A. Records, computers, and the rights of citizens: report of the secretary’s advisory committee on automated personal data systems. Washington, DC: US Department of Health Education and Welfare. 1973. Also available at: http://epic.org/privacy/hew1973report/. Accessed 8 Jan 2013.

  2. O’Connor J, Matthews G. Informational privacy, public health, and state laws. Am J Public Health. 2011;101(10):1845–50.

    Article  PubMed  Google Scholar 

  3. Nordin JD, Kasimow S, Levitt MJ, Goodman MJ. Bioterrorism surveillance and privacy: intersection of HIPAA, the common rule, and public health law. Am J Public Health. 2008;98(5):802–7.

    Article  PubMed  Google Scholar 

  4. Department of Health and Human Services. Health Information Privacy. 2013. http://www.hhs.gov/ocr/privacy/index.html. Accessed 13 Jan 2013.

  5. Institute of Medicine, Committee on Health Research and the Privacy of Health Information. Beyond the HIPAA privacy rule: enhancing privacy, improving health through research. Washington, DC: Institute of Medicine; 2009.

    Google Scholar 

  6. Association of State and Territorial Health Officials. HIPAA privacy rule implementation in state public health agencies. 2005. Available at: http://www.astho.org/Programs/e-Health/Privacy/Materials/HIPAA-Privacy-Rule-Implementation-in-State-Public-Health-Agencies/. Accessed 13 Jan 2013.

  7. Department of Health and Human Services. Health IT rules and regulations. 2013. Available at: http://www.healthit.gov/policy-researchers-implementers/final-rules-regulations. Accessed 13 Jan 2013.

  8. Sweeney L. k-anonymity: a model for protecting privacy. Int J Uncertainty Fuzziness Knowl Based Syst. 2002;10(5):557–70.

    Article  Google Scholar 

  9. Claerhout B, De Moor GIE. Privacy protection for health grid applications. Methods Inf Med. 2005;44:140–3.

    PubMed  CAS  Google Scholar 

  10. AbdelMalik P, Kamel Boulos MN. Multidimensional point transform for public health practice. Methods Inf Med. 2012;51:63–73.

    Article  PubMed  CAS  Google Scholar 

  11. Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;21(2):120–6.

    Article  Google Scholar 

  12. National Institute of Standards and Technology. Advanced encryption standard. Federal Information Processing Standards Publication 197. 2001. Available at: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. Accessed 29 Mar 2013.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to William A. Yasnoff MD, PhD .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag London

About this chapter

Cite this chapter

Yasnoff, W.A. (2014). Privacy, Confidentiality, and Security of Public Health Information. In: Magnuson, J., Fu, Jr., P. (eds) Public Health Informatics and Information Systems. Health Informatics. Springer, London. https://doi.org/10.1007/978-1-4471-4237-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4237-9_9

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4236-2

  • Online ISBN: 978-1-4471-4237-9

  • eBook Packages: MedicineMedicine (R0)

Publish with us

Policies and ethics