Skip to main content

Confidentiality

  • Chapter
  • 130 Accesses

Part of the book series: Computers in Health Care ((HI))

Abstract

The issue of privacy is difficult. The individual has the inherent right to control personal information. However, in order to provide the best possible care and service to the individual, public and private organizations must know some of that information. The issue is further complicated because “privacy” has not been defined in a way that is widely and generally accepted. Whieldon (1979) suggested, however, that the concept of “invasion of privacy” is generally recognized as an intrusion upon the private and personal life of an individual. Actions such as collecting and storing unnecessary personal data, disclosing data to individuals or organizations that do not have a genuine need for it, or using private information for something other than the original purpose could be considered intrusive.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   74.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • American Hospital Association. 1976. A patient’s bill of rights. Nursing Outlook 24(1): 29.

    Google Scholar 

  • Canadian Organization for the Advancement of Computers in Health (COACH). 1979. Guidelines to Promote the Confidentiality and Security of Automated Health Records Edmonton, Canada: COACH.

    Google Scholar 

  • Covvey, H. D. 1981. The recommendations of a Canadian Royal Commission relating to computer—based health record keeping. Proceedings, The Fifth Annual Symposium on Computer Applications in Medical Care. Washington, D.C. (November).

    Google Scholar 

  • Creighton, H. 1978. Diminishing right of privacy: Computerized medical records. Supervisor Nurse (February): 58–61.

    Google Scholar 

  • Dotto, L. 1980 “Ethics float in muddy waters” Computer Data 39: 41–43.

    Google Scholar 

  • Hiller, M., and Beyda, V. 1981. Computers, medical records and the right to privacy. Journal of Health, Policy and Law 6(3): 463–487.

    Article  CAS  Google Scholar 

  • International Business Machines (IBM) Corp. 1974. Data Scrutiny and Data Processing, vol. 1, Introduction and Overview New York: IBM.

    Google Scholar 

  • Organization for Economic Cooperation and Development (OECD). 1979. Draft Recommendations of the Council concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data Paris: OECD.

    Google Scholar 

  • Privacy Protection Study Commission. 1977. Personal Privacy in an Information Society Washington, D.C.: U.S. Government Printing Office.

    Google Scholar 

  • Royal Canadian Mounted Police. 1979. “Security in the EDT environment.” Security Information Publications (January).

    Google Scholar 

  • Westin, A. 1976. Computers, Health Records, and Citizen Rights Washington, D.C: U.S. Government Printing Office.

    Google Scholar 

  • Westin, A. 1979. The impact of computers on privacy. Datamation, 25 (12): 190, 192–194.

    Google Scholar 

  • Whieldon, D. 1979. “How much will privacy cost?” Computer Decisions (August): 54–56.

    Google Scholar 

Bibliography

  • Bakker, A.R. & Scholes, M. (1988). Data protection and nursing: A technical and organizational challenge. In Daly, N. & Hannah, K.J.(eds.). Proceedings of Nursing and Computers: Third International Symposium on Nursing Use of Computers and Information Science Toronto: The C.V. Mosby Company, 94–102.

    Google Scholar 

  • Gruending, D.L. & MacKay, D.C. (1988). The computerized patient record: Legal, ethical and confidentiality issues. In Daly, N. & Hannah, K.J. (eds.). Proceedings of Nursing and Computers: Third International Symposium on Nursing Use of Computers and Information Science Toronto: The C.V. Mosby Company, 343–352.

    Google Scholar 

  • Huesing, S. (1983). Security and confidentiality are everyone’s business. Dimensions in Health Service May; 60(5): 26.

    PubMed  CAS  Google Scholar 

  • Iversen, I. (1988). Data protection as to medical records and nursing care plans. In Daly, N. & Hannah, K.J. (eds.). Proceedings of Nursing and Computers: Third International Symposium on Nursing Use of Computers and Information Science Toronto: The C.V. Mosby Company, 14–16.

    Google Scholar 

  • Peterson, H.E. & Gerdin Jelger, U. (1988). Patient and staff integrity in a computerized environment. In Daly, N. & Hannah, K.J. (eds.). Proceedings of Nursing and Computers: Third International Symposium on Nursing Use of Computers and Information Science Toronto: The C.V.Mosby Company, 726–729.

    Google Scholar 

  • Pluyter-Wenting, E.S.P., Bakker, A.R. & Louwerse, C.P. (1991). Data protection in nursing informatics: Balancing privacy aspects and shared use. In Hovenga, E.J.S., Hannah, K.J., McCormick, K.A., & Ronald, J.S. (eds.). Proceedings of the Fourth International Conference on Nursing Use of Computers and Information Science New York: Springer-Verlag, 68–76.

    Google Scholar 

  • Romano, C.A. (1987). Privacy, confidentiality, and security of computerized systems: The nursing responsibility May-June; 5(3): 99–104.

    Google Scholar 

  • Simpson, R..L. (1991). Securing your system from hackers and other hazards. Nursing Management March; 22(3): 25–26.

    CAS  Google Scholar 

  • Vandermeulen, H. (1988). Data protection. In Daly, N. & Hannah, K.J. (eds.). Proceedings of Nursing and Computers: Third International Symposium on Nursing Use of Computers and Information Science Toronto: The C.V. Mosby Company, 2–13.

    Google Scholar 

  • Wolfe, K. (1990). Confidentiality and common sense. AAOHN Journal July; 38(7): 338–340.

    PubMed  CAS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer Science+Business Media New York

About this chapter

Cite this chapter

Hannah, K.J., Ball, M.J., Edwards, M.J.A. (1994). Confidentiality. In: Introduction to Nursing Informatics. Computers in Health Care. Springer, New York, NY. https://doi.org/10.1007/978-1-4757-2246-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4757-2246-8_11

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4757-2248-2

  • Online ISBN: 978-1-4757-2246-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics