Abstract
The issue of privacy is difficult. The individual has the inherent right to control personal information. However, to provide the best possible care and service to the individual, public and private organizations must know some of that information. The issue is further complicated because “privacy” has not been defined in a way that is widely and generally accepted. Actions such as collecting and storing unnecessary personal data, disclosing data to individuals or organizations that do not have a genuine need for it, or using private information for something other than the original purpose could be considered intrusive.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barber, B. Security and confidentiality issues from a national perspective. In: Patient Privacy, Confidentiality and Data Security: Papers from the British Computer Society Nursing Specialist Group Annual Conference. Lincolnshire, UK: The British Computer Society, 1997: 61–72.
Bowen, J.W., Klimczak, C., Ruiz, M., and Barnes, M. Design of access control methods for protecting the confidentiality of patient information systems in networked systems. Journal of the American Medical Informatics Association: Symposium Supplement. Nashville: Hanley & Belfus, 1997: 46–50.
Canadian Institute for Health Information (CIHI). Working Group 3: Privacy, Confidentiality, Data Integrity, and Security, Background Document. Ottawa, Canada: CIHI, 1997.
Canadian Organization for the Advancement of Computers in Health (COACH). Guidelines to Promote the Confidentiality and Security of Automated Health Records. Edmonton, Canada: COACH, 1979.
Hoy, D. Protecting the individual: Confidentiality, security and the growth of information systems. Sharing Information: Key Issues for the Nursing Profession. Lincolnshire, UK: The British Computer Society, 1997: 78–87.
McKenzie, D.J.P. Healthcare trend improves security practices. In Confidence. 1996, May—June. 3 pg. Online. Available: http://www.ahima.org/publications/1a/ May-June.inconf.html
Miller, D.W. Internet security: What health information managers should know. Journal of AHIMA. 1996, September, 4 pg. Online. Available: http://www.ahima.org/publications/2f/sept.focus.html
Organization for Economic Cooperation and Development (OECD). Draft Recommendations of the Council concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data. Paris: OECD, 1979.
Additional Resources
Dalander, G., Willner, S., and Brasch, S. Turning a dream into a reality: The evolution of the electronic health record. Journal of AHIMA. 1997, October. 6 pg. Online. Available: http://www.ahima.org/publications/2f/focus.2.1097.html
Dennis, J.C. Asking tough questions: Assessing top management support for confidentiality. In Confidence. 1997, Jan/Feb, 2 pg. Online. Available: http://www.ahima.org/publications/la/inconf.1.1998.html
Miller, D.W. Current technology: Confidentiality risks and controls. In Confidence. 1997, July/Aug, 6 pg. Online. Available: http://www.ahima.org/publications/la/july.inconfidence.html
Mills, M.E. Data privacy and confidentiality in the public arena. Journal of the American Medical Informatics Association: Symposium Supplement. Nashville, USA: Hanley & Belfus, 1997: 42–45.
Murray, P.J. “It’ll never happen to me.” Revisiting some computer security issues. Computers in Nursing 1997;15(2):65–66, 70.
Nelson, D. Information security: A holistic approach to network system security. Journal of AHIMA. 1997, May, 6 pg. Online. Available: http://www.ahima.org/publications/2f/focus.1.597.html
Sanchez-Swatman, L. Nurses, computers and confidentiality. Canadian Nurse 1997; August:47–48.
Vincze, L.S. Confidentiality and compliance: Political and public interests. In Confidence. 1997, Nov/Dec, 3 pg. Online. Available: http://www.ahima.org/publications/la/inconf.nov.dec.1997.html
Zakoworotny, C., Rutz, C., and Zwingman-Babley, C. Information security: A team approach to managing an information security program. Journal of AHIMA. 1997, May, 7 pg. Online. Available: http://www.ahima.org/publications/2f/focus.597.html
American National Standards Institute Home Page http://www.ansi.org
Canadian Institute for Health Information http://www.cihi.ca
Canadian Information Highway Advisory Council http://www.infoic.gc.ca/info_highway/ih.html
Links to selected security standards http://www.zeuros.co.uk/firewall/standard.htm
List of selected security websites and bulletin boards http://www.carelink.ca/sites.html
Text of new European Data Protection Directive http://www.echo.lu/legal/en/dataprot/datprot.html
United States Privacy Laws by State http://www.epic.org
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer Science+Business Media New York
About this chapter
Cite this chapter
Hannah, K.J., Ball, M.J., Edwards, M.J.A. (1999). Data Protection. In: Introduction to Nursing Informatics. Health Informatics. Springer, New York, NY. https://doi.org/10.1007/978-1-4757-3095-1_14
Download citation
DOI: https://doi.org/10.1007/978-1-4757-3095-1_14
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4757-3097-5
Online ISBN: 978-1-4757-3095-1
eBook Packages: Springer Book Archive