Skip to main content

Abstract

The issue of privacy is difficult. The individual has the inherent right to control personal information. However, to provide the best possible care and service to the individual, public and private organizations must know some of that information. The issue is further complicated because “privacy” has not been defined in a way that is widely and generally accepted. Actions such as collecting and storing unnecessary personal data, disclosing data to individuals or organizations that do not have a genuine need for it, or using private information for something other than the original purpose could be considered intrusive.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Barber, B. Security and confidentiality issues from a national perspective. In: Patient Privacy, Confidentiality and Data Security: Papers from the British Computer Society Nursing Specialist Group Annual Conference. Lincolnshire, UK: The British Computer Society, 1997: 61–72.

    Google Scholar 

  • Bowen, J.W., Klimczak, C., Ruiz, M., and Barnes, M. Design of access control methods for protecting the confidentiality of patient information systems in networked systems. Journal of the American Medical Informatics Association: Symposium Supplement. Nashville: Hanley & Belfus, 1997: 46–50.

    Google Scholar 

  • Canadian Institute for Health Information (CIHI). Working Group 3: Privacy, Confidentiality, Data Integrity, and Security, Background Document. Ottawa, Canada: CIHI, 1997.

    Google Scholar 

  • Canadian Organization for the Advancement of Computers in Health (COACH). Guidelines to Promote the Confidentiality and Security of Automated Health Records. Edmonton, Canada: COACH, 1979.

    Google Scholar 

  • Hoy, D. Protecting the individual: Confidentiality, security and the growth of information systems. Sharing Information: Key Issues for the Nursing Profession. Lincolnshire, UK: The British Computer Society, 1997: 78–87.

    Google Scholar 

  • McKenzie, D.J.P. Healthcare trend improves security practices. In Confidence. 1996, May—June. 3 pg. Online. Available: http://www.ahima.org/publications/1a/ May-June.inconf.html

  • Miller, D.W. Internet security: What health information managers should know. Journal of AHIMA. 1996, September, 4 pg. Online. Available: http://www.ahima.org/publications/2f/sept.focus.html

  • Organization for Economic Cooperation and Development (OECD). Draft Recommendations of the Council concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data. Paris: OECD, 1979.

    Google Scholar 

Additional Resources

  • Dalander, G., Willner, S., and Brasch, S. Turning a dream into a reality: The evolution of the electronic health record. Journal of AHIMA. 1997, October. 6 pg. Online. Available: http://www.ahima.org/publications/2f/focus.2.1097.html

  • Dennis, J.C. Asking tough questions: Assessing top management support for confidentiality. In Confidence. 1997, Jan/Feb, 2 pg. Online. Available: http://www.ahima.org/publications/la/inconf.1.1998.html

  • Miller, D.W. Current technology: Confidentiality risks and controls. In Confidence. 1997, July/Aug, 6 pg. Online. Available: http://www.ahima.org/publications/la/july.inconfidence.html

  • Mills, M.E. Data privacy and confidentiality in the public arena. Journal of the American Medical Informatics Association: Symposium Supplement. Nashville, USA: Hanley & Belfus, 1997: 42–45.

    Google Scholar 

  • Murray, P.J. “It’ll never happen to me.” Revisiting some computer security issues. Computers in Nursing 1997;15(2):65–66, 70.

    Google Scholar 

  • Nelson, D. Information security: A holistic approach to network system security. Journal of AHIMA. 1997, May, 6 pg. Online. Available: http://www.ahima.org/publications/2f/focus.1.597.html

  • Sanchez-Swatman, L. Nurses, computers and confidentiality. Canadian Nurse 1997; August:47–48.

    Google Scholar 

  • Vincze, L.S. Confidentiality and compliance: Political and public interests. In Confidence. 1997, Nov/Dec, 3 pg. Online. Available: http://www.ahima.org/publications/la/inconf.nov.dec.1997.html

  • Zakoworotny, C., Rutz, C., and Zwingman-Babley, C. Information security: A team approach to managing an information security program. Journal of AHIMA. 1997, May, 7 pg. Online. Available: http://www.ahima.org/publications/2f/focus.597.html

  • American National Standards Institute Home Page http://www.ansi.org

  • Canadian Institute for Health Information http://www.cihi.ca

  • Canadian Information Highway Advisory Council http://www.infoic.gc.ca/info_highway/ih.html

  • Links to selected security standards http://www.zeuros.co.uk/firewall/standard.htm

  • List of selected security websites and bulletin boards http://www.carelink.ca/sites.html

  • Text of new European Data Protection Directive http://www.echo.lu/legal/en/dataprot/datprot.html

  • United States Privacy Laws by State http://www.epic.org

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer Science+Business Media New York

About this chapter

Cite this chapter

Hannah, K.J., Ball, M.J., Edwards, M.J.A. (1999). Data Protection. In: Introduction to Nursing Informatics. Health Informatics. Springer, New York, NY. https://doi.org/10.1007/978-1-4757-3095-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-1-4757-3095-1_14

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4757-3097-5

  • Online ISBN: 978-1-4757-3095-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics