Data Security and Legal Considerations

  • Eleanor Callahan Hunt
  • Sara Breckenridge Sproat
  • Rebecca Rutherford Kitzmiller
Part of the Health Informatics Series book series (HI)


This chapter is intended to serve as a starting point for the project manager in the quest for data security. The course of implementing systems in the healthcare environment is a minefield of legal ramifications found throughout all phases of implementation. Data security and legalities are often interconnected. Regulations and laws impacting every aspect of systems implementation include system access, display, and system output. Installing a technological system means working thorough all of the secondary impacts to complex processes that exist in an organization as well as planning for hardware installation.


Data Security Hospital Information System Unauthorized Access Physical Security Extensible Authentication Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bednarz A. Hospital sounds alarm after 3 day struggle. Network World Nov. 25, 2002. Available at (January 17, 2003). 19(47):1.Google Scholar
  2. 2.
    Knox R. Hospitals and computer meltdowns. NPR Nov. 29. 2002. Available at (September 15, 2003).Google Scholar
  3. 3.
    Soat J. IT confidential: friends in high places; saved by paper. Information Week Nov. 25, 2002. Available at IWK20021122S0047 (September 17, 2003). Issue 916. p74.Google Scholar
  4. 4.
    Some useful legal definitions. (May 5, 2003).Google Scholar
  5. 5.
    Executive Summary, Digital Millennium Copyright Act. copyright/reports/studies/dmca/dmca_executive.html (September 16, 2003).Google Scholar
  6. 6.
    Englebardt SP, Nelson R. Health Care Informatics: An Interdisciplinary Approach. St. Louis, MO: Mosby, 2002.Google Scholar
  7. 7.
    Merriam-Webster OnLine (March 30, 2003).Google Scholar
  8. 8.
    Internet FAQ consortium. (March 3, 2003).Google Scholar
  9. 9.
    Safeguarding your critical data: a practical guide to data protection and recovery. U.S. Data Trust Corporation White Paper, 2002. resources/data_protection_guide.asp (May 10, 2003).Google Scholar

Copyright information

© Springer Science+Business Media New York 2004

Authors and Affiliations

  • Eleanor Callahan Hunt
    • 1
  • Sara Breckenridge Sproat
    • 2
  • Rebecca Rutherford Kitzmiller
    • 3
  1. 1.Informatics ConsultantRaleighUSA
  2. 2.67th Combat Support Hospital, UnitWuerzburgGermany
  3. 3.Duke University Health SystemDurhamUSA

Personalised recommendations