Skip to main content

Datenschutz und Datensicherheit

  • Chapter
  • 164 Accesses

Zusammenfassung

Datenschutz, Datensicherheit und die informationelle Selbstbestimmung des Indi viduums stellen ein schwieriges Kapitel dar. Jeder Mensch besitzt das Grundrecht an seinen persönlichen Daten. Private und öffentliche Organisationen müssen jedoch zumindest auf einen Teil dieser Daten zugreifen dürfen, damit sie ihren Aufgaben nachkommen können. Komplizierter wird das Thema noch dadurch, dass der Begriff „informationelle Selbstbestimmung“ noch nicht hinreichend präzise definiert wurde und deshalb auch noch keine allgemeine Akzeptanz findet. Handlungen, wie das Sammeln und Archivieren „überflüssiger“ persönlicher Daten, die Weitergabe von Daten an Individuen oder Organisationen, die hieran keinen wirklichen Bedarf nachweisen oder das Nutzen vertraulicher Informationen für einen anderen als den ursprünglichen Zweck, können die Privatsphäre und das Recht auf informationelle Selbstbestimmung verletzen.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   49.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  • Barber B (1997) Security and confidentiality issues from a national perspective. In: Patient Pri- vacy, Confìdentiality and Data Security: Papers from the British Computer Society Nursing Specialist Group Annual Conference. The British Computer Society, Lincolnshire, pp 61–72

    Google Scholar 

  • Bowen JW, Klimczak C, Ruiz M, Barnes M (1997) Design of access control methods for protecting the confidentiality of patient information Systems in networked Systems. Journal of the American Medical Informatics Association: Symposium Supplement, Hanley &Belfus, Nashville, pp 46–50

    Google Scholar 

  • Canadian Institute for Health Information (CIHI). Working Group 3 (1997) Privacy, Confidentiality, Data Integrity, and Security, Background Document. CIHI, Ottawa, Canada

    Google Scholar 

  • Canadian Organization for the Advancement of Computers in Health - COACH (1979) Guidelines to promote the Confidentiality and Security of Automated Health Records. COACH, Edmonton, Canada

    Google Scholar 

  • Hoy D (1997) Protecting the individual: Confìdentiality, security and the growth of information Systems. Sharing Information: Key Issues for the Nursing Profession. The British Computer Society, Lincolnshire, pp 78–87

    Google Scholar 

  • McKenzie DJP (1996) Healthcare trend improves security practices. In Confidence. May-June. 3 pg. Online. Available: http://www.ahima.org/publications/la/May-June.inconf.html

    Google Scholar 

  • Miller DW (1996) Internet security: What health information managers should know. Journal of AHIMA. 1996, September, 4 pg. Online. Available: http://www.ahima.org/publications/2f/sept.focus.html

    Google Scholar 

  • Organization for Economic Cooperation and Development - OECD (1979) Draft Recommendations of the Council concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data. OECD, Paris

    Google Scholar 

Weiterführende Literatur/Quellen

  • Dalander G, Willner S, Brasch S (1997) Turning a dream into reality: The evolution of the electronic health record. Journal of AHIMA. 1997, October. 6 pg. Online. Available: http://www.ahima.org/publications/2f/focus.2.1097.html

    Google Scholar 

  • Dennis JC (1997) Asking tough questions: Assessing top management support for confìdentiality.In Confìdence. 1997, Jan/Feb, 2 pg. Online. Available: http://www.ahima.org/publications/la/inconf. 1.1998.html

    Google Scholar 

  • Miller DW (1997) Current technology: Confidentiality risks and controls. In Confidence. 1997,July/Aug, 6 pg. Online. Available: http://www.ahima.org/publications/la/july.inconfidence.html

    Google Scholar 

  • Mills ME (1997) Data privacy and confidentiality in the public arena. Journal of the American Medical Informatics Association: Symposium Supplement. Hanley &Belfus, Nashville, USA,pp 42–45

    Google Scholar 

  • Murray PJ (1997) „It’ll never happen to me.“ Revisiting some Computer security issues. Computers in Nursing 15(2):65-66, 70

    PubMed  Google Scholar 

  • Nelson D (1997) Information security: A holistic approach to network System security. Journal of AHIMA. 1997, May, 6 pg. Online. Available: http://www.ahima.org/publications/2f/focus.1.597.html

    Google Scholar 

  • Sanchez-Swatman L (1997) Nurses, Computers and confìdentiality. Canadian Nurse August:47–48

    Google Scholar 

  • Vincze LS (1997) Confidentiality and compliance: Political and public interests. In Confidence.1997, Nov/Dec, 3 pg. Online. Available: http://www.ahima.org/publications/la/inconf.nov.dec.l997.html

    Google Scholar 

  • Zakoworotny C, Rutz C, Zwingman-Babley C (1997) Information security: A team approach to managing an information security program. Journal of AHIMA. 1997, May, 7 pg. Online.Available: http://www.ahima.org/publications/2f/focus.597.html

    Google Scholar 

  • American National Standards Institute Home Page: http://www.ansi.org

    Google Scholar 

  • Canadian Institute for Health Information: http://www.cihi.ca Canadian Information Highway Advisory Council: http://www.info.ic.gc.ca/info_highway/ih.html Links to selected security Standards (Informationen über Sicherheitsstandards; d.Ü.):http://www.zeuros.co.uk/firewall/standard.html

    Google Scholar 

  • List of selected security Websites and bulletin boards (Liste ausgewählter Webseiten und Infobretter zur Datensicherheit; d. Ü.): http://www.carelink.ca/sites.html

    Google Scholar 

  • European Data Protection Directive (Wortlaut der neuen europäischen Datenschutzdirektive):http://www.echo.lu/legal/en/dataprot/dataprot.html

    Google Scholar 

  • United States Privacy Laws by State (Bundesgesetze der USA zur informationellen Selbstbestimmung; d. Ü.): http://www.epic.org

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Hübner, U. (2002). Datenschutz und Datensicherheit. In: Hannah, K.J., Ball, M.J., Edwards, M.J.A. (eds) Pflegeinformatik. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-56275-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-56275-4_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41869-6

  • Online ISBN: 978-3-642-56275-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics