Confidentiality and security of information

被引:0
作者
Dunnill, Richard [1 ,2 ,3 ]
Barham, Chris [4 ]
机构
[1] Royal Bournemouth Hosp, Intens Care Anaesthetist, Bournemouth, Dorset, England
[2] Dorset Clin Advisory Grp, Dorchester, England
[3] Somerset Clin Advisory Grp, Somerset, England
[4] Queen Victoria Hosp, E Grinstead, England
关键词
Caldicott guardian; care records guarantee; data protection; information governance;
D O I
10.1016/j.mpaic.2007.09.008
中图分类号
R614 [麻醉学];
学科分类号
100217 ;
摘要
Information held about patients should be accurate, available to those who need to see it, and yet remain confidential. These three principles, especially the last two, may be difficult to achieve together. Electronic record systems can use sophisticated processes, such as Role-Based Access, Legitimate Relationships, and Sealed Envelopes, to enable appropriate security. Use of patient information is covered by legislation, such as the Data Protection Act, by guidance, such as the Care Record Guarantee, and by local information governance processes, such as the Caldicott guardian and Trust Data Protection Policies. Healthcare professionals must be aware of all these, particularly when keeping information for their own use (e.g. logbooks).
引用
收藏
页码:509 / 512
页数:4
相关论文
共 50 条
[21]   Cyber Security and Habeas Data:The Latin American Response to Information Security and Data Protection [J].
Parraguez Kobek, Luisa ;
Caldera, Erick .
OASIS-OBSERVATORIO DE ANALISIS DE LOS SISTEMAS INTERNACIONALES, 2016, (24) :109-128
[22]   Information Security and Privacy-Rethinking Governance Models [J].
Gillon, Kirstin ;
Branz, Louis ;
Culnan, Mary ;
Dhillon, Gurpreet ;
Hodgkinson, Robert ;
MacWillson, Alastair .
COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2011, 28 :561-570
[23]   Information security and privacy-rethinking governance models [J].
Gillon K. ;
Branz L. ;
Culnan M. ;
Dhillon G. ;
Hodgkinson R. ;
MacWillson A. .
Communications of the Association for Information Systems, 2011, 28 (01) :561-570
[24]   INFORMATION CAMPAIGN ON CYBER SECURITY FOR STUDENTS OF AN EDUCATIONAL UNIT [J].
Chalacan, Luis Javier Molina ;
Arias, Edmundo Jose Jalon ;
Zambrano, Luis Orlando Albarracin .
REVISTA CONRADO, 2024, 20 :60-67
[25]   Information Protection - Security, Clustering and E-governance [J].
Serban, Mariuta ;
Stefan, Raluca-Mariana ;
Ionescu, Eduard-Ionel .
21ST INTERNATIONAL ECONOMIC CONFERENCE OF SIBIU 2014, IECS 2014 PROSPECTS OF ECONOMIC RECOVERY IN A VOLATILE INTERNATIONAL CONTEXT: MAJOR OBSTACLES, INITIATIVES AND PROJECTS, 2014, 16 :288-292
[26]   Information security investment and purchase decision for personalized products [J].
Xu, Lu ;
Li, Yanhui ;
Yao, Qi .
MANAGERIAL AND DECISION ECONOMICS, 2022, 43 (06) :2619-2635
[27]   Model Driven Approach for Designing of Information Security System [J].
Gaidarski, Ivan ;
Minchev, Zlatogor ;
Andreev, Rumen .
JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2018, 13 (04) :149-158
[28]   Disaster easily averted? - Data confidentiality and the hospital desktop computer [J].
Sethi, Neeraj ;
Lane, Gethin ;
Newton, Sophie ;
Egan, Philip ;
Ghosh, Samit .
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2014, 83 (05) :385-391
[29]   THE ORGANIZATION AND MANAGEMENT OF INFORMATION SECURITY ISSUES IN HEALTH-CARE [J].
LOUWERSE, CP .
INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1994, 35 :195-200
[30]   A people & purpose approach to humanitarian data information security and privacy [J].
Chan, Jennifer ;
Bateman, Lauren ;
Olafsson, Gisli .
HUMANITARIAN TECHNOLOGY: SCIENCE, SYSTEMS AND GLOBAL IMPACT 2016, HUMTECH2016, 2016, 159 :3-5