Confidentiality and security of information

被引:0
作者
Dunnill, Richard [1 ,2 ,3 ]
Barham, Chris [4 ]
机构
[1] Royal Bournemouth Hosp, Intens Care Anaesthetist, Bournemouth, Dorset, England
[2] Dorset Clin Advisory Grp, Dorchester, England
[3] Somerset Clin Advisory Grp, Somerset, England
[4] Queen Victoria Hosp, E Grinstead, England
关键词
Caldicott guardian; care records guarantee; data protection; information governance;
D O I
10.1016/j.mpaic.2007.09.008
中图分类号
R614 [麻醉学];
学科分类号
100217 ;
摘要
Information held about patients should be accurate, available to those who need to see it, and yet remain confidential. These three principles, especially the last two, may be difficult to achieve together. Electronic record systems can use sophisticated processes, such as Role-Based Access, Legitimate Relationships, and Sealed Envelopes, to enable appropriate security. Use of patient information is covered by legislation, such as the Data Protection Act, by guidance, such as the Care Record Guarantee, and by local information governance processes, such as the Caldicott guardian and Trust Data Protection Policies. Healthcare professionals must be aware of all these, particularly when keeping information for their own use (e.g. logbooks).
引用
收藏
页码:509 / 512
页数:4
相关论文
共 50 条
[31]   Information security frameworks for assisting GDPR compliance in banking industry [J].
Serrado, Joao ;
Pereira, Ruben Filipe ;
Mira da Silva, Miguel ;
Scalabrin Bianchi, Isaias .
DIGITAL POLICY REGULATION AND GOVERNANCE, 2020, 22 (03) :227-244
[32]   Information Security and Data Protection: The Role of the "Human Factor" in Organizations [J].
Hugl, Ulrike .
PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, :80-87
[33]   GLOBAL INFORMATION SECURITY AND THE CHANGING LANDSCAPE OF DATA PROTECTION LAWS [J].
Poladov, A. G. .
PROCEEDINGS OF THE7TH INTERNATIONAL CONFERENCE ON CONTROL AND OPTIMIZATION WITH INDUSTRIAL APPLICATIONS, VOL II, 2020, :302-304
[34]   Information Security in Principles and Provisions of the EU Data Protection Law [J].
Katulic, Tihomir ;
Protrka, Nikola .
2019 42ND INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2019, :1219-1225
[35]   On the training of highly qualified scientific staff in the field of information security [J].
Arutyunov V.V. .
Scientific and Technical Information Processing, 2017, 44 (01) :64-68
[36]   The importance of integration of information security management systems (ISMS) to the organization's Enterprise Information Systems (EIS) [J].
Luma, A. ;
Abazi, B. .
2019 42ND INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2019, :1205-1208
[37]   Information security governance in the public sector: investigations, approaches, measures, and trends [J].
Magnusson, Lars ;
Iqbal, Sarfraz ;
Elm, Patrik ;
Dalipi, Fisnik .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (04)
[38]   Network Information Security Data Protection Based on Data Encryption Technology [J].
Ping, Han .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (03) :2719-2729
[39]   AES Design Improvements Towards Information Security Considering Scan Attack [J].
Yu, Liting ;
Zhang, Dongrong ;
Wu, Liang ;
Xie, Shuguo ;
Su, Donglin ;
Wang, Xiaoxiao .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :322-326
[40]   Results of European projects improving security of distributed health information systems [J].
Blobel, B ;
Pharow, P .
MEDINFO '98 - 9TH WORLD CONGRESS ON MEDICAL INFORMATICS, PTS 1 AND 2, 1998, 52 :1119-1123