Confidentiality and security of information

被引:0
作者
Dunnill, Richard [1 ,2 ,3 ]
Barham, Chris [4 ]
机构
[1] Royal Bournemouth Hosp, Intens Care Anaesthetist, Bournemouth, Dorset, England
[2] Dorset Clin Advisory Grp, Dorchester, England
[3] Somerset Clin Advisory Grp, Somerset, England
[4] Queen Victoria Hosp, E Grinstead, England
关键词
Caldicott guardian; care records guarantee; data protection; information governance;
D O I
10.1016/j.mpaic.2007.09.008
中图分类号
R614 [麻醉学];
学科分类号
100217 ;
摘要
Information held about patients should be accurate, available to those who need to see it, and yet remain confidential. These three principles, especially the last two, may be difficult to achieve together. Electronic record systems can use sophisticated processes, such as Role-Based Access, Legitimate Relationships, and Sealed Envelopes, to enable appropriate security. Use of patient information is covered by legislation, such as the Data Protection Act, by guidance, such as the Care Record Guarantee, and by local information governance processes, such as the Caldicott guardian and Trust Data Protection Policies. Healthcare professionals must be aware of all these, particularly when keeping information for their own use (e.g. logbooks).
引用
收藏
页码:509 / 512
页数:4
相关论文
共 50 条
[41]   Balancing data protection and privacy - The case of information security sensor systems [J].
Naarttijarvi, Markus .
COMPUTER LAW & SECURITY REVIEW, 2018, 34 (05) :1019-1038
[42]   CYBER SECURITY FOUNDATIONS FOR COMPLIANCE WITHIN GDPR FOR BUSINESS INFORMATION SYSTEMS [J].
Boban, Marija .
ECONOMIC AND SOCIAL DEVELOPMENT (ESD 2018): 35TH INTERNATIONAL SCIENTIFIC CONFERENCE, 2018, :541-553
[43]   Network Information Security Data Protection Based on Data Encryption Technology [J].
Han Ping .
Wireless Personal Communications, 2022, 126 :2719-2729
[44]   Confidentiality, anonimity?: the other promises of research [J].
Anguita M, Veronica ;
Angelica Sotomayor, M. .
ACTA BIOETHICA, 2011, 17 (02) :199-204
[45]   Non-Fungible Tokens (NFT) as a Means and Object of Ensuring Information Security [J].
Astakhova, L. V. ;
Kalyazin, N. V. .
AUTOMATIC DOCUMENTATION AND MATHEMATICAL LINGUISTICS, 2022, 56 (03) :116-121
[46]   Social conceptions versus legal protections of privacy and information security in the context of encryption [J].
Dizon, Michael Anthony C. .
INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2022, 31 (03) :287-300
[47]   Can an Adapted Clinical Governance Model be used to Improve Medical Information Security? [J].
Williams, Patricia .
PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, :219-227
[48]   Framework to implement information security management systems: An asset to project management processes [J].
Mena, Alvaro .
2018 37TH INTERNATIONAL CONFERENCE OF THE CHILEAN COMPUTER SCIENCE SOCIETY (SCCC), 2018,
[49]   Towards a Data-Driven Enterprise: Effects on Information, Governance, Infrastructures and Security [J].
Polzonetti, A. ;
Sagratella, M. .
2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2017, :1480-1484
[50]   EXAMINING THE INFORMATION SECURITY ATTITUDES AMONG PRIMARY SCHOOL-AGED CHILDREN [J].
Zahonyi, Lajos ;
Szucs, Endre .
INTERDISCIPLINARY DESCRIPTION OF COMPLEX SYSTEMS, 2025, 23 (03) :309-315