skip to main content
article
Free Access

Privacy, information technology, and health care

Published:01 August 1997Publication History
First page image

References

  1. 1 Garfinkel, S. and Spafford, E. Practical UNIX & Internet Security. O'Reilly, Sebastopol, Calif., 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 General Accounting Office/Defense Information Systems Agency. Information Security: Computer Attacks at Department of Defense Pose Increasing Risks. GAO/AIMD-96-84, May 1996.Google ScholarGoogle Scholar
  3. 3 Geller, L.N., Alper, J.S., Billings, P.R., Barash, C.I., Beckwith, J., and Natowicz, M. Individual, Family, and Societal Dimensions of Genetic Discrimination: A Case Study Analysis. Sci. and Eng. Ethics 2, 1 (1996).Google ScholarGoogle ScholarCross RefCross Ref
  4. 4 Gembicki, M. Information Systems Security Survey. WarRoom Research. LLC, http://www.infowar.com/sample/survey.html-ssi Nov. 23, 1996.Google ScholarGoogle Scholar
  5. 5 Institute of Medicine. The computer-based patient record: An essential technology for health care. National Academy Press, Washington, DC, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 Institute of Medicine. Health Data in the Information Age: Use, Disclosure, and Privacy. National Academy Press, Washington, DC, 1994.Google ScholarGoogle Scholar
  7. 7 Khanna, R. Distributed Computing--Implementation and Management Strategies. Prentice-Hall, Englewood Cliffs, N.J.,1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 National Research Council. Computers at Risk: Safe Computing in the Information Age. National Academy Press, Washington, DC, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 National Research Council. For the Record: Protecting Electronic Health Information. National Academy Press, Washington, DC, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 Office of Technology Assessment. Protecting Privacy in Computerized Medical Information. OTA-TCT-576, US Government Printing Office, Washington, DC, 1993.Google ScholarGoogle Scholar
  11. 11 Rothfeder, J. Privacy for Sale. Simon and Schuster, New York, NY, 1992.Google ScholarGoogle Scholar
  12. 12 Westin, A.F. Computers, Health Records, and Citizen Rights. National Bureau of Standards, Monograph 157, US Government Printing Office, Washington, DC, 1976.Google ScholarGoogle Scholar

Index Terms

  1. Privacy, information technology, and health care

                  Recommendations

                  Reviews

                  Marlene L. Campbell

                  The author presents a clear discussion of the advantages, disadvantages, and hazards of a move to electronic patient records (EPRs). He takes a systems view of privacy and information security in health care, putting “the most urgent threats to patient information privacy” in perspective. He cites a study by Deloitte and Touche as indicating that 24 percent of US hospitals belong to integrated delivery s ystems, with 56 percent of hospitals pursuing EPRs, and he speculates that although “these developments bode well for improved health care they could produce consequences in lost or reduced medical privacy.” A diagram showing the “Flow of Healthcare Information in the U.S. System” clearly illustrates the risk of disclosure of health care information. The author claims that “the great majority of people (patients and physicians alike) have only a vague understanding of where health care data flows, often with little control of its use.” Since threats to the confidentiality of patient information can occur both inside and outside the patient care institution, he includes two precise tables: “Summary of Technologies Applicable to Information Systems Security Management” and “Relation of Disclosure Threats to Security Technologies.” The paper is well written, informative, and provocative. It contains good information and food for thought. It cites the need to address substantial US public policy and legislative issues and concludes with the statement that “For wide deployment of EPR usage, we will need a uniformly interoperable, vendor-supplied set of system components that incorporate highest performance security features.” Twelve references are provided.

                  Access critical reviews of Computing literature here

                  Become a reviewer for Computing Reviews.

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in

                  Full Access

                  • Published in

                    cover image Communications of the ACM
                    Communications of the ACM  Volume 40, Issue 8
                    Aug. 1997
                    103 pages
                    ISSN:0001-0782
                    EISSN:1557-7317
                    DOI:10.1145/257874
                    Issue’s Table of Contents

                    Copyright © 1997 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 1 August 1997

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • article

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader