Confidentiality of Electronic Health Data: Methods for Protecting Personally Identifiable Information. Audit Trails


Bakker AR. Special care needed for the heart of medical information systems. In: Biskup J, Morgenstern M, Landwehr CE, editors. Database Security, 8: Status and Prospects. Proceedings of the IFIP WG11.3 Working Conference on Database Security; 1994 Aug 23-26; Bad Salzdetfurth, Germany. London: Chapman & Hall Ltd.; 1994. p. 3-10. (IFIP transactions A (computer science and technology); vol. A-60).

Borten K. Using an audit facility to protect patient data at the Massachusetts General Hospital. In: Toward an electronic patient record '95. 11th International Symposium on the Creation of Electronic Health Record Systems. Proceedings; 1995 Mar 14-19; Orlando, FL. Newton (MA): Medical Records Institute; 1995. p.115-20.

Hammond JE, Berger RG, Carey TS, Fakhry SM, Rutledge R, Kichak JP, Cleveland TJ, Dempsey MJ, Tsongalis NM, Ayscue CF. Report on the clinical workstation and clinical data repository utilization at UNC Hospitals. Proc Annu Symp Comput Appl Med Care 1994;18:276-80.

Hayam A. Security Audit Center--a suggested model for effective audit strategies in health care informatics. Int J Biomed Comput 1994 Feb;35 Suppl:115-27.

Kowalski S. An accountability server for health care information systems. Int J Biomed Comput 1994 Feb;35 Suppl:129-38.

Muhlenberg provides secure access to patient files. Commun News 1995 May;32(5):16.

Schwartz M. Protecting patient data confidentiality in the healthcare environment. EDPACS 1993 Sep;21(3):12-8.

Walker NS. An integrated clinical computer system: implications for a medical information services department. J AHIMA 1994 Dec;65(12):41-3.