Confidentiality of Electronic Health Data: Methods for Protecting Personally Identifiable Information. Health

07/03/1996

Bakker AR. Security in medical information systems. In: van Bemmel JH, McCray AT, editors. Yearbook of medical informatics: Stuttgart: Schattauer; 1993. p. 52-60.

Barber B, Bakker A, Bengtsson S. Conclusions and recommendations. Int J Biomed Comput 1994;35 Suppl:221-9.

Barber B, O'Moore R. The six safety first principles of health information systems - Progress Report. In: Commission of the European Communities DG XIII/F AIM. Data protection and confidentiality in health informatics: handling health data in Europe in the future. Washington: IOS Press; 1991. p. 308-14. (Studies in health technology and informatics; vol. 1).

Barrows RC Jr, Clayton PD. Privacy, confidentiality, and electronic medical records. J Am Med Inform Assoc 1996 Mar-Apr;3(2):139-48.

Benson T, Neame R. Healthcare computing: a guide to health information management and systems. Harlow (Essex, UK): Longman Group Ltd.; 1994. Chapter 11, Security and privacy; p. 143-63.

Biskup J, Bleumer G. Reflections on security of database and data transfer systems in health care. In: Information processing '94. Applications and impacts. Proceedings of the 13th IFIP World Computer Congress; 1994 Aug 28- Sep 2; Hamburg, Germany. Amsterdam: Elsevier Science Pub.; 1994. p. 549-56. (IFIP transactions A (computer science and technology); vol.A-52).

Blum BI. Computer security in a clinical environment. In: Jajodia S, Landwehr CE, editors. Database Security, 4: Status and Prospects. Results of the IFIP WG 11.3 workshop; 1990 Sep 18-21;

Halifax, UK. Amsterdam: North-Holland; 1991. p. 1-12.

Bruce JAC. Privacy and confidentiality of health care information. 3rd ed. Chicago: American Hospital Pub.; Forthcoming 1996.

Bunz H, Bertsch A, Jurecic M, Baum-Waidner B. Secure multimedia applications and teleservices: security requirements and prototype for health care. In: Steinmetz R, editor. Multimedia: advanced teleservices and high- speed communication architectures. Proceedings of the 2nd International Workshop, IWACA '94; 1994 Sep 26-28; Heidelberg, Germany. Berlin: Springer-Verlag; 1994. p. 224-36.

Caring for Health Information - Safety, Security and Secrecy. Results of a working conference of the International Medical Informatics Association. Heemskerk, The Netherlands, 1993 Nov 13-16. Int J Biomed Comput 1994 Feb;35 Suppl:1-235.

Commission of the European Communities DG XIII/F AIM. Data protection and confidentiality in health informatics: handling health data in Europe in the future. Washington: IOS Press; 1991. Executive summary; p. 1- 61. (Studies in health technology and informatics; vol. 1).

Confidentiality and security measures for health care. Toward Electron Patient Rec 1994 Jun-Jul;3(1):1-13.

de Roulet D, Scherrer JR, editors. Data protection within a hospital information system. In: SECURICOM 90. 8th Worldwide Congress on Computer and Communications Security and Protection; 1990 Mar 14-16; Paris, France. Paris: SEDEP; 1990. p. 27-45.

Dolezol W. System protection techniques within the hospital information system at the hospitals of the University of Wurzburg. MUG Q 1991 Sep;21(4):27-32.

Furnell SM, Gaunt PN, Pangalos G, Sanders PW, Warren MJ. A generic methodology for health care data security. Med Inf (Lond) 1994 Jul-Sep;19(3):229-45.

Gabrieli ER. Guidelines for minimal data security measures for the protection of computer-based patient records. J Clin Comput 1993;22(1):1-48.

Hamilton DL. Identification and evaluation of the security requirements in medical applications. Bristol (UK): Hewlett-Packard Laboratory; 1992 Jun. Report No.: HPL-92-75. 11 p.

Health Records: Social Needs and Personal Privacy. Conference Proceedings; 1993 Feb 11-12; Washington, DC. Washington: U.S. Government Printing Office; 1993 Feb. Also available from: NTIS, Springfield, VA; PB94168192.

Hoffman LJ. Data security and privacy in health information systems. Top Emerg Med 1995 Dec;17(4):24-6.

Iversen KR. Security requirements for electronic patients records: the Norwegian view. Int J Biomed Comput 1994 Feb;35 Suppl:51-6.

Jurecic M, Bunz H. Exchange of patient records-prototype implementation of a Security Attributes Service in X.500. In: Proceedings of 2nd ACM Conference on Computer and Communications Security; 1994 Nov 2-4; Fairfax, VA. New York: ACM; 1994. p. 30-8.

Kaplan JG. Protecting sensitive medical information. In: Database Security, 6: Status and Prospects. IFIP WG 11.3 workshop; 1992 Aug 19-21; Vancouver, BC, Canada. [Amsterdam?: North Holland?]; 1993. p. 1-14. (IFIP transactions A (computer science and technology); vol. A-21).

Lincoln TL, Essin D. The computer-based patient record: issues of organization, security and confidentiality. In: Database Security, 5: Status and Prospects. Results of the IFIP WG 11.3 workshop; 1991 Nov 4-7; Shepherdstown, WV. [Amsterdam?: North Holland?]; 1992. p. 1-19. (IFIP transactions A (computer science and technology); vol.A- 6).

Louis Harris and Associates. Equifax-Harris consumer privacy survey 1994. New York: The Associates; 1994. Available from: Equifax, Inc., Atlanta, GA.

Louis Harris and Associates. Equifax-Harris mid-decade consumer privacy survey 1995. New York: The Associates; 1995. Available from: Equifax, Inc., Atlanta, GA.

Louis Harris and Associates. Health care information privacy: a survey of the public and leaders. New York: The Associates; 1993. Available from: Equifax, Inc., Atlanta, GA.

Louwerse CP. The organisation and management of information security issues in health care. Int J Biomed Comput 1994 Feb;35 Suppl:195-200.

Meranda D. Administrative and security challenges with electronic patient record systems. J AHIMA 1995 Mar;66(3):58-60.

Moehr JR. Privacy and security requirements of distributed computer based patient records. Int J Biomed Comput 1994 Feb;35 Suppl:57-64.

O'Connor K. Confidentiality, privacy and security concerns in the modern healthcare environment. Aust Comput J 1994 Aug;26(3):70-7.

Pfitzmann A, Pfitzmann B. Technical aspects of data protection in health care informatics. In: Noothoven van Goor J, Christensen JP, editors. Advances in medical informatics: results of the AIM Exploratory Action. Washington: IOS Press; 1992. p. 368-86. (Studies in health technology and informatics; vol. 2).

Schmaus D. Computer security and data confidentiality. AORN J 1991 Oct;54(4):885-90.

Shea S, Sengupta S, Crosswell A, Clayton PD. Network information security in a phase III Integrated Academic Information Management System (IAIMS). Proc Annu Symp Comput Appl Med Care 1992;16:283-6.

Task Force on the Privacy of Private-Sector Health Records. Final report. Rockville (MD): Kunitz and Associates, Inc.; 1995 Sep. Contract No.: HHS-100-91-0036. 128 p. plus appendices. Sponsored by the U.S. Department of Health and Human Services.

United States, Congress, Office of Technology Assessment. Bringing health care online: the role of information technologies. Washington: U.S. Government Printing Office; 1995 Sep. Report No: OTA-ITC-624. Chapter 3, Networks for health information; p. 79-122.

United States, Congress, Office of Technology Assessment. Protecting privacy in computerized medical information. Washington: U.S. Government Printing Office; 1993 Sep. Report No.: OTA-TCT-576. 157 p.

Woodward B. The computer-based patient record and confidentiality. N Engl J Med 1995 Nov 23;333(21):1419- 22.

Wright B. Security concerns of computer-based health care information. Comput Secur J 1994 Spring;10(1):83-9.