Forensic Science, Medicine, and Pathology

, Volume 10, Issue 2, pp 284–285

Ensuring integrity of forensic data in a shared practice environment

Letter to the Editor
  • 75 Downloads

References

  1. 1.
    Taitsman JK, Grimm CM, Agrawal S. Protecting patient privacy and data security. New Eng J Med. 2013;368(11):977–9.PubMedCrossRefGoogle Scholar
  2. 2.
    Kailar R, Muralidhar V. A security architecture for health information networks. AMIA Annu Symp Proc. 2007;11:379–83.Google Scholar
  3. 3.
    NAME Inspection and Accreditation Checklist 2009–2014. In: Public I & A documents. National Association of Medical Examiner. 2013. https://netforum.avectra.com/temp/ClientImages/NAME/069196e4-6f95-437c-a2be-47649a70685e.pdf Accessed 21 Aug 2013.
  4. 4.
    Cucoranu IC, Parwani AV, West AJ, Romero-Lauro G, Nauman K, Carter AB, Balis UJ, Tuthill MJ, Pantanowitz L. Privacy and security of patient data in the pathology laboratory. J Pathol Inform. 2013;4:4.PubMedCentralPubMedCrossRefGoogle Scholar
  5. 5.
    Liu CH, Chung YF, Chen TS, Wang SD. The enhancement of security in healthcare information systems. J Med Syst. 2012;36(3):1673–88.PubMedCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Department of Laboratory MedicineSaint John Regional HospitalSaint JohnCanada

Personalised recommendations