Skip to main content

Part of the book series: Health Informatics ((HI))

  • 163 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. The Computer-based Patient Record: An Essential Technology for Health Care. R.S. Dick & E.B. Steen (eds), National Academy Press, Washington, D.C., 1991.

    Google Scholar 

  2. Computer-based Patient Record Description of Content. Work Group on CPR Description, Computer-based Patient Record Institute, Schaumburg, IL, May 1996.

    Google Scholar 

  3. Computers at Risk: Safe Computing in the Information Age. System Security Study Committee, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council. National Academy Press, Washington, DC, 1991.

    Google Scholar 

  4. Glossary of Terms Related to Information Security for Computer-based Patient Record Systems. Work Group on Confidentiality, Privacy and Security, Computer-based Patient Record Institute, Schaumburg, IL, July 1996.

    Google Scholar 

  5. ASTM E1762. Guide for Electronic Authentication of Health Care Information. Committee E-31 on Computerized Systems, Subcommittee E31.20 on Authentication. ASTM, West Conshohocken, PA, October 10, 1995.

    Google Scholar 

  6. Guidelines for Establishing Information Security Policies at Organizations Using Computer-based Patient Records. Work Group on Confidentiality, Privacy and Security, Computer-based Patient Record Institute, Schaumburg, IL, February 1995.

    Google Scholar 

  7. R.E. Marotta (ed.), The Digital Dictionary. Digital Equipment Corporation, Bedford, MA, 1986.

    Google Scholar 

  8. ISO 7498-2. Information Processing Systems—Open Systems Interconnection—Basic Reference Model—Part 2: Security Architecture. International Standards Organization, Geneva, Switzerland 1989.

    Google Scholar 

  9. D.B. Baker & T. Cooper, Information System Security Issues for Health Care. Draft. Science Applications International Corporation and Kaiser Permanente, Oakland, California 1995.

    Google Scholar 

  10. T. Cooper, Information System Security Issues for Health Care. Draft. Science Applications International Corporation and Kaiser Permanente, Oakland, California 1995 Baker & Cooper.

    Google Scholar 

  11. Computers at Risk⋯

    Google Scholar 

  12. E.B. Steen (eds), National Academy Press, Washington, D.C., 1991 The Computer-based Patient Record⋯

    Google Scholar 

  13. Computers at Risk⋯

    Google Scholar 

  14. Glossary of Terms Related to Information Security for Computer-based Patient Record Systems. Work Group on Confidentiality, Privacy and Security, Computer-based Patient Record Institute, Schaumburg, IL, July 1996.

    Google Scholar 

  15. Computer-based Patient Record System Description of Functionality. Work Group on CPR Description, Computer-based Patient Record Institute, Schaumburg, IL, September 1996.

    Google Scholar 

  16. Computer-based Patient Record System Description of Functionality.

    Google Scholar 

  17. D. Longley, Data and Computer Security: Dictionary of Standards, Concepts, and Terms. MacMillan, UK, 1987.

    Google Scholar 

  18. “Legal aspects of computer-based patient records and record Systems,” Appendix B, The Computer-based Patient Record: An Essential Technology for Health Care.

    Google Scholar 

Download references

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag New York, Inc.

About this chapter

Cite this chapter

Frawley, K., Miller, D.W. (2001). Establishing Information Security Policies. In: Information Technology for the Practicing Physician. Health Informatics. Springer, New York, NY. https://doi.org/10.1007/0-387-21857-2_30

Download citation

  • DOI: https://doi.org/10.1007/0-387-21857-2_30

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-98984-6

  • Online ISBN: 978-0-387-21857-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics