Skip to main content

Privacy and Security Protections for Healthcare Information

  • Chapter
Computerizing Large Integrated Health Networks

Part of the book series: Computers in Health Care ((HI))

  • 120 Accesses

Abstract

Many challenges are associated with transforming manual data collection systems into integrated healthcare delivery systems, including those related to the ability to process data securely and protect the privacy of each individual’s record in a distributed healthcare database. Federal laws and regulations mandating security and privacy protections continue to evolve, although at a much slower pace than the technology deployed to collect, process, integrate, and electronically store data Mainframes, personal computers, networks, and telecommunication links are widely used to facilitate the delivery of health care.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Baker RH. 1991. Computer security handbook, 2nd ed. Pennsylvania: TAB Professional and Reference Books.

    Google Scholar 

  • Bernstein DS. 1995 (May/June). Recovery planning a to z. InfoSecurity News, 6(3), 27.

    Google Scholar 

  • Cohen FB. 1995. Protection and security on the information superhighway. New York: John Wiley & Sons, Inc.

    Google Scholar 

  • Crane E. 1996 (January/February). Tomorrow’s technology: Promising a safe new world. InfoSecurity News, 7(1), 24.

    Google Scholar 

  • Department of Veterans Affairs. 1996 (February 21). Veterans Benefits Administration Automated Information Systems (AIS) security program. Washington, DC: Author.

    Google Scholar 

  • Department of Veterans Affairs. 1991 (July 17). DHCP [Decentralized Hospital Computer Program] electronic signatures on medical record documents. Directive 10-91-074. Washington, DC: Author.

    Google Scholar 

  • Department of Veterans Affairs. 1995 (July). Kernel security tools manual, version 8.0. Washington, DC: Author.

    Google Scholar 

  • General Services Administration. 1992 (September). Security and privacy protection of Federal Information Processing (FIP) resources. Federal Information Resources Management Regulation (FIRMR) Bulletin C-22. Washington, DC: Author.

    Google Scholar 

  • Guttman B, & Roback E. 1995. An introduction to computer security: NIST [National Institute of Standards and Technology] handbook, Special publication 80012. Washington, DC: US Government Printing Office.

    Google Scholar 

  • Joint Commission on Accreditation of Healthcare Organizations (JCAHO). 1995. Automated CAMH (Comprehensive accreditation manual for hospitals), release 1.0. Oakbrook, IL: Author.

    Google Scholar 

  • Madron TW. 1992. Network security in the ‘80s: issues and solutions for managers. New York: John Wiley & Sons, Inc, p. 10.

    Google Scholar 

  • Miller DW. 1996 (January/February). Using system logs to protect confidentiality. IN Confidence, 4(1), 1–3.

    Google Scholar 

  • National Bureau of Standards. 1981. Guidelines for ADP contingency planning. Federal Information Processing Standards (FIPS) Publication 87. Washington, DC: Author.

    Google Scholar 

  • National Bureau of Standards. 1983 (September). Guideline for computer security certification and accreditation. Federal Information Processing Standards (FIPS) Publication 102. Washington, DC: Author.

    Google Scholar 

  • Guttman B. 1992 (March). Computer security considerations in federal procurements: A guide for procurement initiators, contracting officers, and computer security officials. National Institute of Standards and Technology (NIST) Special Publication 800–4. Washington, DC: US Government Printing Office.

    Google Scholar 

  • National Institute of Standards and Technology. 1994. Guideline for the analysis of local area network security. Federal Information Processing Standards (FIPS) Publication 191. Washington, DC: Author.

    Google Scholar 

  • Office of Management and Budget (OMB). 1993 (June 25). Management of federal information resources. Circular A-130, revised. Washington, DC: Author.

    Google Scholar 

  • Panettieri JC. 1995 (November 27). Security. Information Week, 32–40.

    Google Scholar 

  • US Senate. 1995 (October 24). Medical Records Confidentiality Act of 1995, S.1360. Introduced by Senators Bennett, Dole, Kassebaum, Kennedy & Leahy.

    Google Scholar 

  • Wack J. 1991 (September 24). Establishing a Computer Security Incident Response Capability (CSIRC). Washington DC: US Department of Commerce.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer Science+Business Media New York

About this chapter

Cite this chapter

Belles, G. (1997). Privacy and Security Protections for Healthcare Information. In: Kolodner, R.M. (eds) Computerizing Large Integrated Health Networks. Computers in Health Care. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-0655-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4612-0655-2_9

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4612-6858-1

  • Online ISBN: 978-1-4612-0655-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics