Abstract
Many challenges are associated with transforming manual data collection systems into integrated healthcare delivery systems, including those related to the ability to process data securely and protect the privacy of each individual’s record in a distributed healthcare database. Federal laws and regulations mandating security and privacy protections continue to evolve, although at a much slower pace than the technology deployed to collect, process, integrate, and electronically store data Mainframes, personal computers, networks, and telecommunication links are widely used to facilitate the delivery of health care.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Baker RH. 1991. Computer security handbook, 2nd ed. Pennsylvania: TAB Professional and Reference Books.
Bernstein DS. 1995 (May/June). Recovery planning a to z. InfoSecurity News, 6(3), 27.
Cohen FB. 1995. Protection and security on the information superhighway. New York: John Wiley & Sons, Inc.
Crane E. 1996 (January/February). Tomorrow’s technology: Promising a safe new world. InfoSecurity News, 7(1), 24.
Department of Veterans Affairs. 1996 (February 21). Veterans Benefits Administration Automated Information Systems (AIS) security program. Washington, DC: Author.
Department of Veterans Affairs. 1991 (July 17). DHCP [Decentralized Hospital Computer Program] electronic signatures on medical record documents. Directive 10-91-074. Washington, DC: Author.
Department of Veterans Affairs. 1995 (July). Kernel security tools manual, version 8.0. Washington, DC: Author.
General Services Administration. 1992 (September). Security and privacy protection of Federal Information Processing (FIP) resources. Federal Information Resources Management Regulation (FIRMR) Bulletin C-22. Washington, DC: Author.
Guttman B, & Roback E. 1995. An introduction to computer security: NIST [National Institute of Standards and Technology] handbook, Special publication 80012. Washington, DC: US Government Printing Office.
Joint Commission on Accreditation of Healthcare Organizations (JCAHO). 1995. Automated CAMH (Comprehensive accreditation manual for hospitals), release 1.0. Oakbrook, IL: Author.
Madron TW. 1992. Network security in the ‘80s: issues and solutions for managers. New York: John Wiley & Sons, Inc, p. 10.
Miller DW. 1996 (January/February). Using system logs to protect confidentiality. IN Confidence, 4(1), 1–3.
National Bureau of Standards. 1981. Guidelines for ADP contingency planning. Federal Information Processing Standards (FIPS) Publication 87. Washington, DC: Author.
National Bureau of Standards. 1983 (September). Guideline for computer security certification and accreditation. Federal Information Processing Standards (FIPS) Publication 102. Washington, DC: Author.
Guttman B. 1992 (March). Computer security considerations in federal procurements: A guide for procurement initiators, contracting officers, and computer security officials. National Institute of Standards and Technology (NIST) Special Publication 800–4. Washington, DC: US Government Printing Office.
National Institute of Standards and Technology. 1994. Guideline for the analysis of local area network security. Federal Information Processing Standards (FIPS) Publication 191. Washington, DC: Author.
Office of Management and Budget (OMB). 1993 (June 25). Management of federal information resources. Circular A-130, revised. Washington, DC: Author.
Panettieri JC. 1995 (November 27). Security. Information Week, 32–40.
US Senate. 1995 (October 24). Medical Records Confidentiality Act of 1995, S.1360. Introduced by Senators Bennett, Dole, Kassebaum, Kennedy & Leahy.
Wack J. 1991 (September 24). Establishing a Computer Security Incident Response Capability (CSIRC). Washington DC: US Department of Commerce.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer Science+Business Media New York
About this chapter
Cite this chapter
Belles, G. (1997). Privacy and Security Protections for Healthcare Information. In: Kolodner, R.M. (eds) Computerizing Large Integrated Health Networks. Computers in Health Care. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-0655-2_9
Download citation
DOI: https://doi.org/10.1007/978-1-4612-0655-2_9
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4612-6858-1
Online ISBN: 978-1-4612-0655-2
eBook Packages: Springer Book Archive