Data Protection

  • Kathryn J. Hannah
  • Marion J. Ball
  • Margaret J. A. Edwards
Part of the Health Informatics book series (HI)


The issue of privacy is difficult. The individual has the inherent right to control personal information. However, to provide the best possible care and service to the individual, public and private organizations must know some of that information. The issue is further complicated because “privacy” has not been defined in a way that is widely and generally accepted. Actions such as collecting and storing unnecessary personal data, disclosing data to individuals or organizations that do not have a genuine need for it, or using private information for something other than the original purpose could be considered intrusive.


Personal Data Data Protection Usage Integrity Security Breach Infrastructure Element 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Barber, B. Security and confidentiality issues from a national perspective. In: Patient Privacy, Confidentiality and Data Security: Papers from the British Computer Society Nursing Specialist Group Annual Conference. Lincolnshire, UK: The British Computer Society, 1997: 61–72.Google Scholar
  2. Bowen, J.W., Klimczak, C., Ruiz, M., and Barnes, M. Design of access control methods for protecting the confidentiality of patient information systems in networked systems. Journal of the American Medical Informatics Association: Symposium Supplement. Nashville: Hanley & Belfus, 1997: 46–50.Google Scholar
  3. Canadian Institute for Health Information (CIHI). Working Group 3: Privacy, Confidentiality, Data Integrity, and Security, Background Document. Ottawa, Canada: CIHI, 1997.Google Scholar
  4. Canadian Organization for the Advancement of Computers in Health (COACH). Guidelines to Promote the Confidentiality and Security of Automated Health Records. Edmonton, Canada: COACH, 1979.Google Scholar
  5. Hoy, D. Protecting the individual: Confidentiality, security and the growth of information systems. Sharing Information: Key Issues for the Nursing Profession. Lincolnshire, UK: The British Computer Society, 1997: 78–87.Google Scholar
  6. McKenzie, D.J.P. Healthcare trend improves security practices. In Confidence. 1996, May—June. 3 pg. Online. Available: May-June.inconf.html
  7. Miller, D.W. Internet security: What health information managers should know. Journal of AHIMA. 1996, September, 4 pg. Online. Available:
  8. Organization for Economic Cooperation and Development (OECD). Draft Recommendations of the Council concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data. Paris: OECD, 1979.Google Scholar

Additional Resources

  1. Dalander, G., Willner, S., and Brasch, S. Turning a dream into a reality: The evolution of the electronic health record. Journal of AHIMA. 1997, October. 6 pg. Online. Available:
  2. Dennis, J.C. Asking tough questions: Assessing top management support for confidentiality. In Confidence. 1997, Jan/Feb, 2 pg. Online. Available:
  3. Miller, D.W. Current technology: Confidentiality risks and controls. In Confidence. 1997, July/Aug, 6 pg. Online. Available:
  4. Mills, M.E. Data privacy and confidentiality in the public arena. Journal of the American Medical Informatics Association: Symposium Supplement. Nashville, USA: Hanley & Belfus, 1997: 42–45.Google Scholar
  5. Murray, P.J. “It’ll never happen to me.” Revisiting some computer security issues. Computers in Nursing 1997;15(2):65–66, 70.Google Scholar
  6. Nelson, D. Information security: A holistic approach to network system security. Journal of AHIMA. 1997, May, 6 pg. Online. Available:
  7. Sanchez-Swatman, L. Nurses, computers and confidentiality. Canadian Nurse 1997; August:47–48.Google Scholar
  8. Vincze, L.S. Confidentiality and compliance: Political and public interests. In Confidence. 1997, Nov/Dec, 3 pg. Online. Available:
  9. Zakoworotny, C., Rutz, C., and Zwingman-Babley, C. Information security: A team approach to managing an information security program. Journal of AHIMA. 1997, May, 7 pg. Online. Available:
  10. American National Standards Institute Home Page
  11. Canadian Institute for Health Information
  12. Canadian Information Highway Advisory Council
  13. Links to selected security standards
  14. List of selected security websites and bulletin boards
  15. Text of new European Data Protection Directive
  16. United States Privacy Laws by State

Copyright information

© Springer Science+Business Media New York 1999

Authors and Affiliations

  • Kathryn J. Hannah
    • 1
    • 2
  • Marion J. Ball
    • 3
    • 4
  • Margaret J. A. Edwards
    • 5
  1. 1.Health InformaticsSierra Systems Consultants, Inc.CalgaryCanada
  2. 2.Department of Community Health Science, Faculty of MedicineUniversity of CalgaryCalgaryCanada
  3. 3.Department of EpidemiologyUniversity of Maryland School of MedicineUSA
  4. 4.First Consulting GroupBaltimoreUSA
  5. 5.Margaret J.A. Edwards and Associates, Inc.CalgaryCanada

Personalised recommendations