Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Data Privacy and Patient Consent

  • David Hansen
  • Christine M. O’Keefe
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_106

Synonyms

Data protection

Definition

Data privacy refers to the interest individuals and organisations have in the collection, sharing, use and disclosure of information about those individuals or organizations. Common information types raising data privacy issues include health (especially genetic), criminal justice, financial, and location. The recent rapid growth of electronic data archives and associated data technologies has increased the importance of data privacy issues, and has led to a growing body of legislation and codes of practice.

Patient consent, in relation to data, refers to a patient’s act of approving the collection, sharing, use or disclosure of information about them. It is important because data with appropriate patient consent often falls into exception clauses in privacy legislation.

The challenge in data privacy is to balance the need to share and use data with the need to protect personally identifiable information and respect patient consent. For example, a...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Agrawal R, Evfimievski A, Srikant R. Information sharing across private databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2003. p. 86–97.Google Scholar
  2. 2.
    Churches T, Christen P. Some methods for blindfolded record linkage. BMC Med Inform Decis Mak. 2004;4(1):9.CrossRefGoogle Scholar
  3. 3.
    Domingo-Ferrer J, Torra V, editors. Privacy in statistical databases, Lectures notes in computer science, vol. 3050. Berlin/Heidelberg: Springer; 2004.Google Scholar
  4. 4.
    OKeefe CM, Yung M, Baxter R. Privacy-preserving linkage and data extraction protocols. In: Workshop on Privacy in the Electronic Society in conjunction with the 11th ACM CCS Conference; 2004.Google Scholar
  5. 5.
    Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-based access control models. IEEE Comput. 1996;29(2):38–47.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.The Australian e-Health Research CentreBrisbaneAustralia
  2. 2.CSIRO Preventative Health National Research FlagshipActonAustralia

Section editors and affiliations

  • Vipul Kashyap
    • 1
  1. 1.Director, Clinical ProgramsCIGNA HealthcareBloomfieldUSA