Abstract
The enhanced availability of health information in an electronic format is strategic for industry-wide efforts to improve the quality and reduce the cost of health care, yet it brings a concomitant concern of greater risk for loss of privacy among health care participants. The authors review the conflicting goals of accessibility and security for electronic medical records and discuss nontechnical and technical aspects that constitute a reasonable security solution. It is argued that with guiding policy and current technology, an electronic medical record may offer better security than a traditional paper record.
Full Text
The Full Text of this article is available as a PDF (1.2 MB).
Selected References
These references are in PubMed. This may not be the complete list of references from this article.
- Bengtsson S. Clinical requirements for the security of the electronic patient record. Int J Biomed Comput. 1994 Feb;35 (Suppl):29–31. [PubMed] [Google Scholar]
- Brannigan V. M. A framework for "Need to Know" authorizations in medical computer systems: responding to the constitutional requirements. Proc Annu Symp Comput Appl Med Care. 1994:392–396. [PMC free article] [PubMed] [Google Scholar]
- Clayton P. D., Sideli R. V., Sengupta S. Open architecture and integrated information at Columbia-Presbyterian Medical Center. MD Comput. 1992 Sep-Oct;9(5):297–303. [PubMed] [Google Scholar]
- Curran W. J., Stearns B., Kaplan H. Privacy, confidentiality and other legal considerations in the establishment of a centralized health-data system. N Engl J Med. 1969 Jul 31;281(5):241–248. doi: 10.1056/NEJM196907312810505. [DOI] [PubMed] [Google Scholar]
- Dargahi R., Classen D. W., Bobroff R. B., Petermann C. A., Moreau D. R., Beck J. R., Buffone G. J. The development of a data security model for the Collaborative Social and Medical Services System. Proc Annu Symp Comput Appl Med Care. 1994:349–353. [PMC free article] [PubMed] [Google Scholar]
- France F. H., Gaunt P. N. The need for security--a clinical view. Int J Biomed Comput. 1994 Feb;35 (Suppl):189–194. [PubMed] [Google Scholar]
- Gostin L. O., Turek-Brezina J., Powers M., Kozloff R., Faden R., Steinauer D. D. Privacy and security of personal information in a new health care system. JAMA. 1993 Nov 24;270(20):2487–2493. [PubMed] [Google Scholar]
- Lawrence L. M. Safeguarding the confidentiality of automated medical information. Jt Comm J Qual Improv. 1994 Nov;20(11):639–646. doi: 10.1016/s1070-3241(16)30112-2. [DOI] [PubMed] [Google Scholar]
- Lincoln T. L. Privacy: a real-world problem with fuzzy boundaries. Methods Inf Med. 1993 Apr;32(2):104–107. [PubMed] [Google Scholar]
- Robinson D. M. Health information privacy: without confidentiality. Int J Biomed Comput. 1994 Feb;35 (Suppl):97–104. [PubMed] [Google Scholar]
- Safran C., Rind D., Citroen M., Bakker A. R., Slack W. V., Bleich H. L. Protection of confidentiality in the computer-based patient record. MD Comput. 1995 May-Jun;12(3):187–192. [PubMed] [Google Scholar]
- Shea S. Security versus access: trade-offs are only part of the story. J Am Med Inform Assoc. 1994 Jul-Aug;1(4):314–315. doi: 10.1136/jamia.1994.95236163. [DOI] [PMC free article] [PubMed] [Google Scholar]
- Szolovits P., Kohane I. Against simple universal health-care identifiers. J Am Med Inform Assoc. 1994 Jul-Aug;1(4):316–319. doi: 10.1136/jamia.1994.95236164. [DOI] [PMC free article] [PubMed] [Google Scholar]