SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID - IJTSRD23780 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 373
Security, Confidentiality and Privacy
in Health of Healthcare Data
Jomin George1, Takura Bhila2
1Department of Health Information Systems Management,
1Namibia University of Science and Technology, Windhoek, Namibia
2Department of Information and Communication Technology,
2Limkokwing University of Creative Technology, Maseru, Lesotho
How to cite this paper: Jomin George |
Takura Bhila "Security, Confidentiality
and Privacy in Health of Healthcare
Data" Published in InternationalJournal
of Trend in Scientific Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-4, June 2019,
pp.373-377, URL:
https://www.ijtsrd.c
om/papers/ijtsrd23
780.pdf
Copyright © 2019 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an Open Access article
distributed under
the terms of the
Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/
by/4.0)
ABSTRACT
Background: One of the most important facts that should be considered is
confidentiality in order to maintain privacy turning out tobemattersof security.
Keeping-up confidentiality is a crucial factorin anyfield, aswellashealth realms.
Professionals who have the ingress to approach the patients’ communications
must keep confidentiality in health. The priority for any human being is privacy
to information especially related to health. Security enables ustolivepeacefully,
without anxiety and in full insurance.
Methods: The interpretive methodology was used in this research as it gives an
impression of face to face interactions in healthcare bringing in social reality of
what is happening in the health society.
Results: In consultations on gathering these results for our research, we also
realized that the most common threats of loss of data and theft come under
certain types of disclosures mainly third parties, routine and inadvertent. Upon
this realization, there must be notificationtoprotectsecurity,confidentialityand
privacy when security breaches occur mainly to patients. As a result, patients
must provide consent about their medical information in electronically form or
in writing and the consent must be signed by the patient or family member or
trusted entity. The patients must come clear on the nature of the information to
be disclosed and where it should be disclosed and also when the consent should
expire. At the same time, a health facility must take care of the institution’s
database and can only disclose to the management of the health institution
whose obligation would also be to protect the data, as they might need the
information for research purposes, where the researchers have approval from
their institution’s or to legal representatives.
Conclusion: The advent of the hype of electronic information technology leads
to major inconvenience in the main areas of human life. This manuscript
explores issues in maintaining confidentiality and privacy in healthcare and
other analysis of its value to individual and society as a whole. “Right to privacy
is really important. You pull that brick out and another and pretty soon the
house falls.” Tim Cook (2016)1
Keywords: Healthcare, Privacy in health, Security, Medical Confidentiality, HIPAA,
Socio-technical.
INTRODUCTION
The confidentiality of the personal information particularly
in the health field remains to be a sensible subject. Patients
are aware mostly about their health information as today it
is stored in data servers. Health data are still considered
particularly sensitive although more and more patients are
unaware and adhere to free information that may cause
serious consequences to them later.
Privacy information means a set of rules which limit
permission to information discussed between the patient
and their medical practitioners. Furthermore, privacy in
health information is the right of an individual to keep
his/her health information from being disclosed. The
information needs not to be shared with others. As a secret,
it requires permission from the patients and encompasses a
control.
As for the medical confidentiality, it is achieved via technical
and operational controls within a covered entity. This
consists of the allowance to control the access to the
IJTSRD23780
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23780 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 374
individual information and to protect patient information
from non-permitted destruction, loss, and disclosure. It
actually consists of the disclosure andtheuseof thepatient’s
health information known as "Protected Health
Information"2
.
Firstly, we try to find the problem, motivation and rationale
linked to the medical confidentiality and we sum-up by
centering on indications socio-technical nature of mobile
computing analysis.
CONCEPT AND VALUE OF PRIVACY IN GENERAL
Privacy has already existed in the era of ancient Greek. The
word “private” means "restricted to the use of a particular
person, peculiar to oneself, one who holds no public office3.”
Indeed, privacy is the state of being alone, or the right to
keep one’s personal matters and relationships secret4. It is
privacy when it is not for the public.
Protecting individual’s privacyagainstdisclosureisessential
and the patient has the right to keep his or her medical
confidential.
Privacy is a kind of factor that allows an individual to make
his or her own decisions freely5.The following perspectives
can justify that the surrounding zone of privacy should
increase all over the case. That of law, for example,
confidentiality is well illustrated especially for the case of
adolescents even if there are exceptions for individuals
under a certain age (18); it gives generally the parent access
to the child’s treatment. For the reason of that, it needs a
particular attention and a clear explanation of shared
information, that is, there should be an appropriate manner
to their age of understanding. It depends then to clinical
reasons and will have ethical implication in order to value
great respect for the need for privacy. As forclinical practice,
it emphasizes mostly that Clinical remains a zone of privacy
as well as the treatment reflects to the consideration of an
individual’s autonomy. Most of the time, adolescents prove
their need of privacy so as they did not want their parents
involved, they wish to continue therapy secretly.
Moreover, ethics state that "Privacy and Confidentiality"are
imperative to structure relationship between patients and
doctors, nurses, dentist and so ever …and give also the
psychologist permission to keep information private to
ensure the protection in healthcare and the continuity of
treatment. Besides, it allows us to go further on our own
decision and space for self-motivation. Human activity
occurs with a real or imagined social context. Other people
often observe us, make requests of what we do as we work,
play, study, and even relax.
THE IMPORTANCE OF PRIVACYATTHE SOCIETAL LEVEL
There are two main reasons why privacy is important.
Firstly, privacy helps patients to maintain their autonomy
and individuality. The second reason to make privacy
important is its functional benefits. Anonymity protects the
privacy of people’s identities. It actually leads to privacyand
safety and peace of mind.
In some words, privacy is substantial because of these
reasons:
It helps people to maintain our various social
relationships for instance; an individual is free to share
his or her health information with his or her doctor.
Thus, privacy is important because it allows us to know
what about us and to control who has access to us. It has
a value in our lives and it can’t be separated in a society.
Patients may be reluctant to find medical attention if
they are afraid that their information could be disclosed
to others. This effect could have implications for the
future prevention, cure,and studyofmedicalconditions.
They may feel valued and respected when their doctor
keeps their health information private thus health care
is attested as professionals.
It reflects a deep trust in health care services.
REASONS FOR PRIVACY IN HEALTH INFORMATION
Apart from various benefits given by privacy, it has also a
value in a health field and conveys an impact in mental
health. When privacy exists, the research and public health
activities can be accomplished. For example, it will simplify
access in a research of therapies or new cures.
Confidentiality and privacy are particularly important to
adolescents who seek medical confidentiality6. In a
particular case; the trauma in children and adolescents
requires health confidentiality. This trauma is caused by a
traumatic event that undermines their sense of security
leading them to feel vulnerable especially, if this event is
accompanied by an act of violence such as violent attack,
mass shooting, or physical assault. In addition, there are
other events that can be stressful for teens and kids like
accident, plane crash, and natural disaster and so on.
According to studies on Trauma Symptom Checklist for
Children7, the field of child and adolescent trauma is
relatively young despite the increase of the knowledge base
over the past 2 decades. There is a strong reason for
protecting the health privacy of people whether they are
adult, adolescent or kids. As for the adolescent case, these
standards are supported by the extensive research in order
to find out the impact of privacy concerns on adolescents'
access to care8.
For their self-respect, patients must reduce their self-doubt
about health professionals. Accordingly, keeping health
information privacy is the best act of sympathy with them.
As the sine qua non of health care, they must hold the
ultimate responsibility so they need to feel close and
confident with doctors in healthcare.
The rule of HIPAA
Everyone cares about their health confidentiality and wants
to hold them as a secret. It is important to realizethatinsuch
cases, trustworthiness should be appropriate at doctor and
patient’s relationship. Nonetheless, some professionals are
entrusted with the most personal patient’s information like
health information and account identity. These data
breaches will increase heavy consequences not only for the
patient but also for the healthcare industry. Thus,protecting
health information is both difficult and important.
Fortunately, healthcare organizations use information
technology to improve efficiency as well as quality.
COMPUTER SECURITY
It encompasses detecting and preventing one to use a
computer without the owner’s authorization. More reasons
can explain that such as averting others to discover your
files, your important information, your own data or
documents. In your own computer you can preserve its
confidentiality of information and forbid others to access it,
how about in a health care facility.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23780 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 375
If we store compacted and bite-sized information inside the
computers, we can save a lot.
Although the number of organizations that investigated a
disclosure from January through June in 2016 in the UK, it is
still unknown the total number of impacted data records.
Hence, the number of compromised records was up to
554,454,942 million data records.
It is difficult to predict how the interactions with the
healthcare system impact our health outcomes because of
the use of traditional statistical analysis as well as
reductionist scientific approaches.
Design implementation and use of healthcare systems
The STSA (Socio-Technical System Analysis) research
addresses the numerousqualitiesof careproblemsobserved
across the world9.
STSA is one of the several domains on healthcare systems. It
is clear that the use of the computerallowshealth workersto
stay in contact with their patients via technology
communication. Talking about the advantage of computers
in medical health, it allows the patientsto communicatewith
hospitals as well as asking questions to their doctors in case
of troubles. When patients expand communication with the
hospitals, healthcare quality and patient safety will reign.
Although this socio-technical environment is only for the
developed countries, it is hoped to spread all around the
world because every patient needs Medical Confidentiality
and healthcare improvement.
METHODS
The methodology used in this research articleisinterpretive
in nature mainly because in security, confidentiality and
privacy; views and perceptions were chiefly required as
opposed to a measurement blueprint. The respondents
outlined in this research were identified as the most
appropriate and fitting to the research settings. The
respondents had vast knowledge and experience in
healthcare thisincludesmedicalpersonnelandpatient’s who
constituted the population of study.Purposivesamplingwas
employed and analyses of the results are outlined in the
form of textual representation.
RESULTS
In this study, we have realized the following information
after gathering it from relevant stakeholders in health care
environments, Data breach or intrusion occurs mostlywhen
intruders use data mining technology to get hold of sensitive
data and they will later expose it for public consumption.
The following will ensure security, privacy and
confidentiality is preserved in healthcare settings, the study
has noted the use of hiding a needle in a haystack10.
Encryption of the storage path,accesscontrolwithattribute-
based encryption in health care settings, an access control
policy must be crafted which must be based on privileges’
and rights of each medical personnel being given a rightbya
patient or the family of the patient or a trusted party,
homomorphism typeof encryption,authenticationshouldbe
implemented in all systems used in health related matters
thus protecting the identities of system users, encryption
should be exercised where it can apply thus preventing
unauthorized access to sensitive data or information, data
masking can also be used in healthcare environments by
replacing sensitive data elements with an unidentifiable
value by de-identifying data sets, cryptography must be
implemented, information must be properly organized in
health environments then general measures such providing
physical security to data must be in place, medical staff must
be educated and trained on security, confidentiality and
privacy management practices including disaster recovery
planning and business continuity, experts must be hired in
health care institutions to implement the above including
proper security models and architecture of the existing
systems in the organization’s including its
telecommunications and network security. When all of the
above is implemented and addressed in various settings
healthcare offers numerous advantages to patients’
information as they curb theft and loss. Health care
providers have the prime to safeguard them by employing
monitoring and compliance.
Penalties can also be issued to violators of security,
confidentiality and privacy and the violators must be
punished in either form possible, forexampleattorney’sfees,
equitable remedies or civil damages where appropriate and
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23780 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 376
individual’s aggrieved must be liable to sue if they feel short
changed. To ensure proper implementingoftheabove, there
is need for a data integrity board to promulgate
implementing policies, proper governance and providing
oversight concerning the acquisition and dissemination of
patient’s sensitive information.
DISCUSSION
Existing techniques and approaches were explored in the
study in order to combat security, confidentiality and
privacy of health care data and their challenges. To achieve;
there is need for all healthcare institutions to adopt health
informatics standards and regulations, these standards will
aid in detailing fundamental concepts of health information
management. There are existing standards coined by
International StandardsOrganization (ISO)which healthcare
institutions are not adhering to,and complyingto,with these
standards a great improvement will be realized by health
institutions. Examples of U.S legislation in place; in the
transmission of data include “The Health Information
Technology for Economic and Clinical Health Act”11 and
“Health Insurance Portability and Accountability Act”
(HIPAA) 12. From the results gathered, we realized that
mitigating all these measures requires an effortonanumber
of things which include system user focused interventions,
organizational, regulatory and technological. An inbuilt
culture must be fostered in achieving the goals.
CONCLUSION
Medical confidentiality and securityarebecomingimportant
all over the world. Protecting patient’s health privacyshould
be a major concern and protecting people’s privacy and
confidentiality of the information are the most important
facts that should be considered for better health
improvement. Safety of information requires serious works
with both the patients and the personals health workers.
Including the use of computer, an important aspect of the
computer security is required for the security andprivacy of
healthcare information.
Healthcare organizations have grown in the last 20 years13.
There are many healthcaredatabreacheswhich remaina big
problem.
“In any debate of trust and distrust, however, it is beneficial
to be aware of the risks associated with miscommunication
about what can reasonably be expected of either party:
misplaced trust can affect for both trustier and trustee”14.
Enhancing trust relationships should be practicalbymaking
a system of effective communication to clarify what can
rationally be expected by both parties involved. To improve
the healthcare quality, the health sector should undertake
strong measures for data and information protection as
outlined in the research.
The anxiety about the unintentional and intentional
disclosure of their health information will reduce.
Additionally, distrustful treatment is often detected by the
difficulty of launching the own limits of doctor’s
responsibility and that remains one of their challenge. The
sign of dependence, doubt and trust directedbypatientsand
doctors is so expected. Knowing that patients and doctor
obligate both moral expectations to elude deceit, therefore,
doctors must not fail in their function and healthcare always
need to be successful because it concerns directly about
individual’s health. The health organizations like HIPAA or
others should combine with a self-motivation and efforts
from everyone to progress this field.
The creation of professional teams, committees and
healthcare boards to adopt thebestpracticesindatasecurity
and integrity should also be the primary solution to have
satisfying results.
REFERENCES
[1] Ana Mulero. (Feb. 27, 2017). WhyComputerSecurityin
the Healthcare World is Important. Retrieved from
https://afiahealth.com/computer-security-healthcare-
world-important
[2] Arlen Specter (February 12, 1930 – October 14, 2012)
was an American lawyer, author, and politician who
served as United States Senator for Pennsylvania
[3] Aug 02 2011 -HEALTH CARE CHART Updated Chart
ShowsObamacare'sBewilderingComplexity. Retrieved
from:
https://www.jec.senate.gov/public/index.cfm/republi
cans/committeenews?ID=bb302d88-3d0d-4424-8e33-
3c5d2578c2b0Link:http://www.icosystem.com/simpli
fying-the-complexity-of-healthcare
[4] Blau, B. The adult client's conception of confidentiality
in the therapeutic relationship. Professional
Psychology: Research and Practice, 16(3), 375-384.
[5] Briere, J. Trauma Symptom Checklist for Children.
[6] Cheng TL., Savageau JA., Sattler AL., DeWitt TG. (2016).
A survey of knowledge, perceptions, and attitudes
among high school students. [PubMed]
[7] Daniel Masys& M.D. (2014). It’s Only Sensitive If It
Hurts When You Touch It
[8] David C. Kibbe, MD &MBA (April 2005). 10 Steps to
HIPAA security. Retrieved from
http://www.onlinetech.com/resources/references/wh
at-is-the-hipaa-privacy-rule
[9] Donna Cryer, J.D., CEO of CryerHealth and patient
advocate, DC Patient. Patients Hold The Ultimate
Responsibility Of Selecting The Right Team Member
[10] Dr. Tony Iton. (2013). The California Endowment
Health Journalism Fellowships
[11] Edward L.Deci. & Richard M.Ryan (2014). A
motivational approach to self-integration in
personality. P.45 University of Rochester
[12] Edward Snowden. (2014). US government spied on
human rights workers Retrieved from
https://underground.net/why-privacy-is-important-
to-society-as-a-whole/
[13] Gemalto. (20 September 2016). Data breach statistics
2016: First half results are in posted on 20 September
2016.Articles: The Importance of Health Care IT
Security and Privacy in
https://cahsonline.uc.edu/resources/mhi/articles/the
-importance-of-health-care-it-security-and-privacy/
[14] HIPAA Compliance Training (08 Feb, 2015). Retrieved
from
https://www.hipaaexams.com/blog/understanding-5-
main-hipaa-rules/
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23780 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 377
[15] Hughes RG. (April 2008). PatientSafety and Quality:An
Evidence-Based Handbook for Nurses
[16] International Society for Quality in Health Care. Global
review of initiatives to improve quality in health care.
Geneva: World Health Organization
[17] Journal article: Sawyer, S., & Tapia, A. The
sociotechnical nature of mobile computing work:
Evidence from a study of policing in the United States.
International Journal of Technology and Human
Interaction, 1(3), 1-14
[18] Joy L., &Pritts, The Importance and Value of Protecting
the Privacy of Health Information: The Roles of the
HIPAA Privacy Rule and the Common Rule in Health
Research
[19] Kohn, Corrigan, & Donaldson. (1999). We have a more
complex healthcare system than ever before.
[20] Jung K, Park S, Hiding a needle in a haystack: privacy
preservingApriorialgorithm inMapReduceframework
PSBD’14, Shanghai; 2014. P11-17.
[21] Lehrer JA., Pantell R., Tebb K & Shafer MA. Forgone
health care among U.S. adolescents: Association
between risk characteristics and confidentiality
concerns. [PubMed]
[22] Michael D., De Bellis, MD., MPH., & Abigail Zisk A.B
(2014). The Biological Effects of Childhood Trauma
[23] Nass SJ., Levit LA., Gostin LO (2011). The HIPAA
Privacy Rule. editors.Washington (DC): National
Academies Press (US) Retrieved from
https://www.ncbi.nlm.nih.gov/books/NBK9579/
[24] Oxford English Dictionary. (March 2008 revision).
Retrieved from: http://dictionary.oed.com/
https://dictionary.cambridge.org
http://www.privacilla.org/fundamentals/whyprivacy.
html https://www.quora.com/What-is-HIPAA-laws-
primary-goal
[25] Pascale Carayon, Ellen J. Bass, Tommaso Bellandi, Ayse
P. Gurses, M. Susan Hallbeck, &VaninaMollo. (2011).
Sociotechnical systems analysis in health care: a
research agenda
https://getreferralmd.com/2012/09/how-important-
is-protecting-patient-privacy
[26] Prof. Albert LeeProf. Samuel YSWongEditorialMedical
BulletinVOL.11 NO.3 MARCH 2016 HIPAA Compliance
- Secure Patient Records | rfideas.com. Retrieved from
http://www.rfideas.com/Healthcare/Secure-Records
[27] Prof. Samuel YS Wong MD, CCFP, FRACGP, Prof. Albert
Lee MD, FHKAM, FRACGP, FRCP, FFPH Department of
Community and Family Medicine, The Chinese
University of Hong Kong . Communication Skills and
Doctor Patient Relationship, March 2016
[28] Shocking Stat – 70% of HospitalsSayProtectingPatient
Privacy is not a Priority, link:
https://getreferralmd.com/2012/09/how-important-
is-protecting-patient-privacy/
[29] Solove, D. (2013).HIPAA Turns 10. Analyzing the Past,
Present and Future Impact. Journal of AHIMA 84, no.4
(April 2013): 22-28.
[30] Valerie S. Prater, MBA, RHIA, Clinical Assistant
Professor Biomedical and Health InformationSciences
University of Illinois atChicago.(2014).Confidentiality,
privacy and security of health information: Balancing
interests.
[31] Valerie S. Prater, MBA & RHIA. (December 8, 2014).
Confidentiality, privacy and security of health
information: Balancing interests. University of Illinois
at Chicago.
[32] Valerie S. Prater, MBA, & RHIA. (December 8, 2014).
Confidentiality, privacy and security of health
information: Balancing interests.
[33] The American Psychoanalytic Association.
(2014). Landmark Cases. Retrieved from
http://apsa.org/Programs/Advocacy/Landmark_Cases
.aspx
[34] U.S. Department of Health and Human Services (HHS),
Office for Civil Rights. (2013). Omnibus HIPAA
Rulemaking, http://www.hhs.gov/ocr/privacy/hipaa/
administrative/omnibus/index.html

More Related Content

What's hot

Confidentiality
Confidentiality Confidentiality
Confidentiality
Rhonda Williams
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
jaredbrady
 
The importance of patient privacy
The importance of patient privacyThe importance of patient privacy
The importance of patient privacy
tbella
 
Confidentiality
ConfidentialityConfidentiality
Confidentialityblutoothe
 
Protecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationProtecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentation
plunkk
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacysawanda
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentialitycraig45365
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
RamiAboali
 
Hipaa.pptx
Hipaa.pptxHipaa.pptx
Hipaa.pptxelo1972
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
pcsamuels10
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityptamayo1958
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentialityljbroshious
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
maggie_Platt
 
MHA690 Patient Confidentiality Training
MHA690 Patient Confidentiality TrainingMHA690 Patient Confidentiality Training
MHA690 Patient Confidentiality Training
rgasaway
 
Privacy and patient confidentiality
Privacy and patient confidentialityPrivacy and patient confidentiality
Privacy and patient confidentiality
jmw1019
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
kajal pradhan
 
Protecting patient privacy and confidentiality
Protecting patient privacy and confidentialityProtecting patient privacy and confidentiality
Protecting patient privacy and confidentialityTiffany Cochran
 

What's hot (18)

Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
The importance of patient privacy
The importance of patient privacyThe importance of patient privacy
The importance of patient privacy
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Protecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationProtecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentation
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hipaa.pptx
Hipaa.pptxHipaa.pptx
Hipaa.pptx
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentiality
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Mha wk 1 dis 2
Mha wk 1 dis 2Mha wk 1 dis 2
Mha wk 1 dis 2
 
MHA690 Patient Confidentiality Training
MHA690 Patient Confidentiality TrainingMHA690 Patient Confidentiality Training
MHA690 Patient Confidentiality Training
 
Privacy and patient confidentiality
Privacy and patient confidentialityPrivacy and patient confidentiality
Privacy and patient confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Protecting patient privacy and confidentiality
Protecting patient privacy and confidentialityProtecting patient privacy and confidentiality
Protecting patient privacy and confidentiality
 

Similar to Security, Confidentiality and Privacy in Health of Healthcare Data

Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
karlhennesey
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
honey690131
 
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docx
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docxRunning head DATA PRIVACY 1 DATA PRIVACY10Short- and .docx
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docx
todd271
 
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDSMANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
ijsptm
 
Eathical and legal Issues in Health Care.pptx
Eathical and legal Issues in Health Care.pptxEathical and legal Issues in Health Care.pptx
Eathical and legal Issues in Health Care.pptx
sukhpreetkaur396849
 
Due 614 18 10 p.m EST500 words discussion APA not including mi.docx
Due 614 18 10 p.m EST500 words discussion APA not including mi.docxDue 614 18 10 p.m EST500 words discussion APA not including mi.docx
Due 614 18 10 p.m EST500 words discussion APA not including mi.docx
astonrenna
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
kendale
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
kendale
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
sheronlewthwaite
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
DeniseMHA
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
DonnaDudley
 
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docxINFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
annettsparrow
 
PRIVACY OF OUR PATIENTS IN DIGITAL ERA
PRIVACY OF OUR PATIENTS IN DIGITAL ERA PRIVACY OF OUR PATIENTS IN DIGITAL ERA
PRIVACY OF OUR PATIENTS IN DIGITAL ERA
Society for Microbiology and Infection care
 
COVID-19 & Personal BeliefsValuesThe COVID pandemic has had a t
COVID-19 & Personal BeliefsValuesThe COVID pandemic has had a tCOVID-19 & Personal BeliefsValuesThe COVID pandemic has had a t
COVID-19 & Personal BeliefsValuesThe COVID pandemic has had a t
CruzIbarra161
 
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Rennessa Jackson
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )
Tasha Holloway
 
Confidentiality pp
Confidentiality ppConfidentiality pp
Confidentiality pp
Kieosha Davis
 

Similar to Security, Confidentiality and Privacy in Health of Healthcare Data (20)

Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docx
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docxRunning head DATA PRIVACY 1 DATA PRIVACY10Short- and .docx
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docx
 
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDSMANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
 
Eathical and legal Issues in Health Care.pptx
Eathical and legal Issues in Health Care.pptxEathical and legal Issues in Health Care.pptx
Eathical and legal Issues in Health Care.pptx
 
Due 614 18 10 p.m EST500 words discussion APA not including mi.docx
Due 614 18 10 p.m EST500 words discussion APA not including mi.docxDue 614 18 10 p.m EST500 words discussion APA not including mi.docx
Due 614 18 10 p.m EST500 words discussion APA not including mi.docx
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
 
0
00
0
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docxINFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
 
PRIVACY OF OUR PATIENTS IN DIGITAL ERA
PRIVACY OF OUR PATIENTS IN DIGITAL ERA PRIVACY OF OUR PATIENTS IN DIGITAL ERA
PRIVACY OF OUR PATIENTS IN DIGITAL ERA
 
COVID-19 & Personal BeliefsValuesThe COVID pandemic has had a t
COVID-19 & Personal BeliefsValuesThe COVID pandemic has had a tCOVID-19 & Personal BeliefsValuesThe COVID pandemic has had a t
COVID-19 & Personal BeliefsValuesThe COVID pandemic has had a t
 
Casual consent to treatment muhammad saaiq
Casual consent to treatment  muhammad saaiqCasual consent to treatment  muhammad saaiq
Casual consent to treatment muhammad saaiq
 
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )
 
Confidentiality pp
Confidentiality ppConfidentiality pp
Confidentiality pp
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 

Recently uploaded (20)

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 

Security, Confidentiality and Privacy in Health of Healthcare Data

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Paper ID - IJTSRD23780 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 373 Security, Confidentiality and Privacy in Health of Healthcare Data Jomin George1, Takura Bhila2 1Department of Health Information Systems Management, 1Namibia University of Science and Technology, Windhoek, Namibia 2Department of Information and Communication Technology, 2Limkokwing University of Creative Technology, Maseru, Lesotho How to cite this paper: Jomin George | Takura Bhila "Security, Confidentiality and Privacy in Health of Healthcare Data" Published in InternationalJournal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-4, June 2019, pp.373-377, URL: https://www.ijtsrd.c om/papers/ijtsrd23 780.pdf Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT Background: One of the most important facts that should be considered is confidentiality in order to maintain privacy turning out tobemattersof security. Keeping-up confidentiality is a crucial factorin anyfield, aswellashealth realms. Professionals who have the ingress to approach the patients’ communications must keep confidentiality in health. The priority for any human being is privacy to information especially related to health. Security enables ustolivepeacefully, without anxiety and in full insurance. Methods: The interpretive methodology was used in this research as it gives an impression of face to face interactions in healthcare bringing in social reality of what is happening in the health society. Results: In consultations on gathering these results for our research, we also realized that the most common threats of loss of data and theft come under certain types of disclosures mainly third parties, routine and inadvertent. Upon this realization, there must be notificationtoprotectsecurity,confidentialityand privacy when security breaches occur mainly to patients. As a result, patients must provide consent about their medical information in electronically form or in writing and the consent must be signed by the patient or family member or trusted entity. The patients must come clear on the nature of the information to be disclosed and where it should be disclosed and also when the consent should expire. At the same time, a health facility must take care of the institution’s database and can only disclose to the management of the health institution whose obligation would also be to protect the data, as they might need the information for research purposes, where the researchers have approval from their institution’s or to legal representatives. Conclusion: The advent of the hype of electronic information technology leads to major inconvenience in the main areas of human life. This manuscript explores issues in maintaining confidentiality and privacy in healthcare and other analysis of its value to individual and society as a whole. “Right to privacy is really important. You pull that brick out and another and pretty soon the house falls.” Tim Cook (2016)1 Keywords: Healthcare, Privacy in health, Security, Medical Confidentiality, HIPAA, Socio-technical. INTRODUCTION The confidentiality of the personal information particularly in the health field remains to be a sensible subject. Patients are aware mostly about their health information as today it is stored in data servers. Health data are still considered particularly sensitive although more and more patients are unaware and adhere to free information that may cause serious consequences to them later. Privacy information means a set of rules which limit permission to information discussed between the patient and their medical practitioners. Furthermore, privacy in health information is the right of an individual to keep his/her health information from being disclosed. The information needs not to be shared with others. As a secret, it requires permission from the patients and encompasses a control. As for the medical confidentiality, it is achieved via technical and operational controls within a covered entity. This consists of the allowance to control the access to the IJTSRD23780
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23780 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 374 individual information and to protect patient information from non-permitted destruction, loss, and disclosure. It actually consists of the disclosure andtheuseof thepatient’s health information known as "Protected Health Information"2 . Firstly, we try to find the problem, motivation and rationale linked to the medical confidentiality and we sum-up by centering on indications socio-technical nature of mobile computing analysis. CONCEPT AND VALUE OF PRIVACY IN GENERAL Privacy has already existed in the era of ancient Greek. The word “private” means "restricted to the use of a particular person, peculiar to oneself, one who holds no public office3.” Indeed, privacy is the state of being alone, or the right to keep one’s personal matters and relationships secret4. It is privacy when it is not for the public. Protecting individual’s privacyagainstdisclosureisessential and the patient has the right to keep his or her medical confidential. Privacy is a kind of factor that allows an individual to make his or her own decisions freely5.The following perspectives can justify that the surrounding zone of privacy should increase all over the case. That of law, for example, confidentiality is well illustrated especially for the case of adolescents even if there are exceptions for individuals under a certain age (18); it gives generally the parent access to the child’s treatment. For the reason of that, it needs a particular attention and a clear explanation of shared information, that is, there should be an appropriate manner to their age of understanding. It depends then to clinical reasons and will have ethical implication in order to value great respect for the need for privacy. As forclinical practice, it emphasizes mostly that Clinical remains a zone of privacy as well as the treatment reflects to the consideration of an individual’s autonomy. Most of the time, adolescents prove their need of privacy so as they did not want their parents involved, they wish to continue therapy secretly. Moreover, ethics state that "Privacy and Confidentiality"are imperative to structure relationship between patients and doctors, nurses, dentist and so ever …and give also the psychologist permission to keep information private to ensure the protection in healthcare and the continuity of treatment. Besides, it allows us to go further on our own decision and space for self-motivation. Human activity occurs with a real or imagined social context. Other people often observe us, make requests of what we do as we work, play, study, and even relax. THE IMPORTANCE OF PRIVACYATTHE SOCIETAL LEVEL There are two main reasons why privacy is important. Firstly, privacy helps patients to maintain their autonomy and individuality. The second reason to make privacy important is its functional benefits. Anonymity protects the privacy of people’s identities. It actually leads to privacyand safety and peace of mind. In some words, privacy is substantial because of these reasons: It helps people to maintain our various social relationships for instance; an individual is free to share his or her health information with his or her doctor. Thus, privacy is important because it allows us to know what about us and to control who has access to us. It has a value in our lives and it can’t be separated in a society. Patients may be reluctant to find medical attention if they are afraid that their information could be disclosed to others. This effect could have implications for the future prevention, cure,and studyofmedicalconditions. They may feel valued and respected when their doctor keeps their health information private thus health care is attested as professionals. It reflects a deep trust in health care services. REASONS FOR PRIVACY IN HEALTH INFORMATION Apart from various benefits given by privacy, it has also a value in a health field and conveys an impact in mental health. When privacy exists, the research and public health activities can be accomplished. For example, it will simplify access in a research of therapies or new cures. Confidentiality and privacy are particularly important to adolescents who seek medical confidentiality6. In a particular case; the trauma in children and adolescents requires health confidentiality. This trauma is caused by a traumatic event that undermines their sense of security leading them to feel vulnerable especially, if this event is accompanied by an act of violence such as violent attack, mass shooting, or physical assault. In addition, there are other events that can be stressful for teens and kids like accident, plane crash, and natural disaster and so on. According to studies on Trauma Symptom Checklist for Children7, the field of child and adolescent trauma is relatively young despite the increase of the knowledge base over the past 2 decades. There is a strong reason for protecting the health privacy of people whether they are adult, adolescent or kids. As for the adolescent case, these standards are supported by the extensive research in order to find out the impact of privacy concerns on adolescents' access to care8. For their self-respect, patients must reduce their self-doubt about health professionals. Accordingly, keeping health information privacy is the best act of sympathy with them. As the sine qua non of health care, they must hold the ultimate responsibility so they need to feel close and confident with doctors in healthcare. The rule of HIPAA Everyone cares about their health confidentiality and wants to hold them as a secret. It is important to realizethatinsuch cases, trustworthiness should be appropriate at doctor and patient’s relationship. Nonetheless, some professionals are entrusted with the most personal patient’s information like health information and account identity. These data breaches will increase heavy consequences not only for the patient but also for the healthcare industry. Thus,protecting health information is both difficult and important. Fortunately, healthcare organizations use information technology to improve efficiency as well as quality. COMPUTER SECURITY It encompasses detecting and preventing one to use a computer without the owner’s authorization. More reasons can explain that such as averting others to discover your files, your important information, your own data or documents. In your own computer you can preserve its confidentiality of information and forbid others to access it, how about in a health care facility.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23780 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 375 If we store compacted and bite-sized information inside the computers, we can save a lot. Although the number of organizations that investigated a disclosure from January through June in 2016 in the UK, it is still unknown the total number of impacted data records. Hence, the number of compromised records was up to 554,454,942 million data records. It is difficult to predict how the interactions with the healthcare system impact our health outcomes because of the use of traditional statistical analysis as well as reductionist scientific approaches. Design implementation and use of healthcare systems The STSA (Socio-Technical System Analysis) research addresses the numerousqualitiesof careproblemsobserved across the world9. STSA is one of the several domains on healthcare systems. It is clear that the use of the computerallowshealth workersto stay in contact with their patients via technology communication. Talking about the advantage of computers in medical health, it allows the patientsto communicatewith hospitals as well as asking questions to their doctors in case of troubles. When patients expand communication with the hospitals, healthcare quality and patient safety will reign. Although this socio-technical environment is only for the developed countries, it is hoped to spread all around the world because every patient needs Medical Confidentiality and healthcare improvement. METHODS The methodology used in this research articleisinterpretive in nature mainly because in security, confidentiality and privacy; views and perceptions were chiefly required as opposed to a measurement blueprint. The respondents outlined in this research were identified as the most appropriate and fitting to the research settings. The respondents had vast knowledge and experience in healthcare thisincludesmedicalpersonnelandpatient’s who constituted the population of study.Purposivesamplingwas employed and analyses of the results are outlined in the form of textual representation. RESULTS In this study, we have realized the following information after gathering it from relevant stakeholders in health care environments, Data breach or intrusion occurs mostlywhen intruders use data mining technology to get hold of sensitive data and they will later expose it for public consumption. The following will ensure security, privacy and confidentiality is preserved in healthcare settings, the study has noted the use of hiding a needle in a haystack10. Encryption of the storage path,accesscontrolwithattribute- based encryption in health care settings, an access control policy must be crafted which must be based on privileges’ and rights of each medical personnel being given a rightbya patient or the family of the patient or a trusted party, homomorphism typeof encryption,authenticationshouldbe implemented in all systems used in health related matters thus protecting the identities of system users, encryption should be exercised where it can apply thus preventing unauthorized access to sensitive data or information, data masking can also be used in healthcare environments by replacing sensitive data elements with an unidentifiable value by de-identifying data sets, cryptography must be implemented, information must be properly organized in health environments then general measures such providing physical security to data must be in place, medical staff must be educated and trained on security, confidentiality and privacy management practices including disaster recovery planning and business continuity, experts must be hired in health care institutions to implement the above including proper security models and architecture of the existing systems in the organization’s including its telecommunications and network security. When all of the above is implemented and addressed in various settings healthcare offers numerous advantages to patients’ information as they curb theft and loss. Health care providers have the prime to safeguard them by employing monitoring and compliance. Penalties can also be issued to violators of security, confidentiality and privacy and the violators must be punished in either form possible, forexampleattorney’sfees, equitable remedies or civil damages where appropriate and
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23780 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 376 individual’s aggrieved must be liable to sue if they feel short changed. To ensure proper implementingoftheabove, there is need for a data integrity board to promulgate implementing policies, proper governance and providing oversight concerning the acquisition and dissemination of patient’s sensitive information. DISCUSSION Existing techniques and approaches were explored in the study in order to combat security, confidentiality and privacy of health care data and their challenges. To achieve; there is need for all healthcare institutions to adopt health informatics standards and regulations, these standards will aid in detailing fundamental concepts of health information management. There are existing standards coined by International StandardsOrganization (ISO)which healthcare institutions are not adhering to,and complyingto,with these standards a great improvement will be realized by health institutions. Examples of U.S legislation in place; in the transmission of data include “The Health Information Technology for Economic and Clinical Health Act”11 and “Health Insurance Portability and Accountability Act” (HIPAA) 12. From the results gathered, we realized that mitigating all these measures requires an effortonanumber of things which include system user focused interventions, organizational, regulatory and technological. An inbuilt culture must be fostered in achieving the goals. CONCLUSION Medical confidentiality and securityarebecomingimportant all over the world. Protecting patient’s health privacyshould be a major concern and protecting people’s privacy and confidentiality of the information are the most important facts that should be considered for better health improvement. Safety of information requires serious works with both the patients and the personals health workers. Including the use of computer, an important aspect of the computer security is required for the security andprivacy of healthcare information. Healthcare organizations have grown in the last 20 years13. There are many healthcaredatabreacheswhich remaina big problem. “In any debate of trust and distrust, however, it is beneficial to be aware of the risks associated with miscommunication about what can reasonably be expected of either party: misplaced trust can affect for both trustier and trustee”14. Enhancing trust relationships should be practicalbymaking a system of effective communication to clarify what can rationally be expected by both parties involved. To improve the healthcare quality, the health sector should undertake strong measures for data and information protection as outlined in the research. The anxiety about the unintentional and intentional disclosure of their health information will reduce. Additionally, distrustful treatment is often detected by the difficulty of launching the own limits of doctor’s responsibility and that remains one of their challenge. The sign of dependence, doubt and trust directedbypatientsand doctors is so expected. Knowing that patients and doctor obligate both moral expectations to elude deceit, therefore, doctors must not fail in their function and healthcare always need to be successful because it concerns directly about individual’s health. The health organizations like HIPAA or others should combine with a self-motivation and efforts from everyone to progress this field. The creation of professional teams, committees and healthcare boards to adopt thebestpracticesindatasecurity and integrity should also be the primary solution to have satisfying results. REFERENCES [1] Ana Mulero. (Feb. 27, 2017). WhyComputerSecurityin the Healthcare World is Important. Retrieved from https://afiahealth.com/computer-security-healthcare- world-important [2] Arlen Specter (February 12, 1930 – October 14, 2012) was an American lawyer, author, and politician who served as United States Senator for Pennsylvania [3] Aug 02 2011 -HEALTH CARE CHART Updated Chart ShowsObamacare'sBewilderingComplexity. Retrieved from: https://www.jec.senate.gov/public/index.cfm/republi cans/committeenews?ID=bb302d88-3d0d-4424-8e33- 3c5d2578c2b0Link:http://www.icosystem.com/simpli fying-the-complexity-of-healthcare [4] Blau, B. The adult client's conception of confidentiality in the therapeutic relationship. Professional Psychology: Research and Practice, 16(3), 375-384. [5] Briere, J. Trauma Symptom Checklist for Children. [6] Cheng TL., Savageau JA., Sattler AL., DeWitt TG. (2016). A survey of knowledge, perceptions, and attitudes among high school students. [PubMed] [7] Daniel Masys& M.D. (2014). It’s Only Sensitive If It Hurts When You Touch It [8] David C. Kibbe, MD &MBA (April 2005). 10 Steps to HIPAA security. Retrieved from http://www.onlinetech.com/resources/references/wh at-is-the-hipaa-privacy-rule [9] Donna Cryer, J.D., CEO of CryerHealth and patient advocate, DC Patient. Patients Hold The Ultimate Responsibility Of Selecting The Right Team Member [10] Dr. Tony Iton. (2013). The California Endowment Health Journalism Fellowships [11] Edward L.Deci. & Richard M.Ryan (2014). A motivational approach to self-integration in personality. P.45 University of Rochester [12] Edward Snowden. (2014). US government spied on human rights workers Retrieved from https://underground.net/why-privacy-is-important- to-society-as-a-whole/ [13] Gemalto. (20 September 2016). Data breach statistics 2016: First half results are in posted on 20 September 2016.Articles: The Importance of Health Care IT Security and Privacy in https://cahsonline.uc.edu/resources/mhi/articles/the -importance-of-health-care-it-security-and-privacy/ [14] HIPAA Compliance Training (08 Feb, 2015). Retrieved from https://www.hipaaexams.com/blog/understanding-5- main-hipaa-rules/
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23780 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 377 [15] Hughes RG. (April 2008). PatientSafety and Quality:An Evidence-Based Handbook for Nurses [16] International Society for Quality in Health Care. Global review of initiatives to improve quality in health care. Geneva: World Health Organization [17] Journal article: Sawyer, S., & Tapia, A. The sociotechnical nature of mobile computing work: Evidence from a study of policing in the United States. International Journal of Technology and Human Interaction, 1(3), 1-14 [18] Joy L., &Pritts, The Importance and Value of Protecting the Privacy of Health Information: The Roles of the HIPAA Privacy Rule and the Common Rule in Health Research [19] Kohn, Corrigan, & Donaldson. (1999). We have a more complex healthcare system than ever before. [20] Jung K, Park S, Hiding a needle in a haystack: privacy preservingApriorialgorithm inMapReduceframework PSBD’14, Shanghai; 2014. P11-17. [21] Lehrer JA., Pantell R., Tebb K & Shafer MA. Forgone health care among U.S. adolescents: Association between risk characteristics and confidentiality concerns. [PubMed] [22] Michael D., De Bellis, MD., MPH., & Abigail Zisk A.B (2014). The Biological Effects of Childhood Trauma [23] Nass SJ., Levit LA., Gostin LO (2011). The HIPAA Privacy Rule. editors.Washington (DC): National Academies Press (US) Retrieved from https://www.ncbi.nlm.nih.gov/books/NBK9579/ [24] Oxford English Dictionary. (March 2008 revision). Retrieved from: http://dictionary.oed.com/ https://dictionary.cambridge.org http://www.privacilla.org/fundamentals/whyprivacy. html https://www.quora.com/What-is-HIPAA-laws- primary-goal [25] Pascale Carayon, Ellen J. Bass, Tommaso Bellandi, Ayse P. Gurses, M. Susan Hallbeck, &VaninaMollo. (2011). Sociotechnical systems analysis in health care: a research agenda https://getreferralmd.com/2012/09/how-important- is-protecting-patient-privacy [26] Prof. Albert LeeProf. Samuel YSWongEditorialMedical BulletinVOL.11 NO.3 MARCH 2016 HIPAA Compliance - Secure Patient Records | rfideas.com. Retrieved from http://www.rfideas.com/Healthcare/Secure-Records [27] Prof. Samuel YS Wong MD, CCFP, FRACGP, Prof. Albert Lee MD, FHKAM, FRACGP, FRCP, FFPH Department of Community and Family Medicine, The Chinese University of Hong Kong . Communication Skills and Doctor Patient Relationship, March 2016 [28] Shocking Stat – 70% of HospitalsSayProtectingPatient Privacy is not a Priority, link: https://getreferralmd.com/2012/09/how-important- is-protecting-patient-privacy/ [29] Solove, D. (2013).HIPAA Turns 10. Analyzing the Past, Present and Future Impact. Journal of AHIMA 84, no.4 (April 2013): 22-28. [30] Valerie S. Prater, MBA, RHIA, Clinical Assistant Professor Biomedical and Health InformationSciences University of Illinois atChicago.(2014).Confidentiality, privacy and security of health information: Balancing interests. [31] Valerie S. Prater, MBA & RHIA. (December 8, 2014). Confidentiality, privacy and security of health information: Balancing interests. University of Illinois at Chicago. [32] Valerie S. Prater, MBA, & RHIA. (December 8, 2014). Confidentiality, privacy and security of health information: Balancing interests. [33] The American Psychoanalytic Association. (2014). Landmark Cases. Retrieved from http://apsa.org/Programs/Advocacy/Landmark_Cases .aspx [34] U.S. Department of Health and Human Services (HHS), Office for Civil Rights. (2013). Omnibus HIPAA Rulemaking, http://www.hhs.gov/ocr/privacy/hipaa/ administrative/omnibus/index.html