Patient data and security: an overview

1998 
The requirement for the confidentiality of personal medical information was clearly understood nearly two and a half millennia ago and has since been embodied in the Hippocratic Oath. More recently, this requirement has been evident from the earliest development of medical informatics. It derives directly from the professional code of ethics of all health professionals and it has provided a basic underpinning for discussions between clinicians and informaticians in their development of all computer based systems holding personal health information. This concern is exemplified by Peterson and Turn [1], Freed [2], Acheson [3], Witts [4] and Curran [5]. Collen [6] sets out this requirement in his book on hospital computer systems. At this stage, computing systems were restricted in number and power and the worries were those of a breach of privacy and the Orwellian concerns about ‘Big Brother’. The available systems were difficult and tedious to use, the software took a great deal of time to develop and the major concern of the technical staff was to develop a system that would work satisfactorily within a practical health care environment. Project control was, and remains, a major issue for the development of complex systems. In reviewing the approach taken when the system at the London Hospital had been developed it was recorded by Barber et al. [7] that the system had been developed such that: “ in terms of confidentiality the computer system should be at least as effective as the previous manual system; “ and that the measures employed to further confidentiality of information should not be so cumbersome as to destroy the advantages of the system.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    14
    References
    18
    Citations
    NaN
    KQI
    []