References
- Win KT. A review of security of electronic health records. Heal Inf Manag. 2005;34(1):13–18. doi:10.1177/183335830503400105
- Layman EJ. Ethical issues and the electronic health record. Health Care Manag (Frederick). 2008;27(2):165–176. doi:10.1097/01.HCM.0000285044.19666.a818475119
- Ozair FF, Jamshed N, Sharma A, et al. Ethical issues in electronic health records: a general overview. Perspect Clin Res. 2015;6(2):73–76. doi:10.4103/2229-3485.15399725878950
- Kalra D, Gertz R, Singleton P, Inskip HM. Confidentiality of personal health information used for research. BMJ. 2006;333(7560):196–198. doi:10.1136/bmj.333.7560.19616858053
- Safety I of M (US) C on DS for P. Key Capabilities of an Electronic Health Record System. National Academies Press (US); 2003.
- Safran C, Bloomrosen M, Hammond WE, et al. Toward a national framework for the secondary use of health data: an American Medical Informatics Association white paper. J Am Med. 2007;14(1):1–9. doi:10.1197/jamia.M2273
- Kukafka R, Ancker JS, Chan C, et al. Redesigning electronic health record systems to support public health. J Biomed Inform. 2007;40(4):398–409. doi:10.1016/j.jbi.2007.07.00117632039
- Miller AR, Tucker CE. Encryption and the loss of patient data. J Policy Anal Manage. 2011;30(3):534-56. doi:10.1002/pam.20590
- Ponemon Institute LLC. Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data. Ponemon Institute LLC; 2015 Available from: https://media.scmagazine.com/documents/121/healthcare_privacy_security_be_30019.pdf. Accessed 26 November 2019.
- Data protection - GOV.UK. Gov.uk. Avaliable from: https://www.gov.uk/data-protection/the-data-protection-act. Published 1998 Accessed 79, 2019.
- Kruse CS, Smith B, Vanderlinden H, Nealand A. Security techniques for the electronic health records. J Med Syst. 2017;41(8):127. doi:10.1007/s10916-017-0778-428733949
- Thakkar M, Davis DC. Risks, barriers, and benefits of EHR systems: a comparative study based on size of hospital. Perspect Heal Inf Manag. 2006;3(5):5.
- Menachemi N, Collum TH. Benefits and drawbacks of electronic health record systems. Risk Manag Healthc Policy. 2011;4:47–55. doi:10.2147/RMHP.S1298522312227
- Raposo VL. Electronic health records: is it a risk worth taking in healthcare delivery? GMS Health Technol Assess. 2015;11:Doc02. doi:10.3205/hta00012326693253
- Khac Hai N, Lawpoolsri S, Jittamala P, Thi Thu Huong P, Kaewkungwal J. Practices in security and confidentiality of HIV/AIDS patients’ information: a national survey among staff at HIV outpatient clinics in Vietnam. PLoS One. 2017;12(11):e0188160. doi:10.1371/journal.pone.018816029136017
- Cross S, Sim J. Confidentiality within physiotherapy: perceptions and attitudes of clinical practitioners. J Med Ethics. 2000;26(6):447–453. doi:10.1136/jme.26.6.44711129846
- Cushman R. Serious technology assessment for health care information technology. J Am Med Inform Assoc. 1997;4(4):259–265. doi:10.1136/jamia.1997.00402599223032
- EI Global Security. Is cybersecurity about more than protection? EY Global Information Security Survey 2018–19 Available from: https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/advisory/ey-global-information-security-survey-2018-19.pdf. Accessed 26 November 2019.
- Abrams L. Health care data of 2 million people in mexico exposed online. Avaliable from: https://www.bleepingcomputer.com/news/security/health-care-data-of-2-million-people-in-mexico-exposed-online/. Accessed 715, 2019.
- Filkins BL, Kim JY, Roberts B, et al. Privacy and security in the era of digital health: what should translational researchers know and do about it? Am J Transl Res. 2016;8(3):1560–1580.27186282
- The Caldicott Committee. Report on the Review of Patient-Identifiable Information. Department of Health, UK; 1997. Available from: http://static.ukcgc.uk/docs/caldicott1.pdf. Accessed 26 November 2019.
- Dougherty M. The 10 security domains (AHIMA practice brief). J AHIMA. 2004;75(2):56A–D.
- Ponemon Institute LLC. Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data. Ponemon Institute; 2016 Available from: https://www.ponemon.org/local/upload/file/Sixth%20Annual%20Patient%20Privacy%20%26%20Data%20Security%20Report%20FINAL%206.pdf. Accessed November 26 2019.
- Rumbold J, Pierscionek B. Contextual anonymization for secondary use of big data in biomedical research: proposal for an anonymization matrix. JMIR Med Informatics. 2018;6(4):e47. doi:10.2196/medinform.7096
- Allen A. Confidentiality: an expectation in health care. Fac Scholarsh Penn Law. 2008.
- Caine K, Hanania R. Patients want granular privacy control over health information in electronic medical records. J Am Med Inform Assoc. 2013;20(1):7–15. doi:10.1136/amiajnl-2012-00102323184192
- Spencer K, Sanders C, Whitley EA, Lund D, Kaye J, Dixon WG. Patient perspectives on sharing anonymized personal health data using a digital system for dynamic consent and research feedback: a qualitative study. J Med Internet Res. 2016;18(4):e66. doi:10.2196/jmir.501127083521
- Fairweather NB, Rogerson S. A moral approach to electronic patient records. Med Inform Internet Med. 2001;26(3):219–234. doi:10.1080/1463923011007641211706931
- Huser V, Cimino JJ. Don’t take your EHR to heaven, donate it to science: legal and research policies for EHR post mortem. J Am Med Inform Assoc. 2014;21(1):8–12. doi:10.1136/amiajnl-2013-00206123966483
- Brothers KB, Clayton EW. “Human non-subjects research”: privacy and compliance. Am J Bioeth. 2010;10(9):15–17. doi:10.1080/15265161.2010.492891
- Humphreys S. Healthcare datasets: ethical concerns. Br J Gen Pract. 2013;63(611):310–311. doi:10.3399/bjgp13X66823023735389
- The Health Service (Control of Patient Information) Regulations 2002. National Health Service, UK. Available from: http://www.legislation.gov.uk/uksi/2002/1438/contents/made. Accessed 26 November 2019.
- Neubauer T, Heurix J. A methodology for the pseudonymization of medical data. Int J Med Inform. 2011;80(3):190–204. doi:10.1016/j.ijmedinf.2010.10.01621075676
- Noumeir R, Lemay A, Lina J-M. Pseudonymization of radiology data for research purposes. J Digit Imaging. 2007;20(3):284–295. doi:10.1007/s10278-006-1051-417191099
- Pommerening K, Reng M. Secondary use of the EHR via pseudonymisation. Stud Health Technol Inform. 2004;103:441–446.15747953