Summary: The privacy of information and its protection against unauthorized disclosure.
Publications212 found, 100 shown here
- HIPAA the health care hippo: despite the rhetoric, is privacy still an issue?Kay Kuczynski
Department of Social Work, East Tennessee State University, Johnson City 37614 0002, USA
Soc Work 50:283-7. 2005
- Privacy architecture and e-consent. What the future holdsKathleen Connor
FOX Systems, Inc, Olympia, WA, USA
J AHIMA 78:64-5, 70. 2007
- A globally optimal k-anonymity method for the de-identification of health dataKhaled El Emam
CHEO Research Institute, 401 Smyth Road, Ott, ON K1H8L1, Canada
J Am Med Inform Assoc 16:670-82. 2009..Often legislative requirements to obtain consent are waived if the information collected or disclosed is de-identified...
- Evaluating re-identification risks with respect to the HIPAA privacy ruleKathleen Benitez
Department of Biomedical Informatics, School of Medicine, Vanderbilt University, Nashville, Tennessee 37203, USA
J Am Med Inform Assoc 17:169-77. 2010....
- Statutory basis for public health reporting beyond specific diseasesClaire V Broome
Centers for Disease Control and Prevention, Department of Health and Human Services, Atlanta, GA 30333, USA
J Urban Health 80:i14-22. 2003..The intent of these reporting laws and the Health Insurance Portability and Accountability Act Privacy Rule is to support this critical disease surveillance function for the benefit of the entire population...
- Experiences of physicians who frequently use e-mail with patientsThomas K Houston
Department of Medicine, The Johns Hopkins University School of Medicine, Johns Hopkins University School of Hygiene and Public Health, Baltimore, MD 21205, USA
Health Commun 15:515-25. 2003..Increasing integration into practice to enhance time-saving aspects and improve patient education might lead to more sustained use of this promising communication tool...
- Increasing the acceptability of HIV counseling and testing with three C's: convenience, confidentiality and credibilityNicole Angotti
University of Texas at Austin, TX, USA
Soc Sci Med 68:2263-70. 2009..Our study suggests that attention to these factors in VCT strategies may mitigate the fear of HIV testing, and ultimately increase uptake in rural African settings...
- Sharing medical data for health research: the early personal health record experienceElissa R Weitzman
Department of Pediatrics, Harvard Medical School, Boston, United States
J Med Internet Res 12:e14. 2010..Understanding consumer willingness to share data is critical to advancing this model...
- The MITRE Identification Scrubber Toolkit: design, training, and assessmentJohn Aberdeen
The MITRE Corporation, 202 Burlington Rd, Bedford, MA 01730, United States
Int J Med Inform 79:849-59. 2010....
- Protecting privacy using k-anonymityKhaled El Emam
Children s Hospital of Eastern Ontario Research Institute, Ottawa, Ontario K1J 8L1, Canada
J Am Med Inform Assoc 15:627-37. 2008..To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets...
- A model for expanded public health reporting in the context of HIPAASoumitra Sengupta
Department of Biomedical Informatics, Columbia University, New York, NY, USA
J Am Med Inform Assoc 15:569-74. 2008..The appropriateness of these approaches varies with the definition of what data may be included, the requirements of the minimum necessary standard, the accounting of disclosures, and the feasibility of the approach...
- How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systemsBradley Malin
Data Privacy Laboratory, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213 3890, USA
J Biomed Inform 37:179-92. 2004..We propose that such techniques can be applied as system tests of privacy protection capabilities...
- Ethics. Identifiability in genomic researchWilliam W Lowrance
Science 317:600-2. 2007
- Attitudes to voluntary counselling and testing for HIV among pregnant women in rural south-west UgandaR Pool
Medical Research Council Programme on AIDS in Uganda, Entebbe, Uganda
AIDS Care 13:605-15. 2001..They were anxious, however, about confidentiality, and there was a widespread fear that maternity staff might refuse to assist them when the time came to ..
- Alternatives to project-specific consent for access to personal information for health research: what is the opinion of the Canadian public?Donald J Willison
Centre for Evaluation of Medicines, St Joseph s Healthcare, 105 Main Street East, P1, Hamilton, Ontario, Canada
J Am Med Inform Assoc 14:706-12. 2007..This study sought to determine public opinion on alternatives to project-specific consent for use of their personal information for health research...
- Consent, confidentiality, and the Data Protection ActAmy Iversen
King's Centre for Military Health Research, King's College London, Institute of Psychiatry, London
BMJ 332:165-9. 2006
- Alternatives to project-specific consent for access to personal information for health research: insights from a public dialogueDonald J Willison
Department of Clinical Epidemiology and Biostatistics, McMaster University, Hamilton, Canada
BMC Med Ethics 9:18. 2008..We sought to elicit public values in this matter and to work toward an agreement about a common approach to consent for use of personal information for health research through deliberative public dialogues...
- A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registersTim Churches
Centre for Epidemiology and Research, New South Wales Department of Health, Locked Mail Bag 961, North Sydney NSW 2059, Australia
BMC Med Res Methodol 3:1. 2003..However, growing concern over the privacy and confidentiality aspects of disease registers may hinder their future operation...
- A defense of unqualified medical confidentialityKenneth Kipnis
University of Hawaii, Manoa, USA
Am J Bioeth 6:7-18. 2006It is broadly held that confidentiality may be breached when doing so can avert grave harm to a third party. This essay challenges the conventional wisdom...
- Distributed data processing for public health surveillanceRoss Lazarus
Channing Laboratory, Department of Medicine, Brigham and Women s Hospital and Harvard Medical School, Boston, MA, USA
BMC Public Health 6:235. 2006....
- Confidentiality issues for medical data minersJules J Berman
Pathology Informatics Cancer Diagnosis Program, DCTD, NCI, NIH, EPN Room 6028, 6130 Executive Building, Rockville, MD 20892, USA
Artif Intell Med 26:25-36. 2002The first task in any medical data mining effort is ensuring patient confidentiality. In the past, most data mining efforts ensured confidentiality by the dubious policy of withholding their raw data from colleagues and the public...
- The next step in health data exchanges: trust and privacy in exchange networksSteve D Gravely
Troutman Sanders LLP, Richmond, VA, USA
J Healthc Inf Manag 23:33-7. 2009..The evolving model for data exchange agreements is a multi-party trust agreement. This article will examine the crucial components of a multi-party trust agreement...
- Content of weblogs written by health professionalsTara Lagu
Robert Wood Johnson Clinical Scholars Program, University of Pennsylvania, Philadelphia, PA 19104, USA
J Gen Intern Med 23:1642-6. 2008..Medical weblogs ("blogs") have emerged as a new connection between health professionals and the public...
- Should confidentiality in medicine be absolute?John Balint
Alden March Bioethics Institute, Albany Medical College, USA
Am J Bioeth 6:19-20; discussion W32-4. 2006
- Medical information, confidentiality and a child's right to privacyJoan Loughrey
University of Central Lancashire, UK
Leg Stud (Soc Leg Scholars) 23:510-35. 2003Following the Gillick case in 1986, it was recognised that mature minors were owed a duty of confidentiality in respect of their medical information...
- Health information privacy and public healthJames G Hodge
Georgetown University Law Center, USA
J Law Med Ethics 31:663-71. 2003
- "Opt-out" testing for HIV in Africa: a cautionJoanne Csete
Lancet 363:493-4. 2004
- Limits of confidentiality: Disclosure of HIV seropositivityJames W Jones
Center for Medical Ethics and Health Policy, Baylor College of Medicine, One Baylor Plaza, Houston, TX 77030, USA
J Vasc Surg 38:1443-4. 2003
- An ethical framework for sharing patient data without consentRobert Navarro
Sapior Ltd, London, UK
Inform Prim Care 16:257-62. 2008....
- Evaluating predictors of geographic area population size cut-offs to manage re-identification riskKhaled El Emam
Children s Hospital of Eastern Ontario Research Institute, Pediatrics, Faculty of Medicine, University of Ottawa, 401 Smyth Road, Ottawa, ON K1H 8L1, Canada
J Am Med Inform Assoc 16:256-66. 2009..Our objective is to estimate the population size cut-off at which a geographic area is sufficiently large so that no data suppression or further aggregation is necessary...
- Learning from experience: privacy and the secondary use of data in health researchWilliam Lowrance
J Health Serv Res Policy 8:S1:2-7. 2003..Safeguards are an integral part of the research promise to the public, offer crucial reassurance and should be emphasised. For health services research, databases are core resources, and their stewardship must be cultivated...
- Consent revisited: points to considerBartha Maria Knoppers
Universite de Montreal Law Faculty, Centre de recherche en droit public (CRDP, Canada
Health Law Rev 13:33-8. 2005
- A data-hiding technique with authentication, integration, and confidentiality for electronic patient recordsHui Mei Chao
Department of Electrical Engineering, De Lin Institute of Technology, Taipei County, Taiwan, ROC
IEEE Trans Inf Technol Biomed 6:46-53. 2002..multiple-number base" was developed to provide capabilities of authentication, integration, and confidentiality for an electronic patient record (EPR) transmitted among hospitals through the Internet...
- Confidentiality and the telephone in family practice: a qualitative study of the views of patients, clinicians and administrative staffBrian McKinstry
Centre for Population Health Sciences, University of Edinburgh, UK
Fam Pract 26:344-50. 2009b>Confidentiality is considered a cornerstone of the medical consultation...
- Online posting of unprofessional content by medical studentsKatherine C Chretien
Medical Service, Washington DC VA Medical Center and Department of Medicine, George Washington University School of Medicine and Health Sciences, Washington, DC 20422, USA
JAMA 302:1309-15. 2009..Web 2.0 applications, such as social networking sites, are creating new challenges for medical professionalism. The scope of this problem in undergraduate medical education is not well-defined...
- Privacy versus public health: the impact of current confidentiality rulesDaniel Wartenberg
Department of Environmental and Occupational Medicine, Robert Wood Johnson Medical School, University of Medicine and Dentistry of New Jersey, Piscatawa, NJ 08854, USA
Am J Public Health 100:407-12. 2010..However, recent concerns about identify theft, confidentiality, and patient privacy have led to increasingly restrictive policies on data access, often preventing ..
- The effect of the new federal medical-privacy rule on researchJennifer Kulynych
Association of American Medical Colleges, Washington, DC 20037, USA
N Engl J Med 346:201-4. 2002
- Confidentiality preserving audits of electronic medical record accessBradley Malin
Department of Biomedical Informatics, School of Medicine, Vanderbilt University, Nashville, TN 37232, United States
Stud Health Technol Inform 129:320-4. 2007..We motivate the protocol in a real world medical center and then generalize the protocol for implementation in existing healthcare environments...
- A secure protocol for protecting the identity of providers when disclosing data for disease surveillanceKhaled El Emam
Children s Hospital of Eastern Ontario Research Institute, Ottawa, Ontario, Canada
J Am Med Inform Assoc 18:212-7. 2011Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality has been an important driver of this reluctance.
- 'Confidentiality smokescreens' and carers for people with mental health problems: the perspectives of professionalsBen Gray
All Wales Alliance for Research and Development in Health and Social Care, Institute of Medical and Social Care Research, University of Wales, Bangor, Wales
Health Soc Care Community 16:378-87. 2008..sharing between professionals and carers has failed to deal with the practical dilemmas of patient confidentiality. Professional codes and training neither explore nor develop the moral and ethical ground that stands between ..
- Security in health-care information systems--current trendsE Smith
Rand Afrikaans University, Department of Computer Science, Auckland Park, South Africa
Int J Med Inform 54:39-54. 1999..computerised health-care information systems should, therefore, guarantee adequate protection of the confidentiality and integrity of patient information...
- Consent for use of personal information for health research: do people with potentially stigmatizing health conditions and the general public differ in their opinions?Donald J Willison
Department of Clinical Epidemiology and Biostatistics, McMaster University, Hamilton, Ontario, Canada
BMC Med Ethics 10:10. 2009..Little is known about the opinion of those who have more or less stigmatizing health conditions regarding the need for consent for use of their personal information for health research...
- Sleeping better at night: investigators' experiences with certificates of confidentialityLeslie E Wolf
IRB 28:1-7. 2006
- Challenging themes in American health information privacy and the public's health: historical and modern assessmentsJames G Hodge
Johns Hopkins Bloomberg School of Public Health, USA
J Law Med Ethics 32:670-9. 2004
- Medical ethics in surgical wards: knowledge, attitude and practice of surgical team members in KarachiB Shiraz
Department of Surgery, Ziauddin Medical University Hospital, 169 B, Block 3, PECHS, Karachi, Pakistan
Indian J Med Ethics 2:94-6. 2005..Forty-two respondents gave correct answers on questions of confidentiality and knowledge of law pertaining to trauma victims. Only 11 reported having been taught ethics as students...
- Health-information altruists--a potentially critical resourceIsaac S Kohane
Department of Pediatrics, Children's Hospital and Harvard Medical School, Boston, USA
N Engl J Med 353:2074-7. 2005
- Threats to privacy protectionCarol Isaacson Barash
Science 318:913-4. 2007
- Ethics and SARS: lessons from TorontoPeter A Singer
University of Toronto Joint Centre for Bioethics, 88 College St, Toronto, Canada M5G 1L4
BMJ 327:1342-4. 2003
- Inferential genotyping of Y chromosomes in Latter-Day Saints founders and comparison to Utah samples in the HapMap projectJane Gitschier
Department of Medicine and Pediatrics and Institute for Human Genetics, University of California, San Francisco, CA 94143, USA
Am J Hum Genet 84:251-8. 2009....
- Health information, the HIPAA privacy rule, and health care: what do physicians think?Julia Slutsman
National Cancer Institute in Bethesda, Maryland, USA
Health Aff (Millwood) 24:832-42. 2005..The policy implications of the findings are discussed...
- From Hippocrates to HIPAA: privacy and confidentiality in emergency medicine--Part I: conceptual, moral, and legal foundationsJohn C Moskop
Department of Medical Humanities, The Brody School of Medicine at East Carolina University, Bioethics Center, University Health Systems of Eastern Carolina, Greenville, NC 27834, USA
Ann Emerg Med 45:53-9. 2005Respect for patient privacy and confidentiality is an ancient and a contemporary professional responsibility of physicians...
- Research on medical records without informed consentFranklin G Miller
Department of Bioethics, National Institutes of Health, USA
J Law Med Ethics 36:560-6. 2008..This article analyzes the scope of these norms and provides an ethical justification for research using personally identifiable medical information without consent...
- Developing a standard for de-identifying electronic patient records written in Swedish: precision, recall and F-measure in a manual and computerized annotation trialSumithra Velupillai
Department of Computer and Systems Sciences, Stockholm University KTH, Kista, Sweden
Int J Med Inform 78:e19-26. 2009..Therefore, methods for de-identifying EPRs are needed. The work presented here aims to perform a manual and automatic Protected Health Information (PHI)-annotation trial for EPRs written in Swedish...
- Confidentiality, privacy, and security of genetic and genomic test information in electronic health records: points to considerAmy L McGuire
From the 1Center for Medical Ethics and Health Policy, Baylor College of Medicine, Houston, TX 77030, USA
Genet Med 10:495-9. 2008..These discussions can help guide policy that will facilitate the biological and clinical resource development to support the introduction of this information into health care...
- A software tool for removing patient identifying information from clinical documentsF Jeff Friedlin
Regenstrief Institute, Indianapolis, IN 46202, USA
J Am Med Inform Assoc 15:601-10. 2008..We conclude that MeDS successfully de-identified a wide range of medical documents from numerous sources and creates scrubbed reports that retain their interpretability, thereby maintaining their usefulness for research...
- Automated de-identification of free-text medical recordsIshna Neamatullah
Laboratory for Computational Physiology, Massachusetts Institute of Technology, Cambridge, MA 02139, USA
BMC Med Inform Decis Mak 8:32. 2008Text-based patient medical records are a vital resource in medical research. In order to preserve patient confidentiality, however, the U.S...
- Rapidly retargetable approaches to de-identification in medical recordsBen Wellner
The MITRE Corporation, Bedford, MA, USA
J Am Med Inform Assoc 14:564-73. 2007..This paper describes a successful approach to de-identification that was developed to participate in a recent AMIA-sponsored challenge evaluation...
- Patients' access to their online electronic health recordsCecilia Pyper
Bury Knowle Health Centre, Oxford, UK
J Telemed Telecare 8:103-5. 2002..After the focus groups, 11 patients changed their minds and accessed their records. We believe that patient-accessed EHRs will offer substantial benefits to patients, health professionals and the National Health Service as a whole...
- Evaluating the state-of-the-art in automatic de-identificationOzlem Uzuner
University at Albany, SUNY, Draper 114A, 135 Western Ave, Albany, NY 12222, USA
J Am Med Inform Assoc 14:550-63. 2007..However, identifying ambiguous PHI proved challenging. The performance of systems on the test data set is encouraging. Future evaluations of these systems will involve larger data sets from more heterogeneous sources...
- Giving patients access to their medical records via the internet: the PCASSO experienceDaniel Masys
Biomedical Informatics, School of Medicine, University of California, San Diego, La Jolla, California 92093 0602, USA
J Am Med Inform Assoc 9:181-91. 2002..The Patient-Centered Access to Secure Systems Online (PCASSO) project is designed to apply state-of-the-art-security to the communication of clinical information over the Internet...
- Forgone health care among U.S. adolescents: associations between risk characteristics and confidentiality concernJocelyn A Lehrer
Bixby Center for Reproductive Health Research and Policy, University of California, San Francisco, San Francisco, California, USA
J Adolesc Health 40:218-26. 2007To examine risk characteristics associated with citing confidentiality concern as a reason for forgone health care, among a sample of U.S. adolescents who reported having forgone health care they believed was necessary in the past year.
- Availability of adolescent health services and confidentiality in primary care practicesLara J Akinbami
Infant and Child Health Studies Branch, National Center for Health Statistics, Centers for Disease Control and Prevention, Hyattsville, Maryland 20782, USA
Pediatrics 111:394-401. 2003....
- So much for keeping secrets: the importance of considering patients' perspectives on maintaining confidentialityK Whetten-Goldstein
Sanford Institute for Public Policy and the Center for Health Policy, Law and Management, Duke University, Durham, NC, USA
AIDS Care 13:457-65. 2001Little data are available from patients' perspectives regarding the maintenance of confidentiality by care providers...
- A multidisciplinary approach to honest broker services for tissue banks and clinical data: a pragmatic and practical modelRajiv Dhir
Department of Pathology, University of Pittsburgh, UPMC Shadyside Presbyterian Hospital, Pittsburgh, Pennsylvania 15232, USA
Cancer 113:1705-15. 2008..This complex process needs resolution of a variety of issues regarding the precise role of the HB and their interaction with data. There also is an obvious need for software solutions to make the task of deidentification easier...
- The personal health recordMichael J Ackerman
High Performance Computing and Communications, National Library of Medicine, Building 38A, Room B1 n-30, 8600 Rockville Pike, Bethesda, MD 20894, USA
J Med Pract Manage 23:84-5. 2007
- The use and misuse of electronic patient dataNancy J Brent
J Infus Nurs 28:251-7. 2005..rights, briefly discusses a few of the many federal, state, and local regulatory laws protecting patient confidentiality and privacy electronically, and briefly reviews several case decisions in this area...
- Amending business associate contracts. Harmonizing privacy and security for protected health informationNilay B Patel
Care1st Health Plan, Los Angeles, CA, USA
J AHIMA 76:58-9. 2005
- Informed consent to psychotherapy: protecting the dignity and respecting the autonomy of patientsCelia B Fisher
Department of Psychology, Fordham University, Bronx, NY 10458, USA
J Clin Psychol 64:576-88. 2008..discussions of the nature and course of therapy, fees and payment policies, the involvement of third parties, confidentiality policies, and new and untested treatments...
- Multidimensional analysis: a management tool for monitoring HIPAA compliance and departmental performanceRobert M Coleman
Maine Medical Center, Portland, ME 04102, USA
J Digit Imaging 17:196-204. 2004..While additional efforts are required to fully satisfy the demands of the ever-increasing security and confidentiality pressures, multidimensional analysis tools are a practical step toward actually using the information that is ..
- HIPAA--Implications for researchJudith A Erlen
Center for Research in Chronic Disorders, School of Nursing, University of Pittsburgh, PA, USA
Orthop Nurs 24:139-42. 2005....
- Ethics in public health research: privacy and public health at risk: public health confidentiality in the digital ageJulie Myers
New York City Department of Health and Mental Hygiene, 125 Worth St, Rm 331, New York, NY 10013, USA
Am J Public Health 98:793-801. 2008..Tightened physical and electronic controls can prevent misuse of data, minimize the risk of security breaches, and help maintain the reputation and integrity of public health agencies...
- HIPAA--clinical and ethical considerations for nursesJudith A Erlen
Center for Research in Chronic Disorders, School of Nursing, and Center for Bioethics and Health Law, University of Pittsburgh, PA, USA
Orthop Nurs 23:410-3. 2004....
- Evaluating HIPAA compliance: a guide for researchers, privacy boards, and IRBsKathryn E Artnak
Angelo State University, Department of Nursing, San Angelo, TX 76909 0902, USA
Nurs Outlook 53:79-87. 2005....
- The HIPAA prescription for healthcare--why isn't it working?D Arcy Guerin Gue
Phoenix Health Systems Inc, USA
Health Manag Technol 25:34-7. 2004
- Organizing safety: conditions for successful information assurance programsJeff Collmann
Telemedicine and Advanced Technology Research Center, USAMRMC, Washington, D C, USA
Telemed J E Health 10:311-20. 2004..considering computerized health information systems, "safety" includes protecting the integrity, confidentiality, and availability of information assets such as patient information, key components of the technical ..
- Handhelds and HIPAACrissy Knox
University of Louisville Hospital, Kentucky, USA
Nurs Manage 38:38-40. 2007
- Legal protections of electronic health records: issues of consent and securityNola M Ries
University of Alberta Health Law Institute, Canada
Health Law Rev 14:18-25. 2005
- Securing genetic information. A new challenge for HIM professionalsAmber Trivedi
Northwestern Ovarian Cancer Early Detection and Prevention Program, Northwestern Memorial Hospital, Chicago, IL, USA
J AHIMA 77:56-7, 62. 2006
- The use and disclosure of protected health information for research under the HIPAA privacy rule: unrealized patient autonomy and burdensome government regulationStacey A Tovino
Health Law and Policy Institute, University of Houston Law Center, USA
S D Law Rev 49:447-502. 2004
- Part III: meeting the challenge when data sharing is requiredVirginia A de Wolf
IRB 28:10-5. 2006
- Lock it or lose it. Interview by Harris MeyerKen Schwartz
Hosp Health Netw 82:50-2. 2008
- Privacy and security for electronic health recordsVirginia A Sharpe
Veterans Health Administrations, National Center for Ethics, USA
Hastings Cent Rep 35:49. 2005
- Privacy and policy for genetic researchJudith Wagner DeCew
Department of Philosophy, Clark University, 950 Main Street, Worcester, MA 01610, USA
Ethics Inf Technol 6:5-14. 2004....
- Technology. IT gets HIPAARichard Haugh
Hosp Health Netw 80:14-5. 2006
- Development and evaluation of an open source software tool for deidentification of pathology reportsBruce A Beckwith
Department of Pathology, Beth Israel Deaconess Medical Center, 330 Brookline Ave, Boston, MA, USA
BMC Med Inform Decis Mak 6:12. 2006..1800 new pathology reports were then processed. Each report was reviewed manually before and after deidentification to catalog all identifiers and note those that were not removed...
- A review of security of electronic health recordsKhin Than Win
School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW 2522, Australia
HIM J 34:13-8. 2005..Further study regarding information security of EHRs is indicated...
- The risks of healthcare IT. Psychiatry an example of why digital records must be pursued cautiouslyJon Meyer
American Psychoanalytic Association, New York, USA
Mod Healthc 35:22. 2005
- Mobile device use, reuse, and disposalLaurie Southerton
J AHIMA 78:68-70. 2007
- Patient privacy: how far is too far?Susan M Gallagher
Ostomy Wound Manage 48:50-1. 2002..The ethical principle of patient confidentiality, including the right to personal privacy, is reviewed along with its relationship to computer-generated wound ..
- A HIPAA strategy for dental schoolsRosemary Walker
University of Illinois at Chicago, College of Applied Health Sciences, School of Biomedical and Health Information Sciences, 60612 7249, USA
J Dent Educ 66:624-33. 2002..The second stage selects the applicable HIPAA requirements, determines the current states of confidentiality and security, manages the electronic transactions standards, and composes a gap analysis...
- The informatics nurse specialist as privacy officerNancy P Malloy
Washington Adventist Hospital, Takoma Park, Maryland, USA
J Healthc Inf Manag 17:54-8. 2003....
- EMR confidentiality and information securityGary Kurtz
Geisinger Health System, Danville, PA, USA
J Healthc Inf Manag 17:41-8. 2003..The onus is on healthcare providers to come up with information security solutions that don't hinder patient care while still providing the confidentiality of patient information.
- Not-so-strange bedfellows. Why HIM, IT are becoming fast friendsRuth Carol
J AHIMA 74:20-3. 2003
- No privacy for all? Serious failings in the HHS medical records regulationsRichard Sobel
Program in Psychiatry and the Law, Harvard Medical School, USA
J Biolaw Bus 5:45-8. 2002..Though these "privacy rules" are supposed to protect patient confidentiality, what has gone unmentioned are the regulations' major lapses that breach informed consent and confidentiality...
- Institutional review boards and the privacy of human research subjectsDennis M Maloney
The Deem Corporation, P.O. Box 44069, Omaha, NE 68144, USA
Hum Res Rep 17:1-2. 2002
- Beyond HIPAA: the complexities of electronic record managementRandolph A Kahn
J AHIMA 74:31-6; quiz 37-8. 2003..Learn how to protect your facility while preserving record integrity...
- Medical privacy and researchN M Bradburn
Harris Graduate School of Public Policy Studies, University of Chicago, USA
J Legal Stud 30:687-701. 2001....
- What should IRBs consider when applying the privacy rule to research?Julie Waltz Gerlach
Medpace, Inc, Cincinnati, OH, USA
Kennedy Inst Ethics J 12:299-303. 2002
- The emergence of the Healthcare Information TrustPaul T Kostyack
Jones, Day, Reavis and Pogue, Cleveland, OH, USA
Health Matrix Clevel 12:393-447. 2002
- Health Insurance Portability and Accountability Act (HIPAA). Implications for dental practiceSatishchandra S Pai
Columbia University School of Dental and Oral Surgery, New York, NY, USA
Dent Today 21:106-11; quiz 111, 178. 2002
- HIPAA strengthens business case for electronic report distribution systemsMark Moody
J Healthc Inf Manag 16:47-51. 2002..HIPAA may finally force healthcare organizations to make long-postponed decisions to increase the use of automation and technology for report distribution. For most, the direct benefits will far outweigh the costs...
- STRUCTURE-BASED TUBERCULOSIS DRUG DESIGN TARGETED AT ACYL-COA CARBOXYLASEShiou Chuan Tsai; Fiscal Year: 2010..PERFORMANCE SITE(S) (organization, city, state) University of California, Irvine, CA 92697, USA REVISED ABSTRACT SECTION ..
- GRADUATE TRAINING IN GENETICSMichael Bender; Fiscal Year: 2006..Kathehne R.' Type the name of the program director at the top of each printed page and each continuation page. (For type specifications, see instructions on page 6.) INSTITUTIONAL NATIONAL RESEARCH SERVICE AWARD ..
- Rural Trial of Clinic Order Entry with Decision SupportMatthew Samore; Fiscal Year: 2006..will allow common access to records across providers who share patients while maintaining strict levels of confidentiality. The CCOE decision support logic will encompass drug interactions, allergy contraindications, disease ..
- Novel Corneal Implant MaterialsShiao Chang; Fiscal Year: 2006..The name of the principal investigator/program director must be provided at the top of each printed page and each continuation page. RESEARCH GRANT ..
- Integrated Samples of Eurasian CensusesROBERT EDWARD MCCAA; Fiscal Year: 2010..This work involved data cleaning, drawing samples, implementing confidentiality protections, creating integrated variables, developing comprehensive metadata, and disseminating the data and ..
- TRAINING PROGRAM IN GENETICS AND GENOMICSWilliam Gelbart; Fiscal Year: 2006..Type the name of the program director at the top of each printed page and each continuation page. (For type specifications, see instructions on page 6.) INSTITUTIONAL NATIONAL RESEARCH SERVICE AWARD (Substitute Page) ..
- AIDS Stigma & Gender: Health Consequences in Urban IndiaMaria Ekstrand; Fiscal Year: 2006..additional charges for protective equipment such as extra gloves, masks, fumigation of rooms, and lack of confidentiality. The data also suggest that AIDS stigma in urban India is a gendered phenomenon...
- Congenital and neonatal malaria in MaliAbdoulaye Djimde; Fiscal Year: 2006..research grant ..
- ISLET-CELL RESOURCES CTR OF SOUTHERN CALIFORNIAARTHUR RIGGS; Fiscal Year: 2006..4/98) Page 2 BB Number pages consecutively at the bottom throughout the application. Do not use suffixes such as 3a, 3b. ..
- The Sexual Abuse of Vulnerable Adults in InstitutionsPamela Teaster; Fiscal Year: 2006..abstract_text> ..
- Internet as Supplier: Preventing Adolescent Use of Non-Medical Addictive RxAmelia Arria; Fiscal Year: 2009..The data collection has been designed to completely protect confidentiality. The study has three primary aims: 1...
- RESEARCH TRAINING IN DIGESTIVE DISEASESDaniel Podolsky; Fiscal Year: 2006..Type the name of the program director at thd^Hof each printed page and each continuation page.^Hr type specifications, see instructions on page 6.) INSTITUTIONAL NATIONAL RESEARCH SERVICE AWARD (Substitute Page) ..
- Nanoscale patterning that promotes cell adhesionHEATHER MAYNARD; Fiscal Year: 2006..research grant ..