Institute: ONC | Component: 2 | Unit: 9 | Lecture: a | Slide: 24
Institute:Office of National Coordinator (ONC) Workforce Training Curriculum
Component:The Culture of Health Care
Unit:Privacy, Confidentiality, and Security
Lecture:Definitions of privacy, confidentiality, and security
Slide content:Privacy, Confidentiality, and Security References Lecture a Continued Conn, J. (2016, February 17). Hospital pays hackers $17,000 to unlock EHRs frozen in ransomware attack. Modern Healthcare . Retrieved from http://www.modernhealthcare.com/article/20160217/ NEWS/160219920 Detmer , D. (2010). Activating a full architectural model: Improving health through robust population health records. Journal of the American Medical Informatics Association , 17, 367369. El Emam , K., Neri , E., & Jonker , E. (2007). An evaluation of personal health information remnants in second-hand personal computer disk drives. Journal of Medical Internet Research , 9 (3), e24. El Emam , K., Neri , E., Jonker , E., Sokolova , M., Peyton, L., Neisa , A., & Scassa , T. (2010). The inadvertent disclosure of personal health information through peer-to-peer file sharing programs. Journal of the American Medical Informatics Association , 17, 148158. European Commission. (2016, February 29). European Commission unveils EU-U.S. privacy shield. Retrieved from http://ec.europa.eu/justice/newsroom/data-protection/news/160229_en.htm European Commission. (2016, March 23). Protection of personal data. Retrieved from http://ec.europa.eu/justice/data-protection/index_en.htm Gostin , L., & Hodge, J. (2002). Personal privacy and common goods: a framework for balancing under the national health information privacy rule. Minnesota Law Review , 86, 14391479. Retrieved from http://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=1086&context=facpub Hall, M., & Schulman, K. (2009). Ownership of medical information. JAMA , 301, 12821284. Retrieved from http:// jamanetwork.com/journals/jama/article-abstract/183601 24
Slide notes:No audio. 24