Institute: ONC | Component: 2 | Unit: 9 | Lecture: a | Slide: 25
Institute:Office of National Coordinator (ONC) Workforce Training Curriculum
Component:The Culture of Health Care
Unit:Privacy, Confidentiality, and Security
Lecture:Definitions of privacy, confidentiality, and security
Slide content:Privacy, Confidentiality, and Security References Lecture a Continued 2 HealthIT.gov. (2013). Federal-state healthcare coordination: Health information security and privacy collaboration (HISPC). Retrieved from https://www.healthit.gov/policy-researchers-implementers/health-information-security-privacy-collaboration-hispc HealthIT.gov . (2016). Your health information rights. Retrieved from https://www.healthit.gov/patients-families/your-health-information-rights HIMSS (Healthcare Information and Management Systems Society). (2015). 2015 HIMSS security survey. Retrieved from http://www.himss.org/2015-cybersecurity-survey (full report limited to members only; executive summary available free to download). Hodge, J., Gostin , L., & Jacobson, P. (1999). Legal issues concerning electronic health information: Privacy, quality, and liability. JAMA , 282, 14661471. Keteyian , A. (2010, April 15). Digital photocopiers loaded with secrets. CBS News . Retrieved from http://www.cbsnews.com/stories/2010/04/19/eveningnews/main6412439.shtml Kutscher, B. (2016, March 3). Healthcare underspends on cybersecurity as attacks accelerate. Modern Healthcare . Retrieved from http://www.modernhealthcare.com/article/20160303/NEWS/ 160309922/healthcare-underspends-on-cybersecurity-as-attacks-accelerate Lee, C., & Goldfarb, Z. (2006, June 30). Stolen VA laptop and hard drive recovered. Washington Post , p. A01. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2006/06/29/ AR2006062900352.html Lumley, T., & Rice, K. (2010). Potential for revealing individual-level information in genome-wide association studies. JAMA , 303, 859860. 25
Slide notes:No audio. 25