Institute: ONC | Component: 2 | Unit: 9 | Lecture: a | Slide: 27
Institute:Office of National Coordinator (ONC) Workforce Training Curriculum
Component:The Culture of Health Care
Unit:Privacy, Confidentiality, and Security
Lecture:Definitions of privacy, confidentiality, and security
Slide content:Privacy, Confidentiality, and Security References Lecture a Continued 4 Pritts , J., & Connor, K. (2007). The implementation of e-consent mechanisms in three countries: Canada, England, and the Netherlands. Washington, DC: Substance Abuse and Mental Health Services Administration. Retrieved from http://ihcrp.georgetown.edu/pdfs/prittse-consent.pdf Privacy Rights Clearinghouse. (2005). Chronology of data breaches. Retrieved from http://www.privacyrights.org/data-breach Privacy Rights Clearinghouse. (2014). Fact sheet 8c:The HIPAA privacy rule: Patients rights. Retrieved from https://www.privacyrights.org/content/hipaa-privacy-rule-patients-rights Rodwin , M. (2009). The case for public ownership of patient data. JAMA , 302, 8688. Rojas-Burke, J. (2006). Providence critics push for safer records. The Oregonian . Rothstein, M., & Talbott , M. (2006). Compelled disclosure of health information: Protecting against the greatest potential threat to privacy. JAMA , 295, 28822885. Sequoia Project. (2016). Data use and reciprocal support agreement (DURSA). Retrieved from http://sequoiaproject.org/ehealth-exchange/onboarding/dursa Sweeney, L. (1997). Guaranteeing anonymity when sharing medical data: The Datafly System. Proceedings of the 1997 AMIA Annual Fall Symposium, Nashville , TN, 5155. Sweeney, L. (2002). k-Anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems , 10 (5), 557570. TEDx Talks (2104). Designing technology to restore privacy: Deborah C. Peel, MD at TEDxTraverseCity [Video File] Retrieved from https://www.youtube.com/watch?v=f1JPjLCxPFQ 27
Slide notes:No audio. 27