Abstract
The issue of privacy is difficult. The individual has the inherent right to control personal information. However, in order to provide the best possible care and service to the individual, public and private organizations must know some of that information. The issue is further complicated because “privacy” has not been defined in a way that is widely and generally accepted. Whieldon (1979) suggested, however, that the concept of “invasion of privacy” is generally recognized as an intrusion upon the private and personal life of an individual. Actions such as collecting and storing unnecessary personal data, disclosing data to individuals or organizations that do not have a genuine need for it, or using private information for something other than the original purpose could be considered intrusive.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
American Hospital Association. 1976. A patient’s bill of rights. Nursing Outlook 24(1): 29.
Canadian Organization for the Advancement of Computers in Health (COACH). 1979. Guidelines to Promote the Confidentiality and Security of Automated Health Records Edmonton, Canada: COACH.
Covvey, H. D. 1981. The recommendations of a Canadian Royal Commission relating to computer—based health record keeping. Proceedings, The Fifth Annual Symposium on Computer Applications in Medical Care. Washington, D.C. (November).
Creighton, H. 1978. Diminishing right of privacy: Computerized medical records. Supervisor Nurse (February): 58–61.
Dotto, L. 1980 “Ethics float in muddy waters” Computer Data 39: 41–43.
Hiller, M., and Beyda, V. 1981. Computers, medical records and the right to privacy. Journal of Health, Policy and Law 6(3): 463–487.
International Business Machines (IBM) Corp. 1974. Data Scrutiny and Data Processing, vol. 1, Introduction and Overview New York: IBM.
Organization for Economic Cooperation and Development (OECD). 1979. Draft Recommendations of the Council concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data Paris: OECD.
Privacy Protection Study Commission. 1977. Personal Privacy in an Information Society Washington, D.C.: U.S. Government Printing Office.
Royal Canadian Mounted Police. 1979. “Security in the EDT environment.” Security Information Publications (January).
Westin, A. 1976. Computers, Health Records, and Citizen Rights Washington, D.C: U.S. Government Printing Office.
Westin, A. 1979. The impact of computers on privacy. Datamation, 25 (12): 190, 192–194.
Whieldon, D. 1979. “How much will privacy cost?” Computer Decisions (August): 54–56.
Bibliography
Bakker, A.R. & Scholes, M. (1988). Data protection and nursing: A technical and organizational challenge. In Daly, N. & Hannah, K.J.(eds.). Proceedings of Nursing and Computers: Third International Symposium on Nursing Use of Computers and Information Science Toronto: The C.V. Mosby Company, 94–102.
Gruending, D.L. & MacKay, D.C. (1988). The computerized patient record: Legal, ethical and confidentiality issues. In Daly, N. & Hannah, K.J. (eds.). Proceedings of Nursing and Computers: Third International Symposium on Nursing Use of Computers and Information Science Toronto: The C.V. Mosby Company, 343–352.
Huesing, S. (1983). Security and confidentiality are everyone’s business. Dimensions in Health Service May; 60(5): 26.
Iversen, I. (1988). Data protection as to medical records and nursing care plans. In Daly, N. & Hannah, K.J. (eds.). Proceedings of Nursing and Computers: Third International Symposium on Nursing Use of Computers and Information Science Toronto: The C.V. Mosby Company, 14–16.
Peterson, H.E. & Gerdin Jelger, U. (1988). Patient and staff integrity in a computerized environment. In Daly, N. & Hannah, K.J. (eds.). Proceedings of Nursing and Computers: Third International Symposium on Nursing Use of Computers and Information Science Toronto: The C.V.Mosby Company, 726–729.
Pluyter-Wenting, E.S.P., Bakker, A.R. & Louwerse, C.P. (1991). Data protection in nursing informatics: Balancing privacy aspects and shared use. In Hovenga, E.J.S., Hannah, K.J., McCormick, K.A., & Ronald, J.S. (eds.). Proceedings of the Fourth International Conference on Nursing Use of Computers and Information Science New York: Springer-Verlag, 68–76.
Romano, C.A. (1987). Privacy, confidentiality, and security of computerized systems: The nursing responsibility May-June; 5(3): 99–104.
Simpson, R..L. (1991). Securing your system from hackers and other hazards. Nursing Management March; 22(3): 25–26.
Vandermeulen, H. (1988). Data protection. In Daly, N. & Hannah, K.J. (eds.). Proceedings of Nursing and Computers: Third International Symposium on Nursing Use of Computers and Information Science Toronto: The C.V. Mosby Company, 2–13.
Wolfe, K. (1990). Confidentiality and common sense. AAOHN Journal July; 38(7): 338–340.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1994 Springer Science+Business Media New York
About this chapter
Cite this chapter
Hannah, K.J., Ball, M.J., Edwards, M.J.A. (1994). Confidentiality. In: Introduction to Nursing Informatics. Computers in Health Care. Springer, New York, NY. https://doi.org/10.1007/978-1-4757-2246-8_11
Download citation
DOI: https://doi.org/10.1007/978-1-4757-2246-8_11
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4757-2248-2
Online ISBN: 978-1-4757-2246-8
eBook Packages: Springer Book Archive