Analysis of Information Security of Health Record Systems – Term Paper Example

Download full paperFile format: .doc, available for editing

The paper "Analysis of Information Security of Health Record Systems " is an excellent example of a term paper on information technology. With the introduction of technology in the healthcare sector, confidentiality, consent, and privacy have been a major concern to individuals. Through the introduction of technology, it has been easy for medical institutions to easily store and retrieve patient’ s data (Lemaire et al 2006, pp. 216). Using electronic health records (EHR), it has been easy to increase efficiency and accessibility while reducing threats in accessing patient’ s data. The thesis statement that is going to guide us through this report is: Are current information security technologies adequate for electronic health records?   To cover this report we are going to take a look at the importance of these technologies how applicable they are in medical institutions and if there are any recommendations that should be kept to ensure security and confidentiality of a patient's records. Background Consent, Privacy, and Confidentiality are key principles observed by medical professionals in the recording of medical data, and in this case, we are going to take a deeper look at the definition of each of the terms.

Consent is classified into two broad terms: the ethical dimension and the legal dimension. Consent has been emphasized for many years in medical institutions as a health policy as it strengthens the relationship between health professionals and the public. It, therefore, gives individuals the right to decide on the actions they would like taken by the professionals while treating them as consent emphasizes on individual information (Win and Fulcher 2007, pp. 94). Consent takes an ethical dimension when any consequence or alternative of a medical procedure is to be communicated first to an individual.

The law also recognizes that consent is applicable by all regulatory bodies in the processing of individual medical data. This has been supported by various Acts in the United Kingdom government that promotes human rights and data protection. This human rights act supports the rights to respect an individual‘ s privacy using eight principles summarised that personal data should be made lawfully and fairly and there should be a lawful reason why individual data should be retrieved from the data banks.

Consent as applicable in electronic data involves auditing purposes of patient’ s records.    


Beebe, T.J, Ziegenfuss,J.Y, Jenkins, S.M, Haa, L.R, Davern, M.E. 2011, Who Doesn’t Authorize the Linking of Survey and Administrative Health Data? A General Population-based Investigation, Ann Epidemiol, vol.21, no.19, pp.706-9.

Bergmann J,. Bott, O.J Pretschner, D P. Haux R. 2007, An e-consent-based shared EHR system architecture for integrated healthcare networks, international journal of medical informatics, vol.7, no. 6, pp. 130–136.

Civelek, C 2009, Patient safety and privacy in the electronic health information era: Medical and beyond, Clinical Biochemistry, vol. 42, pp. 298–299

Clark, A. M., Findlay, L.N 2005 Attaining adequate consent for the use of electronic patient records: An opt-out strategy to reconcile individuals’ rights and public benefit, Public Health, vol. 119, pp. 1003–1010.

Elahi, E 2009 Privacy and consent in the digital era, Information security technical report, vol. 14 pp. 113–118.

Flores, A.E., Win, K.T & Susilo, W 2011, Secure Exchange of Electronic Health Records, In: Chryssanthou, A., Apostolakis, I., Varlamis, I., Susilo, C.R ed, Certification and Security in Health-Related: Web Applications: Concepts and Solutions, Hershey , New York, pp.17.

Lemaire, E. D., Deforge, D., Marshall, S & Curran, D 2006 A secure web-based approach for accessing transitional health information for people with traumatic brain injury, Computer methods and programs in biomedicine, vol. 81 PP. 213–219.

O’Brien, D.G.,William A., & Yasnoff, M.D. 1999, Privacy, Confidentiality, and Security in Information Systems of State Health Agencies, American Journal of Preventive Medicine 1999; vol. 16, no.4. pp. 749

Ohno-Machadoa, L., Sérgio, P., Silveirab, P., & Vinterbo, S. 2004, Protecting patient privacy by quantifiable control of disclosures in disseminated databases, International Journal of Medical Informatics (2004) 73, 599—606.

Perera, G., Holbrook, A., Thabane, L., Foster. & Willison, D.J 2011 Views on health information sharing and privacy from primary care practices using electronic medical records. International journal of Medical Information, vol. 80 pp. 94-101.

Porteri, C, & Borry, P 2008, A proposal for a model of informed consent for the collection,

Storage and use of biological materials for research purposes, Patient Education and Counseling vol.71, pp. 136–142.

Street, A.F& Love, A 2005 Dimensions of privacy in palliative care: views of health professionals, Social Science & Medicine, vol. 60 pp. 1795–1804.

Susilo, W., & Win K.T 2007, Securing Personal Health Information in Mobile, International Journal of Mobile Communication, vol.5, no.2, pp 215-224.

Whiddett, R., Hunter, I., Engelbrecht, J. & Handy, J 2006 Patients’ attitudes towards sharing their health information, International Journal of Medical Informatics, vol. 75 pp. 530—541.

Willison, D. Schwartz, L., Abelson, J. , Charles, C., Swinton, Northrup, D. & Thabane, L 2007, Alternatives to Project-specific Consent for Access to Personal Information for Health Research: What Is the Opinion of the Canadian Public?, J Am Med Inform Assoc. 2007 , vol.14, no.6, pp 706–712.

Win, K.T 2005, A review of security of electronic health records, Health Information Management Journal, Vol.34, No.1,pp. 13.

Win, K.T. & Fulcher, J.A 2007 Consent Mechanisms for Electronic Health Record Systems: A Simple yet Unresolved Issue, J Med System, Vol. 31, pp. 91–96.

Download full paperFile format: .doc, available for editing
Contact Us