Privacy and computerized medical records. 1995

R C Williams

There are strong incentives to computerize medical records in the present health care environment, yet medical information is frequently personal and is protected by privacy law and by centuries of a tradition of confidentiality. It is not possible to eliminate all risk of inappropriate disclosure and use of medical information, either in a paper or an electronic system. Computerization of records increases the potential for abuse, but with appropriate attention to security measures, medical data can be made reasonably secure while preserving accessibility for those who truly need the information. Both for technical and legal reasons, paper records are still necessary in 1995, to back up electronic medical databases.

UI MeSH Term Description Entries
D003219 Confidentiality The privacy of information and its protection against unauthorized disclosure. Patient Data Privacy,Privacy of Patient Data,Privileged Communication,Confidential Information,Secrecy,Communication, Privileged,Communications, Privileged,Data Privacy, Patient,Information, Confidential,Privacy, Patient Data,Privileged Communications
D006801 Humans Members of the species Homo sapiens. Homo sapiens,Man (Taxonomy),Human,Man, Modern,Modern Man
D016347 Medical Records Systems, Computerized Computer-based systems for input, storage, display, retrieval, and printing of information contained in a patient's medical record. Automated Medical Records Systems,Computerized Medical Records Systems,Automated Medical Record System,Automated Medical Record Systems,Automated Medical Records System,Computerized Medical Record System,Computerized Medical Record Systems,Computerized Medical Records System,Computerized Patient Medical Records,Medical Record System, Automated,Medical Record System, Computerized,Medical Record Systems, Automated,Medical Record Systems, Computerized,Medical Records System, Automated,Medical Records System, Computerized,Medical Records Systems, Automated
D016494 Computer Security Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. Computer Viruses,Data Protection,Data Security,Compromising of Data,Computer Hackers,Computer Worms,Cyber Security,Cybersecurity,Data Encryption,Information Protection,Computer Hacker,Computer Virus,Computer Worm,Data Compromising,Data Encryptions,Encryption, Data,Encryptions, Data,Hacker, Computer,Hackers, Computer,Protection, Data,Protection, Information,Security, Computer,Security, Cyber,Security, Data,Virus, Computer,Viruses, Computer,Worm, Computer,Worms, Computer

Related Publications

R C Williams
February 1992, Contemporary longterm care,
R C Williams
June 2002, Hawaii medical journal,
R C Williams
October 1993, Healthcare informatics : the business magazine for information and communication systems,
R C Williams
April 1998, The New England journal of medicine,
R C Williams
April 1998, The New England journal of medicine,
R C Williams
April 1998, The New England journal of medicine,
R C Williams
April 1998, The New England journal of medicine,
R C Williams
November 1980, The Record of the Association of the Bar of the City of New York,
R C Williams
September 1978, Congressional record : proceedings and debates of the ... Congress. United States. Congress,
Copied contents to your clipboard!