Privacy concerns raised over "secondary use" of health records

Silversides, Ann
December 2009
CMAJ: Canadian Medical Association Journal;12/8/2009, Vol. 181 Issue 12, pE287
Academic Journal
The article reports on the move of health institutions in Canada to become more aware of privacy issues. It states that the increasing cases in secondary use of health care data has alarmed the institutions. According to Tom Brogan, president of Brogan Inc., combining the data is unbelievable because there are a lot of ways wherein information are entered.


Related Articles

  • Minnesota clinic suspends employees for violating privacy.  // Medicine on the Net;Sep2007, Vol. 13 Issue 9, p5 

    The article reports on the suspension of more than 100 employees at Park Nicollet Clinic in Minneapolis, Minnesota for violation of federal laws involving patient privacy. According to a local newspaper report, the employees tapped into the electronic medical records of their relatives and...

  • Breach of outpatient surgery records raises red flag--Know and protect your data.  // Same-Day Surgery;Jul2012, Vol. 36 Issue 7, p69 

    The article reports on breaches of outpatient surgery records which were seen in 2012 at St. Elizabeth’s Medical Center in Boston, Massachusetts and Emory Healthcare in Atlanta, Georgia and presents suggestions on how to avoid data breaches.

  • How to secure access to sensitive information.  // Same-Day Surgery;Jul2012, Vol. 36 Issue 7, p72 

    The article reports on the opinions that Joe Santangelo of the data security firm Axis Technology, Anne Adams of Emory Healthcare in Atlanta, Georgia and Mark Mayo of the Ambulatory Surgical Care Facility in Aurora, Illinois, have about security breaches and the protection of patient information...

  • DATA BREACHES: Breach Pattern: Thieves Seek X-rays for Silver Content. Goedert, Joseph // Health Data Management;Jul2013, Vol. 21 Issue 7, p14 

    The article reports on the growing incidence of data breaches as more x-ray films are being stolen for their silver content. An orthopedic clinic in North Carolina and the El Centro Regional Medical Center in California both reported similar medical breaches, which have reportedly become common...

  • SNOOPING INTO HEALTH RECORDS OFTEN UNNOTICED. Frauenheim, Ed // Workforce Management;5/19/2008, Vol. 87 Issue 9, p6 

    The article reports data breaches by University of California (UCLA) Medical Center's employees. It cites employers' concern over snooping by their own people into celebrity health records that affects the company's reputation. As per a tally of data breaches kept by the company Privacy Rights...

  • Encryption equals prevention. Watson, David // Modern Healthcare;9/23/2013, Vol. 43 Issue 38, p20 

    A letter to the editor is presented in response to the article "Advocate data breach highlights lack of encryption, a widespread issue" in August 30, 2013 issue.

  • Medicine: THE MOST-PERSONAL DATA. Rich, Spencer // National Journal;9/02/2000, Vol. 32 Issue 36, p2720 

    Focuses on the information collected by health care facilities from patients. Creation of databases of patients' information; Medical-privacy regulations proposed by the United States Health and Human Services Department; Cases of medical-privacy violations.

  • Clooney Case Puts Patient Privacy under Microscope. Gaudio, Thomas // njbiz;10/29/2007, Vol. 20 Issue 45, p1 

    The article discusses the challenge facing hospitals in New Jersey to protect patient privacy data in line with the suspension of some employees of Palisades Medical Center for breaching the medical records of film actor George Clooney. Palisades admitted Clooney and his girlfriend Sarah Larson...

  • BA 'must haves' for privacy, security.  // Healthcare Risk Management;Feb2012 Supplement, p3 

    The article discusses factors which hospitals should keep in mind when auditing or monitoring a business associate's (BA's) data security program, including policies related to handling patient health information (PHI), results of periodic risk assessments, and employee information documentation.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics