Public Trust and Privacy in Shared Electronic Health Records

2007 ◽  
Vol 14 (2) ◽  
pp. 105-112 ◽  
Author(s):  
Elisabeth Rynning

AbstractThe development of information and communication technology in health care, also called eHealth, is expected to improve patient safety and facilitate more efficient use of limited resources. The introduction of electronic health records (EHRs) can make possible immediate, even automatic transfer of patient data, for health care as well as other purposes, across any kind of institutional, regional or national border. Data can thus be shared and used more effectively for quality assurance, disease surveillance, public health monitoring and research. eHealth may also facilitate patient access to health information and medical treatment, and is seen as an effective tool for patient empowerment. At the same time, eHealth solutions may jeopardize both patient safety and patients' rights, unless carefully designed and used with discretion. The success of EHR systems will depend on public trust in their compatibility with fundamental rights, such as privacy and confidentiality. Shared European EHR systems require interoperability not only with regard to technological and semantic standards, but also concerning legal, social and cultural aspects. Since the area of privacy and medical confidentiality is far from harmonized across Europe, we are faced with a diversity that will make fully shared EHR systems a considerable challenge.

2012 ◽  
Vol 10 (2) ◽  
pp. 132-133
Author(s):  
B Devkota ◽  
J Buerck

Patient safety should be at the core of health care delivery. The main motto of the health care industry is to help the people in fighting illness using safe products. We have seen news headlines about recalls because of faulty products that result in harm to the user; these have occurred not only in the pharmaceutical industry but also in the device industry. Harm may be accrued from mislabeling, defective parts and/or defective ingredients. The question is how to remedy the situation once the product has been in wide circulation perhaps not just in one country but across the globe. Many times we have experienced hardships due to the recall of consumer goods such as cars, refrigerators, toys, etc. Recalls due to safety concerns should be implemented immediately, otherwise potential harm from product use will result in the injury or death of the users. Electronic health records (EHR) will help immediately track down the patients using defective products (in this case, medical devices or drugs). It will thus help save lives by early notification to the users of these potentially harmful products.DOI: http://dx.doi.org/10.3126/hren.v10i2.6581 Health Renaissance 2012; Vol 10 (No.2); 132-133 


2015 ◽  
Vol 24 (3) ◽  
pp. 227-241 ◽  
Author(s):  
Timothy Stablein ◽  
Joseph Lorenzo Hall ◽  
Chauna Pervis ◽  
Denise L. Anthony

Author(s):  
Claire M. Campbell ◽  
Daniel R. Murphy ◽  
George E. Taffet ◽  
Anita B. Major ◽  
Christine S. Ritchie ◽  
...  

2012 ◽  
pp. 1403-1424
Author(s):  
Alejandro Enrique Flores ◽  
Khin Than Win ◽  
Willy Susilo

Protecting the confidentiality of a patient’s information in a shared care environment could become a complex task. Correct identification of users, assigning of access permissions, and resolution of conflict rise as main points of interest in providing solutions for data exchange among health care providers. Traditional approaches such as Mandatory Access Control, Discretionary Access control and Role-Based Access Control policies do not always provide a suitable solution for health care settings, especially for shared care environments. The core of this contribution consists in the description of an approach which uses attribute-based encryption to protect the confidentiality of patients’ information during the exchange of electronic health records among healthcare providers. Attribute-based encryption allows the reinforcing of access policies and reduces the risk of unauthorized access to sensitive information; it also provides a set of functionalities which are described using a case study. Attribute-based encryption provides an answer to restrictions presented by traditional approaches and facilitate the reinforcing of existing security policies over the transmitted data.


Sign in / Sign up

Export Citation Format

Share Document