Hassecuritysafeguardstoprevent

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: y it’s so cumbersome to use that it is virtually useless.” • “…security is too tight…I will keep on using my cable modem and PC Anywhere to get into my office computer and then access labs that way.” • “It would be wonderful when patients call me in the evenings & weekends to be able to punch up their info on my home pc and have instant access to their lab results, X­rays, medications, etc.” • “...It’s incredibly handy to have this stuff available on the Internet. Nice work.” • • • Desiderata for electronic consent Desiderata for electronic consent in healthcare E. Coiera et. al., J. Am Med Informatics Assoc, 2004 1. Permits access to health data by checking that patient consent exists for the information requests, using methods that check for explicit, inferred or implied consent 2. Should allow access to patient information to those who have been explicitly permitted by a patient Desiderata for electronic consent Desiderata for electronic consent in healthcare, cont’d E. Coiera et. al., J. Am Med Informatics Assoc, 2004 3. Should never allow access to patient information by those explicitly denied access by the patient 4. Should allow access to patient information to individuals determined to have inferred or implied consent based on their clinical roles, responsibilities, or clinical circumstance Desiderata for electronic consent Desiderata for electronic consent in healthcare, cont’d E. Coiera et. al., J. Am Med Informatics Assoc, 2004 5. Does not endanger patient safety by denying access to information by clinically approved individuals when consent is indeterminant 6. Does not impede clinical work by clinically approved individuals, when consent is indeterminant Desiderata for electronic consent Desiderata for electronic consent in healthcare, cont’d E. Coiera et. al., J. Am Med Informatics Assoc, 2004 7. Has security safeguards to prevent access by circumventing consent checking mechanism 8. Minimizes the number of...
View Full Document

Ask a homework question - tutors are online