Jump to ContentJump to Main Navigation
Harboring DataInformation Security, Law, and the Corporation$
Users without a subscription are not able to see the full content.

Andrea M. Matwyshyn

Print publication date: 2009

Print ISBN-13: 9780804760089

Published to Stanford Scholarship Online: June 2013

DOI: 10.11126/stanford/9780804760089.001.0001

Show Summary Details
Page of

PRINTED FROM STANFORD SCHOLARSHIP ONLINE (www.stanford.universitypressscholarship.com). (c) Copyright Stanford University Press, 2019. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in SSO for personal use.date: 21 October 2019

Information Security of Health Data

Information Security of Health Data

Electronic Health Information Security and Privacy

Chapter:
(p.103) 6 Information Security of Health Data
Source:
Harboring Data
Author(s):

Sharona Hoffman

Andy Podgurski

Publisher:
Stanford University Press
DOI:10.11126/stanford/9780804760089.003.0007

This chapter analyzes electronic health data security vulnerabilities and the legal framework that has been established to address them. It describes the wide-ranging threats to health information security and the harms that security breaches can produce. Some of the threats arise from sources that are internal to organizations, including irresponsible or malicious employees, while other threats are external, such as hackers and data miners. The harms associated with improper disclosure of private medical data can include medical identity theft, blackmail, public humiliation, medical mistakes, discrimination, and loss of financial, employment, and other opportunities. The chapter also discusses federal laws, state laws, and common-law causes of action that address patient privacy rights and health information security. Finally, it offers recommendations for improving safeguards for electronically processed health records.

Keywords:   data security, health data, health information security, electronic data, security breaches, patient privacy, medical data, hackers, data miners

Stanford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us.