Reference Hub3
Regulatory Compliance and the Correlation to Privacy Protection in Healthcare

Regulatory Compliance and the Correlation to Privacy Protection in Healthcare

Tyrone Grandison, Rafae Bhatti
Copyright: © 2010 |Volume: 1 |Issue: 2 |Pages: 16
ISSN: 1947-3133|EISSN: 1947-3141|EISBN13: 9781609604301|DOI: 10.4018/jcmam.2010040103
Cite Article Cite Article

MLA

Grandison, Tyrone, and Rafae Bhatti. "Regulatory Compliance and the Correlation to Privacy Protection in Healthcare." IJCMAM vol.1, no.2 2010: pp.37-52. http://doi.org/10.4018/jcmam.2010040103

APA

Grandison, T. & Bhatti, R. (2010). Regulatory Compliance and the Correlation to Privacy Protection in Healthcare. International Journal of Computational Models and Algorithms in Medicine (IJCMAM), 1(2), 37-52. http://doi.org/10.4018/jcmam.2010040103

Chicago

Grandison, Tyrone, and Rafae Bhatti. "Regulatory Compliance and the Correlation to Privacy Protection in Healthcare," International Journal of Computational Models and Algorithms in Medicine (IJCMAM) 1, no.2: 37-52. http://doi.org/10.4018/jcmam.2010040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Recent government-led efforts and industry-sponsored privacy initiatives in the healthcare sector have received heightened publicity. The current set of privacy legislation mandates that all parties involved in the delivery of care specify and publish privacy policies regarding the use and disclosure of personal health information. The authors’ study of actual healthcare privacy policies indicates that the vague representations in published privacy policies are not strongly correlated with adequate privacy protection for the patient. This phenomenon is not due to a lack of available technology to enforce privacy policies, but rather to the will of the healthcare entities to enforce strong privacy protections and their interpretation of minimum compliance obligations. Using available information systems and data mining techniques, this article describes an infrastructure for privacy protection based on the idea of policy refinement to allow the transition from the current state of perceived to be privacy-preserving systems to actually privacy-preserving systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.