David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Ezio Di Nucci
Jack Alan Reynolds
Learn more about PhilPapers
Journal of Medical Ethics 29 (1):34-35 (2003)
The Data Protection Act 1998 presents a number of significant challenges to data controllers in the health sector. To assist data controllers in understanding their obligations under the act, the Information Commissioner has published guidance, The Use and Disclosure of Health Data, which is reproduced here. The guidance deals, among other things, with the steps that must be taken to obtain patient data fairly, the implied requirements of the act to use anonymised or psuedonymised data where possible, an exemption applicable principally to records based research, the right of patients to object to the processing of their data, and the interface of the act and the common law duty of confidence
|Keywords||No keywords specified (fix it)|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
M. A. Crook (2013). The Risks of Absolute Medical Confidentiality. Science and Engineering Ethics 19 (1):107-122.
Similar books and articles
Jan van Bakel (1984). Automatic Semantic Interpretation: A Computer Model of Understanding Natural Language. Foris Publications.
Dag Elgesem (1999). The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data. [REVIEW] Ethics and Information Technology 1 (4):283-293.
A. Conti, P. Delbon, L. Laffranchi, C. Paganelli & F. De Ferrari (2012). HIV-Positive Status and Preservation of Privacy: A Recent Decision From the Italian Data Protection Authority on the Procedure of Gathering Personal Patient Data in the Dental Office. Journal of Medical Ethics 38 (6):386-388.
Graeme Hirst (1987). Semantic Interpretation and the Resolution of Ambiguity. Cambridge University Press.
Gloria González Fuster (2010). Inaccuracy as a Privacy-Enhancing Tool. Ethics and Information Technology 12 (1):87-95.
Todd Harris (2003). Data Models and the Acquisition and Manipulation of Data. Philosophy of Science 70 (5):1508-1517.
Jan Doroszewski (1988). Ethical and Methodological Aspects of Medical Computer Data Bases and Knowledge Bases. Theoretical Medicine and Bioethics 9 (2).
Yehoshua Sagiv (1979). An Algorithm for Inferring Multivalued Dependencies That Works Also for a Subclass of Propositional Logic. Dept. Of Computer Science, University of Illinois at Urbana-Champaign.
John R. Anderson, Christian Lebiere, Marsha Lovett & Lynne Reder (1998). ACT-R: A Higher-Level Account of Processing Capacity. Behavioral and Brain Sciences 21 (6):831-832.
Geoff Barnbrook, Pernilla Danielsson & Michaela Mahlberg (eds.) (2006). Meaningful Texts: The Extraction of Semantic Information From Monolingual and Multilingual Corpora. Continuum.
Terrell Ward Bynum & James Moor (eds.) (1998). The Digital Phoenix: How Computers Are Changing Philosophy. Blackwell Publishers.
Jacques Penders (2004). Privacy in (Mobile) Telecommunications Services. Ethics and Information Technology 6 (4):247-260.
Herman T. Tavani (1999). Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology 1 (2):137-145.
J. Street (1991). Personal Data Protection in Health and Social Services. Journal of Medical Ethics 17 (1):53-54.
Added to index2010-08-24
Total downloads11 ( #290,979 of 1,789,899 )
Recent downloads (6 months)9 ( #93,420 of 1,789,899 )
How can I increase my downloads?