• Corpus ID: 20035412

Cloudy confidentiality: clinical and legal implications of cloud computing in health care.

  title={Cloudy confidentiality: clinical and legal implications of cloud computing in health care.},
  author={Carolina A Klein},
  journal={The journal of the American Academy of Psychiatry and the Law},
  volume={39 4},
  • C. A. Klein
  • Published 1 December 2011
  • Computer Science
  • The journal of the American Academy of Psychiatry and the Law
The Internet has grown into a world of its own, and its ethereal space now offers capabilities that could aid physicians in their duties in numerous ways. In recent years software functions have moved from the individual's local hardware to a central server that operates from a remote location. This centralization is called cloud computing. Privacy laws that speak to the protection of patient confidentiality are complex and often difficult to understand in the context of an ever-growing cloud… 

Tables from this paper

Record keeping in the cloud: Ethical considerations
“The cloud” is defined, risks and benefits of its use are discussed, and questions for practitioners to ask are provided when considering the appropriateness of maintaining patient records in this manner.
Requirements for Integrating End-to-End Security into Large-Scale EHR Systems
The requirements for integrating end-to-end confidentiality into large-scale EHR systems in a usable fashion are summarized and which data granularity is useful to been crypted without interfering with access control is shown.
Evolving standards of care in the age of cybertechnology.
  • F. Reamer
  • Psychology
    Behavioral sciences & the law
  • 2018
New standards of care that are being incorporated into licensing statutes and regulations; professional codes of ethics; and practice guidelines adopted by the professions of psychiatry, psychology, mental health counseling, marriage and family therapy, and clinical social work are highlighted.
A scoping review of cloud computing in healthcare
The objective of this scoping review was to identify the current state and hot topics in research on cloud computing in healthcare beyond this traditional domain as well as to describe conceptual or prototypic projects.
Regulatory Privacy Protection for Biomedical Cloud Computing
The privacy concerns that arise from the use of biomedical cloud computing services are examined and the current state of regulatory privacy safeguards for patients and consumers of these services both in the US and abroad are surveyed.
Telehealth practice in surgery: Ethical and medico‐legal considerations
There was rapid growth of telehealth practice during the COVID‐19 outbreak in 2020. In surgery, there were beneficial effects in terms of saving time and avoiding physical contact between healthcare
Are Forensic Evaluations “Health Care” and Are They Regulated by HIPAA?
It appears that the evidence strongly suggests that, for those forensic mental health practitioners who are covered entities, HIPAA does apply to forensic evaluations, and the implication is that FMHPs potentially face various federal, state, and civil sanctions for refusing to permit patient access to records.


Safeguarding patient privacy in electronic healthcare in the USA: the legal view
It is found that as Electronic Medical Records (EMRs) increase in scope and dissemination, privacy protections gradually decrease due to the shortcomings in the legal system, and how these will escalate when health information is transmitted over wireless networks.
Access and privacy rights using web security standards to increase patient empowerment.
Health systems with the characteristics thus described are technically feasible and should be generally implemented and deployed and a perspective is given on the state of the art concerning web security standards, which can be used to easily engineer health information systems complying with the patient empowering goals.
Ethics in public health research: privacy and public health at risk: public health confidentiality in the digital age.
Tightened physical and electronic controls can prevent misuse of data, minimize the risk of security breaches, and help maintain the reputation and integrity of public health agencies.
Grassley probes health care technology
  • M. May
  • Medicine
    Nature Medicine
  • 2010
The new rules for electronic health records came into force in the US last month created a big task for business associates, which hadn’t been held— until now—to most of the HIPAA security and privacy standards, says Stanley Nachimson Advisors.
To HIPAA, a Son: Assessing the Technical, Conceptual, and Legal Frameworks for Patient Safety Information
The article questions whether U.S. policymakers, regulators, and patient safety system architects should shift their focus from purely technical and financial issues to take a more patient-centric approach to the system that they propose.
Healthcare Identifiers legislation: a whiff of fourberie.
  • D. Mendelson
  • Medicine, Political Science
    Journal of law and medicine
  • 2010
The Healthcare Identifiers are considered a "key" to, or a "foundation stone" for, the implementation of the shared electronic health records scheme, because they will enable linkage with and retrieval of each patient's clinical records throughout the health care service system.
Evaluating Common De-Identification Heuristics for Personal Health Information
Existing Canadian federal and provincial privacy laws help explain why it is difficult to create an identification data set for the whole population, and there is a strong case for not disclosing the high-risk variables and their combinations identified here.
The impact of fear of HIPAA violation on patient care.
The negative impact of efforts to implement HIPAA on patient care in a community-based mental health system is discussed and several recommendations are offered for maintaining excellent patient care while complying with HIPAA.
Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule [revision 1]
This guideline is consistent with the requirements of the Office of Management and This guideline has been prepared for use by federal agencies, but such standards and guidelines shall not apply to national security systems.