Patient's information rights: strategies for information security in the electronic environment

Mahtab Karami, Reza Safdari, Ahmad Soltani



In E-health, one of the most important achievements to achieve patient-centered care is EHR. In patient-centered care, the goal is the availability of all patient information to clinicians to make best decision for the patient. Create an environment for sharing information and e-health information caused security and privacy of health data patients to become hot and challenging topic. So in this regard, healthcare organizations are necessary to create security strategies to protect patient's information rights. This review article outlined how to develop a security plan to protect health information and health information systems inside of improving quality of care to achieve three main objectives related to security such as confidentiality, integrity and availability around three main axial: administrative, physical, and technical safeguards.


Security; Patient's information rights; Electronic environment

Full Text:




Abdolhak, M. Grostick, S. Hanken, M. (2008). Health information of a strategic resource. USA: W. B Saunders company.

Caelli, W. Longley, D. Shain, M. (1991). Information security handbook. NewYork: Macmillan, Computers.

Chen, YY. Lu, JC. Jan, JK. (2012). A secure EHR system based on hybrid clouds. J Med Syst. 36 (5): 3375-84.

Eloff, S. (1999). Security in health-care information systems—current trends. International Journal of Medical Informatics. 54 (1): 39-54.

Fernández-Alemán, JL. Señor, IC. Lozoya, PÁ. Toval, A. (2013). Security and privacy in electronic health records: A systematic literature review. J Biomed Inform. 46 (3): 541-62

Gleni, S. Maple, C. Yue, Y. (2009). Security Issues of a Biometrics Health Care Information System: The Case of the NHS. Computing, Engineering and Information, . I. in CC '09. International Conference. Fullerton.

Hristidis, V. (2010). Information Discovery on Electronic Health Records. New York: Taylor and Francis Group.

Kluge, EH. (2004). Informed consent and the security of the electronic health record (EHR): some policy considerations. Int J Med Inform. 73 (3): 229-34.

MCway, D. (2008). Today’s health information management. USA: Thomson (Delmar).

Rodrigues, J. (2010). Health Information Systems: Concepts, Methodologies, Tools, and applications. NewYork: Hershy.

Shortliffe, E. (2001). Medical informatics: computer applications in health care and biomedicine. 2ed. New York: Springer.

Tan, J. (2009). Medical Informatic: concepts, methodology, tools and applications. NewYork: Hershy.

Tejero, A. De la Torre, I. (2011). Advances and current state of the security and privacy in electronic health records: survey from a social perspective. J Med Syst. 36 (5): 3019-27.

Tejero, A. De la Torre, I. (2011). Advances and current state of the security and privacy in electronic health records: survey from a social perspective. J Med Syst. 36 (5): 3019-27.

Van der Linden, H. Kalra, D. Hasman, A. Talmon, J. (2009). Inter-organizational future proof EHR systems. A review of the security and privacy related issues. Int J Med Inform. 78 (3): 141-60.

Wager, K. Lee, FJ. Glaser, J. (2005). Managing healthcare Information system. USA: John Wiley & Sons.

Wager, K. Lee, FJ. Glaser, J. (2009). Health Care Information Systems: A Practical Approach for Health Care Management. USA: Jossey-Bass / Wiley.

Yoo, S. Kim, S. Lee, S. Lee, KH. Baek, R. Hwang, H. (2013). A study of user requests regarding the fully electronic health record system at Seoul National University Bundang Hospital: Challenges for future electronic health record systems. Int J Med Inform. 82 (5): 387-97.


  • There are currently no refbacks.

Creative Commons License

This journal is distributed under the terms of CC BY-NC 4.0. Copyright © 2017 Medical Ethics Journal. All rights reserved. All credits and honors to PKP for their OJS.

For Author | Online Submission | About Contact