Next:
Introduction
Up:
No Title
Previous:
No Title
Contents
Introduction
Scope of the policy
Definitions
Disclaimers
Threats and Vulnerabilities
The ethical basis of clinical confidentiality
Other security requirements for clinical information
Threats to clinical confidentiality
Other security threats to clinical information
Protection priorities
Examples of aggregation in NHS systems
Security Policy
Access control
Record opening
Control
Consent and notification
Persistence
Attribution
Information flow
Aggregation control
The Trusted Computing Base
Clinical records or patient records?
Security Architecture Options
Compusec
Comsec
Evaluation and accreditation
European and global standardisation
Conclusions
References
About this document ...
Ross Anderson
Fri Jan 12 10:49:45 GMT 1996