To ensure that patient confidentiality is securely maintained, health ICT applications that contain sensitive personal information demand comprehensive privacy policies. Determining the adequacy of these policies to meet legal conformity together with clinical users and patient expectation is demanding in practice. Organisations and agencies looking to analyse their Privacy and Security policies can benefit from guidance provided by outside entities such as the Privacy Office of their State or Government together with law firms and ICT specialists. The advice given is not uniform and often open to different interpretations. Of greater concern is the possibility of overlooking any important aspects that later result in a data breach. Based on three case studies, this paper considers whether a more formal approach to privacy analysis could be taken that would help identify the full coverage of a Privacy Impact Analysis and determine the deficiencies with an organisation's current policies and approach. A diagrammatic model showing the relationships between Confidentiality, Privacy, Trust, Security and Safety is introduced. First the validity of this model is determined by mapping it against the real-world case studies taken from three healthcare services that depend on ICT. Then, by using software engineering methods, a formal mapping of the relationships is undertaken to identify a full set of policies needed to satisfy the model. How effective this approach may prove as a generic method for deriving a comprehensive set of policies in health ICT applications is finally discussed.
[1]
Vicky Liu,et al.
Strengthening Legal Compliance for Privacy in Electronic Health Information Systems: A Review and Analysis
,
2008
.
[2]
P Croll.
Privacy Impact Assessments - the Organisational versus the Individual's Viewpoints
,
2008
.
[3]
Charles Oppenheim,et al.
Privacy Impact Assessments: The UK Experience
,
2009
.
[4]
R. Magnusson,et al.
The Changing Legal and Conceptual Shape of Health Care Privacy
,
2004,
Journal of Law, Medicine & Ethics.
[5]
Peter R. Croll,et al.
Investigating risk exposure in e-health systems
,
2007,
Int. J. Medical Informatics.