Next: About this document
Up: Remarks on the Caldicott
Previous: Conclusions
References
- 1
-
`Security in Clinical Information Systems', RJ Anderson (BMA, 1996)
- 2
-
`Personal
Medical Information -- Security, Engineering and Ethics', R
Anderson ed., Springer Verlag 1997
- 3
-
``NHS takes credit for £22m IT `shambles' '', T Collins, Computer
Weekly 4/7/96 p 1
- 4
-
``Hospital trusts boycott health service network'', T Collins, Computer Weekly
17/4/97 p 2
- 5
-
``Hospital care cut to pay for NHS systems'', T Collins, Computer Weekly
24/4/97 p 1
- 6
-
``Terminal illness hits health service'', S Davies, Connected, Daily
Telegraph 29/4/97 pp 8-9
- 7
-
``Privacy in Clinical Information Systems in Secondary Care'', I Denley, S
Weston Smith, British Medical Journal, to appear
- 8
-
`Report on the
Review of Patient-Identifiable Information', Department of Health, 1997
- 9
-
`Detailed Data Flow Mappings', Department of Health, 1997
- 10
-
www.diabcare.de
- 11
-
``Contract minimum dataset includes confidential data'', OM Goodyear,
British Medical Journal v 312 (20/1/96) p 185
- 12
-
``Big Brother wants you healthy'', C Gorman, Time 6/5/96 p 62
- 13
-
``Clinical Systems Security -- Implementing the BMA Policy and Guidelines'',
A Hassey, M Wells, in [2] pp 79-94
- 14
-
`Consultation
Document -- Part 1: The Role and Responsibilities of Caldicott Guardians; Part
2: Access controls for the NHS Strategic Tracing Service', NHS Executive,
15 May 1998
- 15
-
``Open Secrets'', J Riley, Newsday 31/3/96 p A5
- 16
-
Letter to EM Armstrong from G Winyard, 17/11/95
Ross Anderson
Thu Jun 25 15:00:54 BST 1998