Next:   About this document 
Up: Remarks on the Caldicott 
 Previous: Conclusions
 
 
References
- 1
 - 
`Security in Clinical Information Systems', RJ Anderson (BMA, 1996)
 - 2
 - 
`Personal 
Medical Information -- Security, Engineering and Ethics', R 
Anderson ed., Springer Verlag 1997
 - 3
 - 
``NHS takes credit for £22m IT `shambles' '', T Collins, Computer 
Weekly 4/7/96 p 1
 - 4
 - 
``Hospital trusts boycott health service network'', T Collins, Computer Weekly
17/4/97 p 2
 - 5
 - 
``Hospital care cut to pay for NHS systems'', T Collins, Computer Weekly
24/4/97 p 1
 - 6
 - 
``Terminal illness hits health service'', S Davies, Connected, Daily 
Telegraph 29/4/97 pp 8-9
 - 7
 - 
``Privacy in Clinical Information Systems in Secondary Care'', I Denley, S
Weston Smith, British Medical Journal, to appear
 - 8
 - 
`Report on the 
Review of Patient-Identifiable Information', Department of Health, 1997
 - 9
 - 
`Detailed Data Flow Mappings', Department of Health, 1997
 - 10
 - 
www.diabcare.de
 - 11
 - 
``Contract minimum dataset includes confidential data'', OM Goodyear, 
British Medical Journal v 312 (20/1/96) p 185
 - 12
 - 
``Big Brother wants you healthy'', C Gorman, Time 6/5/96 p 62
 - 13
 - 
``Clinical Systems Security -- Implementing the BMA Policy and Guidelines'',
A Hassey, M Wells, in [2] pp 79-94
 - 14
 - 
`Consultation 
Document -- Part 1: The Role and Responsibilities of Caldicott Guardians; Part 
2: Access controls for the NHS Strategic Tracing Service', NHS Executive, 
15 May 1998
 - 15
 - 
``Open Secrets'', J Riley, Newsday 31/3/96 p A5
 - 16
 - 
Letter to EM Armstrong from G Winyard, 17/11/95
 
 
Ross Anderson 
Thu Jun 25 15:00:54 BST 1998