scispace - formally typeset
Search or ask a question

Showing papers on "Information privacy published in 1973"


Book
01 Jan 1973
TL;DR: Find loads of the modern methods for computer security and privacy book catalogues in this site as the choice of you visiting this page.
Abstract: Find loads of the modern methods for computer security and privacy book catalogues in this site as the choice of you visiting this page. You can also join to the website book library that will show you numerous books from any types. Literature, science, politics, and many more catalogues are presented to offer you the best book to find. The book that really makes you feels satisfied. Or that's the book that will save you from your job deadline.

82 citations


Journal ArticleDOI
23 Nov 1973-Science
TL;DR: The methods adopted by MSIS to preserve confidentiality and privacy by limiting access to such records could well prove an important model for the development of protective methods in other electronic data programs—not only those in psychiatry, but those in other fields where the data collected are sensitive and confidential.
Abstract: A multistate, cooperative program seeking to develop better methods for the effective and efficient gathering. storing, analyzing, and utilizing of mental patient records has made a comprehensive effort to protect the confidentiality and privacy of these psychiatric patient records. Administrative, technical, and legal safeguards have been implemented. The discussion of legal safeguards involves two areas: the protection of the system itself, located at Rockland State Hospital; and the specific legal environment of confidentiality and privacy of mental health records and information in the group of cooperating jurisdictions. On the whole, adequate legal and administrative protection can be afforded the confidentiality and privacy of an electronic data system in the mental health field, and access to the records can be restricted for the welfare of the patients. At the same time, access to aggregate data in the system can be allowed, under proper standards, for important research and planning purposes. The methods adopted by MSIS to preserve confidentiality and privacy by limiting access to such records could well prove an important model for the development of protective methods in other electronic data programs—not only those in psychiatry, but those in other fields where the data collected are sensitive and confidential.

26 citations




Book ChapterDOI
01 Jan 1973
TL;DR: It is significant that the Data Surveillance Bill is designed to deal with a specific type of damage, namely, that arising out of computerized credit reporting.
Abstract: This chapter reviews computer information systems and their privacy. The concept of privacy is strongly dependent on the cultural and political context, and changes with time. Privacy, in one form or another, is basic to human relations. The concern about the ways in which modern technology affects privacy centers on the way information is gathered and also on the unsatisfactory practices for verifying, maintaining security on, and restricting the flow of information. Computers are primarily involved in these latter functions, but in examining the relation between computers and privacy, it is desirable to look at information gathering first, partly as background, and also because computers are often involved in the subsequent analysis. Devices designed for surveillance, wiretapping, and electronic eaves-dropping have been by far the most difficult to cope with in the matter of privacy. Computerized banking systems are just coming into use, and it is likely that they will grow and become general. It is significant that the Data Surveillance Bill is designed to deal with a specific type of damage, namely, that arising out of computerized credit reporting.

1 citations


Journal ArticleDOI
TL;DR: It is contended that the burdens of justification, gaining cooperation and trust of subjects, and bearing responsibility for protection of subjects' privacy lie with the researcher and failure to assume these burdens justifies refusal of cooperation on the part of subjects.
Abstract: Increasing demands for information about higher education lead the authors to reconsider the issue of privacy from an ethical point of view. Both individuals and institutions, it is argued, should be treated alike as “subjects.” Threats to privacy include (1) collection of information without consent, (2) unwarranted interpretation of information, and (3) dissemination of information beyond subjects' intent. It is contended that the burdens of justification, gaining cooperation and trust of subjects, and bearing responsibility for protection of subjects' privacy lie with the researcher. Failure on his part to assume these burdens justifies refusal of cooperation on the part of subjects.

1 citations