next up previous
Next: About this document Up: Remarks on the Caldicott Previous: Conclusions

References

1
`Security in Clinical Information Systems', RJ Anderson (BMA, 1996)

2
`Personal Medical Information -- Security, Engineering and Ethics', R Anderson ed., Springer Verlag 1997

3
``NHS takes credit for £22m IT `shambles' '', T Collins, Computer Weekly 4/7/96 p 1

4
``Hospital trusts boycott health service network'', T Collins, Computer Weekly 17/4/97 p 2

5
``Hospital care cut to pay for NHS systems'', T Collins, Computer Weekly 24/4/97 p 1

6
``Terminal illness hits health service'', S Davies, Connected, Daily Telegraph 29/4/97 pp 8-9

7
``Privacy in Clinical Information Systems in Secondary Care'', I Denley, S Weston Smith, British Medical Journal, to appear

8
`Report on the Review of Patient-Identifiable Information', Department of Health, 1997

9
`Detailed Data Flow Mappings', Department of Health, 1997

10
www.diabcare.de

11
``Contract minimum dataset includes confidential data'', OM Goodyear, British Medical Journal v 312 (20/1/96) p 185

12
``Big Brother wants you healthy'', C Gorman, Time 6/5/96 p 62

13
``Clinical Systems Security -- Implementing the BMA Policy and Guidelines'', A Hassey, M Wells, in [2] pp 79-94

14
`Consultation Document -- Part 1: The Role and Responsibilities of Caldicott Guardians; Part 2: Access controls for the NHS Strategic Tracing Service', NHS Executive, 15 May 1998

15
``Open Secrets'', J Riley, Newsday 31/3/96 p A5

16
Letter to EM Armstrong from G Winyard, 17/11/95


Ross Anderson
Thu Jun 25 15:00:54 BST 1998