|
Personal Data (Privacy) Ordinance (Cap. 486) |
|
|
|
The ordinance provides overall protection to personal data and is applicable to health records in the eHRSS. Handling of health records in relation to the system is subject to the requirements of the provisions of the ordinance, including the six Data Protection Principles regarding data collection, accuracy and retention, data use, data security, openness, and data access and correction. |
|
|
|
eHRSSO includes offences specific to the operation of eHR sharing to help safeguard the privacy and security of the system |
|
|
Electronic Health Record Sharing System Ordinance (Cap. 625) |
|
|
|
The ordinance was specially formulated to help safeguard the privacy and security of the eHRSS and its data. It stipulates requirements for using the eHRSS, and gives robust protection for the privacy and confidentiality of patient information by providing a legal basis for collecting, sharing, using and safe keeping of data in the system. Compliance with the ordinance is required for using the eHRSS. |
|
|
|
Key provisions cover: |
|
|
|
- |
Registration of HCPs and patients; |
- |
Sharing and use of data and information contained in the eHRSS; |
- |
Safeguards and protection of the system and electronic health records (eHR); and |
- |
Offences (e.g. on unauthorised access and system impairment). |
|
|
|
|
Code of Practice for Using Electronic Health Record for Healthcare (COP) |
|
|
|
The COP is an administrative document issued by the Commissioner for the Electronic Health Record to provide good practice and recommendations for users and participants of the eHRSS (in particular HCProfs, executives, administrative and technical staff of HCPs), and to help them better understand the operation of and the requirements for using the eHRSS. |
|
|
|
Main items of the COP include: |
|
|
|
- |
Rules and regulations on internal access procedures and control; |
- |
Requirement for HCPs to comply with the security standard; |
- |
Proper certification, audit and monitoring mechanisms to ensure compliance with the security requirements; and |
- |
Requirement for remedial actions in case of non-compliance with the COP. |
|