Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 20 de 64
Filter
1.
Death Stud ; 43(7): 435-445, 2019.
Article in English | MEDLINE | ID: mdl-31328664

ABSTRACT

The paper is a first thorough examination of what happens to one's emails on death. The paper demonstrates that some content of emails can be protected by copyright and transmitted on death accordingly. The paper then analyzes the contractual provisions of the main email providers, Google and Microsoft, in order to determine how these contracts, regulate the transmission of emails on death. The author finds that these provisions complicate the issues of property and transmission of digital assets and do not offer a meaningful control over the assets for their users. The paper adopts a novel focus introduced in the author's earlier research, the idea of post-mortem privacy that is the right to privacy after death. This concept serves as an argument against the default transmission of emails on death without the deceased's consent, whether through the laws of intestacy or by requiring the service providers to provide access to the deceased's emails. Finally, the paper canvasses a solution which combines law and technology. It is argued that much more control should be placed in the hands of emails users. Post-mortem privacy, a potentially contested phenomenon, only accentuates the need to better account for the interests of the deceased, having in mind the volume of personal data and personal nature of emails. Therefore, an in-service solution is promoted, backed up by policy and legislation.


Subject(s)
Attitude to Death , Electronic Mail/legislation & jurisprudence , Privacy/legislation & jurisprudence , Humans , Technology/legislation & jurisprudence , Thanatology
7.
Acad Med ; 90(1): 25-9, 2015 Jan.
Article in English | MEDLINE | ID: mdl-25162617

ABSTRACT

E-mail is now a primary method of correspondence in health care, and proficiency with professional e-mail use is a vital skill for physicians. Fundamentals of e-mail courtesy can be derived from lay literature, but there is a dearth of scientific literature that addresses the use of e-mail between physicians. E-mail communication between providers is generally more familiar and casual than other professional interactions, which can promote unprofessional behavior or misunderstanding. Not only e-mail content but also wording, format, and tone may influence clinical recommendations and perceptions of the e-mail sender. In addition, there are serious legal and ethical implications when unprofessional or unsecured e-mails related to patient-identifying information are exchanged or included within an electronic medical record. The authors believe that the appropriate use of e-mail is a vital skill for physicians, with serious legal and ethical ramifications and the potential to affect professional development and patient care. In this article, the authors analyze a comprehensive literature search, explore several facets of e-mail use between physicians, and offer specific recommendations for professional e-mail use.


Subject(s)
Electronic Mail/standards , Guidelines as Topic , Attitude of Health Personnel , Confidentiality , Electronic Health Records , Electronic Mail/legislation & jurisprudence , Health Insurance Portability and Accountability Act , Humans , Physician-Patient Relations , United States
13.
Soc Work ; 57(3): 249-58, 2012 Jul.
Article in English | MEDLINE | ID: mdl-23252316

ABSTRACT

The author addresses the risks and benefits of incorporating therapeutic e-mail communication into clinical social work practice. Consumer demand for online clinical services is growing faster than the professional response. E-mail, when used as an adjunct to traditional meetings with clients, offers distinct advantages and risks. Benefits include the potential to reach clients in geographically remote and underserved communities, enhancing and extending the therapeutic relationship and improving treatment outcomes. Risks include threats to client confidentiality and privacy, liability coverage for practitioners, licensing jurisdiction, and the lack of competency standards for delivering e-mail interventions. Currently, the social work profession does not have adequate instructive guidelines and best-practice standards for using e-mail as a direct practice methodology. Practitioners need (formal) academic training in the techniques connected to e-mail exchanges with clients. The author describes the ethical and legal risks for practitioners using therapeutic e-mail with clients and identifies recommendations for establishing best-practice standards.


Subject(s)
Electronic Mail , Professional-Patient Relations , Social Work/trends , Confidentiality/ethics , Confidentiality/legislation & jurisprudence , Electronic Mail/ethics , Electronic Mail/legislation & jurisprudence , Ethics, Professional , Humans , Privacy/legislation & jurisprudence , Professional-Patient Relations/ethics , Social Work/ethics , Social Work/legislation & jurisprudence
15.
Nature ; 486(7402): 157, 2012 Jun 13.
Article in English | MEDLINE | ID: mdl-22699571
16.
J Med Pract Manage ; 27(4): 247-50, 2012.
Article in English | MEDLINE | ID: mdl-22413603

ABSTRACT

Two 2010 court cases that determined the effectiveness of policies governing employees' use of employer-provided communication devices can be used to guide employers when constructing their own technology policies. In light of a policy that stated that "users should have no expectation of privacy or confidentiality," one case established that the employer was in the right. However, a separate case favored the employee due, in part, to an "unclear and ambiguous" policy. Ultimately, employers can restrict the use of employer-furnished technology by employees by: 1) clearly outlining that employees do not have a reasonable expectation of privacy in their use of company devices; 2) stating that any use of personal e-mail accounts using employer-provided technology will be subject to the policy; 3) detailing all technology used to monitor employees; 4) identifying company devices covered; 5) not exposing the content of employee communications; and 6) having employees sign and acknowledge the policy.


Subject(s)
Computer Security/legislation & jurisprudence , Internet/legislation & jurisprudence , Organizational Policy , Personnel Management/legislation & jurisprudence , Practice Management, Medical/legislation & jurisprudence , Privacy/legislation & jurisprudence , Computers, Handheld , Electronic Mail/legislation & jurisprudence , Humans , United States
17.
Sci Am ; 306(1): 12, 2012 Jan.
Article in English | MEDLINE | ID: mdl-22279822
SELECTION OF CITATIONS
SEARCH DETAIL
...