XML
						<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<article xlink="http://www.w3.org/1999/xlink" dtd-version="1.0" article-type="family-medicine" lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher">JOHS</journal-id>
      <journal-id journal-id-type="nlm-ta">Journ of Health Scien</journal-id>
      <journal-title-group>
        <journal-title>Journal of HealthCare Sciences</journal-title>
        <abbrev-journal-title abbrev-type="pubmed">Journ of Health Scien</abbrev-journal-title>
      </journal-title-group>
      <issn pub-type="ppub">2231-2196</issn>
      <issn pub-type="opub">0975-5241</issn>
      <publisher>
        <publisher-name>Radiance Research Academy</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">457</article-id>
      <article-id pub-id-type="doi">http://dx.doi.org/10.52533/JOHS.2025.51117</article-id>
      <article-id pub-id-type="doi-url"/>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Family Medicine</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Confidentiality in the Era of Electronic Health Records: Ethical Challenges and Solutions&#13;
</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Alsuwailem</surname>
            <given-names>Alwaleed Mutlaq</given-names>
          </name>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Alderaan</surname>
            <given-names>Abduulrahman Mohammed</given-names>
          </name>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Alruweli</surname>
            <given-names>Hana Hazi</given-names>
          </name>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Alhashash</surname>
            <given-names>Haithaim Mohammed</given-names>
          </name>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Aljuwayr</surname>
            <given-names>Mohammed Subhi</given-names>
          </name>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Alkhaldi</surname>
            <given-names>Abdulhamid Mohammed</given-names>
          </name>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Alshammari</surname>
            <given-names>Mohammad Sulaiman</given-names>
          </name>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Rasheed</surname>
            <given-names>Ali Rabeea Al</given-names>
          </name>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Alalyani</surname>
            <given-names>Mansour Mohammed</given-names>
          </name>
        </contrib>
      </contrib-group>
      <pub-date pub-type="ppub">
        <day>30</day>
        <month>11</month>
        <year>-0001</year>
      </pub-date>
      <volume>5</volume>
      <issue>11</issue>
      <fpage>671</fpage>
      <lpage>679</lpage>
      <permissions>
        <copyright-statement>This article is copyright of Popeye Publishing, 2009</copyright-statement>
        <copyright-year>2009</copyright-year>
        <license license-type="open-access" href="http://creativecommons.org/licenses/by/4.0/">
          <license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution (CC BY 4.0) Licence. You may share and adapt the material, but must give appropriate credit to the source, provide a link to the licence, and indicate if changes were made.</license-p>
        </license>
      </permissions>
      <abstract>
        <p>The incorporation of Electronic Health Records (EHRs) into healthcare systems has greatly enhanced medical data management efficiency and patient care. Concerning patient confidentiality, this digital transformation also raises ethical and security issues. Sensitive health information protection is a concern due to unauthorized access, cyber threats, and legal complications. Ethical principles of patient autonomy and informed consent are usually breached when patients lack control over their use of data, especially for secondary uses such as research and commercial exploitation. For enhancing the security and confidentiality of EHRs, several technology alternatives have been suggested. Self-sovereign identity systems and patient-controlled data-sharing models are also being explored to enable more transparency and empower patients with greater control over their health records. Ethical dilemmas surrounding EHR confidentiality are examined in this literature review, which also looks at privacy risks, legal frameworks, and technological solutions. This review will also delve into the possibility of blockchain, artificial intelligence-powered cybersecurity, role-based access control, and encryption as viable measures for maintaining the confidentiality of EHR. By incorporating the latest research, this review aims to provide healthcare providers, policymakers, and researchers with information on how digital health privacy and security practices evolve.&#13;
</p>
      </abstract>
      <kwd-group>
        <kwd>Electronic Health Records (EHRs)</kwd>
        <kwd> Confidentiality</kwd>
        <kwd> Encryption</kwd>
        <kwd> Artificial Intelligence</kwd>
        <kwd> Data Security</kwd>
      </kwd-group>
    </article-meta>
  </front>
</article>