Download P1: The Architecture for Privacy in a Networked Health Environment
Formerly available at: http://www.accenture.com/xd/xd.asp?it= enweb&xd=_dyn\dynamicpressrelease_857.xml.
Formerly available at: http://energycommerce.house.gov/107/hearings/
05082001Hearing209/Westin309.htm.
The illicit use of data is not particular to the networked environment. What has changed is the scope of potential violations: As the network expands and as the amount of data increases, so does the possibility of confidentiality violations. In addition, a networked environment facilitates the illicit acquisition (e.g., through theft) and dissemination of data. This is in large part due to digitalization of information, which is easier to store, and to steal without its original owner even noticing.
Formerly available at: http://judiciary.senate.gov/testimony.cfm?id= 1437&wit_id=4161.
Formerly available at: http://www.theregister.co.uk/2005/04/21/ icam_surveillance_report/.
Formerly available at: http://judiciary.senate.gov/testimony.cfm?id=
1437&wit_id=2875.
Formerly available at: http://judiciary.senate.gov/testimony.cfm?id= 1437&wit_id=4161.
Formerly available at: http://judiciary.senate.gov/testimony.cfm?id= 1437&wit_id=4162.
Formerly available at: http://judiciary.senate.gov/member_statement.cfm?id= 1437&wit_id=2629.
Formerly available at: http://www.adn.com/news/alaska/story/6399520
p-6278454c.html.
For a listing of recent security breaches and data violations, see http://www.privacyrights.org/ar/
ChronDataBreaches.htm.
See for instance Paul Clayton (Chair): For the Record: Protecting Electronic Information; National Academy Press, 1997.
See http://www.privacyrights.org/ar/fairinfo.htm for a full discussion.
Reproduced from “The Law of Privacy in a Nutshell,” Robert Ellis Smith, Privacy Journal, 1993, pp. 50-51.
E.g., in the form of the Fair Credit Reporting Act, the Right to Financial Privacy Act, the Electronic Communications Privacy Act, and the Video Privacy Protection Act.
Reproduced from http://www.privacyrights.org/
ar/fairinfo.htm.
Para 9 of the OECD Privacy Guidelines states: “The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfillment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose.” See http://www.oecd.org/document/
18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html.
For more information, see http://www.privcom.gc.ca.
Any provisions for informed consent need to be drafted in such a way that ensures the sharing of information is not unduly cumbersome on data users. It is probably unrealistic to assume that patients can or should give their assent to each and every use of their medical data.
At the same time, outreach and awareness-building must be conducted with consideration for the potentially harmful effects on a public that is overly-concerned about privacy violations. See, for instance, the following article, which highlights concerns that patients might avoid care due to recent privacy fears (formerly available at): http://www.ihealthbeat.org/ index.cfm?Action=dspItem&itemID=110098.
Valid concerns have been raised that such a centralization may create additional security vulnerabilities.
It is important to recognize that the flexibility of opt-out provisions is limited by what is technologically feasible. Any steps or provisions taken to protect confidentiality need to consider what is possible with existing technology. At the same time, technical limitations should never be used to justify breaches of confidentiality or privacy.
It is also worth noting that some observers have suggested that penalties for abuses should be strengthened in order to act as a deterrent against future abuses.
The full and updated text of the Privacy Rule is available at: http://www.hhs.gov/ocr/hipaa/finalreg.html. The Security Rule is available at: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/.
It can be accessed at: http://ihcrp.georgetown.edu/privacy/pdfs/statereport1.pdf. The 2003 version of the report updated an earlier version -The State of Health Privacy: An Uneven Terrain (A Comprehensive Survey of State Health Privacy Statutes). Pritts (1999). In addition, the Health Privacy Project’s web site offered a state-by-state listing of laws (formerly available at): http://www.healthprivacy.org/info-url_nocat2304/info-url_nocat.htm.
Colorado and Minnesota, for example, have recognized torts on the basis of “unreasonable disclosure of public facts.” Others, including New York and Nebraska, have explicitly denied this right.
A discussion of these sub-networks, often called “regional health information organizations” or RHIOs, was formerly available at: http://ccbh.ehealthinitiative.org/
communities/community.aspx?Section=102&Category=148&Document=590 and http://www.healthcareitnews.com/NewsArticleView.aspx?ContentID=1751&ContentTypeID=3&IssueID=12. In addition, sub-network organizations operate as health information data exchange organizations (whether regionally or affinity-based) that operate as a part of the National Health Information Network (NHIN), a nationwide environment for the electronic exchange of health information made up of a “network of networks.”
For a full analysis of the benefits of an information sharing environment, see Achieving Electronic Connectivity in Healthcare: A Preliminary Roadmap from the Nation’s Public and Private Healthcare Leaders. Available at: http://www.markle.org/publications/842-achieving-electronic-connectivity-health-care-summary-financial-incentives-recommen.
Their report is available at: http://www.markle.org/publications/863-linking-health-care-information-proposed-methods-improving-care-and-protecting-priv.
Markle Connecting for Health thanks Stefaan Verhulst, Chief of Research, Markle Foundation, for drafting this paper.
©2006-2012, Markle Foundation
These works were originally published as part of the Markle Connecting for Health Common Framework: Resources for Implementing Private and Secure Health Information Exchange. They are made available free of charge, but subject to the terms of a License. You may make copies of these works; however, by copying or exercising any other rights to the works, you accept and agree to be bound by the terms of the License. All copies of these works must reproduce this copyright information and notice.