Showing posts with label privacy. Show all posts
Showing posts with label privacy. Show all posts

Saturday, November 13, 2010

Privacy of paradigm: from acceptance of the reciprocal transparency

Error in deserializing body of reply message for operation 'Translate'. The maximum string content length quota (8192) has been exceeded while reading XML data. This quota may be increased by changing the MaxStringContentLength property on the XmlDictionaryReaderQuotas object used when creating the XML reader. Line 2, position 8292.
Error in deserializing body of reply message for operation 'Translate'. The maximum string content length quota (8192) has been exceeded while reading XML data. This quota may be increased by changing the MaxStringContentLength property on the XmlDictionaryReaderQuotas object used when creating the XML reader. Line 1, position 8972.
By FRANK PASQUALE Frank Pasquale

Computational innovation may improve health care by creating stores of data vastly superior to those used by traditional medical research. But before patients and providers “buy in,” they need to know that medical privacy will be respected. We’re a long way from assuring that, but new ideas about the proper distribution and control of data might help build confidence in the system.

William Pewen’s post “Breach Notice: The Struggle for Medical Records Security Continues” is an excellent rundown of recent controversies in the field of electronic medical records (EMR) and health information technology (HIT). As he notes,

Many in Washington have the view that the Health Insurance Portability and Accountability Act (HIPAA) functions as a protective regulatory mechanism in medicine, yet its implementation actually opened the door to compromising the principle of research consent, and in fact codified the use of personal medical data in a wide range of business practices under the guise of permitted “health care operations.” Many patients are not presented with a HIPAA notice but instead are asked to sign a combined notice and waiver that adds consents for a variety of business activities designed to benefit the provider, not the patient. In this climate, patients have been outraged to receive solicitations for purchases ranging from drugs to burial plots, while at the same time receiving care which is too often uncoordinated and unsafe. It is no wonder that many Americans take a circumspect view of health IT.

Privacy law’s consent paradigm means that, generally speaking, data dissemination is not deemed an invasion of privacy if it is consented to. The consent paradigm requires individuals to decide whether or not, at any given time, they wish to protect their privacy. Some of the brightest minds in cyberlaw have focused on innovation designed to enable such self-protection. For instance, interdisciplinary research groups have proposed “personal data vaults” to manage the emanations of sensor networks. Jonathan Zittrain’s article on “privication” proposed that the same technologies used by copyright holders to monitor or stop dissemination of works could be adopted by patients concerned about the unauthorized spread of health information.

If individuals had enough time to manage their personal data the way they manage their checkbooks and gardens, perhaps the consent paradigm would be a good foundation for addressing public concerns about privacy. If applicants could easily bargain with would-be employers over privacy, or patients with hospitals, perhaps we could rely on them to protect their interests. But actual occurrences of such acts of self-assertion and self-protection are rare. Given the frequently abstract benefits that privacy and reputational integrity afford, they are often traded away for competitive economic advantage. This process further erodes societal expectations of privacy.

A collective commitment to privacy is far more valuable than a private, transactional approach that all but guarantees a race to the bottom. If such a collective commitment does not materialize, record systems will only deserve trust if they become as transparent as the patients and research subjects they profile. Given corporate assertion of trade secrecy (and even privacy rights), reciprocal transparency will not be easy to achieve. Nevertheless, repeated breaches, fraud, and data meltdowns in the US should provoke an alliance of socially responsible researchers to lobby the US government to set minimal standards of reciprocal transparency and auditing. Consumers can only trust innovators if they can understand what is being done with data. As we become “transparent citizens” (as Joel Reidenberg puts it), we should demand that the corporate, university, and governmental authors of that trend reciprocate, and become more open about the data they gather.

Fortunately, as a recent presentation by Deborah Peel reminded me, there is significant audit authority built into the recent HITECH act which may curb some abuses. Audits will become increasingly important as a “wild west” of health data is excavated by scrapers, marketers, and other data miners.

Consider, for instance, the following scenario: contributors to the medical website PatientsLikeMe.com found that “Nielsen Co., [a] media-research firm . . . was ‘scraping,’ or copying, every single message off PatientsLikeMe’s private online forums.” Had the virtual break-in not been detected, health attributes connected to usernames (which, in turn, can often be linked to real identities) could have spread into numerous databases. A reciprocal transparency paradigm would require all those harboring health data to have some certified indication of its legitimate provenance. Data would not be allowed to persist without certification of its provenance.

Unforeseen spread of inaccurate or inappropriate health data is not just a problem for those who want to avoid getting solicitations for burial plots after a sensitive appointment. Given law enforcement exceptions to medical privacy laws and regulations, it should come as little surprise that the government claims that “a 2005 law authorizes it to monitor and record all prescription drug use by all citizens via so-called “Prescription Drug Monitoring Programs.” Such programs may just be the tip of an iceberg of new domestic intelligence programs that rely on private companies to act as “big brother’s little helpers.”

Whenever health data is fed into an evaluative profile of an individual, there should be safeguards in place to assure that the data is accurate, and that the resulting profile is, if at all possible, not used to harm or disadvantage the individual. Without assurances like these, we can count on continued resistance to the development of health data infrastructures.

This post first appeared on Health Reform Watch, the web log of the Seton Hall University School of Law, Health Law & Policy Program.

Frank Pasquale is the Schering-Plough Professor in health care regulation and enforcement at Seton Hall Law School and is the Associate Director of the Center for Health & Pharmaceutical Law & Policy. He has distinguished himself as an internationally recognized scholar in health, intellectual property, and information law and has made numerous academic presentations at universities across North America and at the National Academy of Sciences. A prolific writer, Professor Pasquale’s work has been featured in top law reviews, books, peer-reviewed journals, and online blogs, including Health Reform Watch, of which he is Editor-in-Chief. A frequent media presence, he has appeared in the New York Times, San Francisco Chronicle, Los Angeles Times, Boston Globe, Financial Times, and on CNN, WNYC’s Brian Lehrer Show, and National Public Radio’s Talk of the Nation.

November 1, 2010 in EHR, Frank Pasquale, Privacy | Permalink

Why is it that Americans are so seemingly concerned about privacy in health-related matters but are willing to sacrifice huge personal and private liberties to all things remotely related to 'national security?'


View the original article here

Tuesday, August 17, 2010

ONC Announces host changes HIPAA privacy, security and enforcement rules

By DAVID HARLOW

  The federales announced a new set of HIPAA Regulationstoday (to 14 in the Federal Register published) in a press conference with Kathleen Sebelius (HHS Secretary), GeorginaVerdugo (HHS OCR Director), David Blumenthal (ONC Director).The HIPAA changes are beauftragt.Aus HHS presser primarily by the host file:

Strengthen and expand Enforcementof health insurance portability and Accountability Act of 1996(HIPAA) Theproposed rule that would today announced privacy, security and enforcement rules by:

expanding rights to your information to access certain types of information of protected health information health plans and require business partners of HIPAA covered entities to be among most of the same rules as the covered entities; to restrict setting new limits of the use and disclosure of protected health information for marketing and fundraising; Andprohibiting sale of protected health information patients incompetent.

  Two new sites were also known as gegeben.Eine strengthened version of the violation of HIPAA data service notification wall of shame, and the other a new HHS privacy policy website is addressed, to the general public now up to hhs.gov healthprivacy.

This website, a joint declaration of ONC and OCRposted today and the tenor of the federales comments show today adeep concern about public perceptions, the health information privacy and Securityof protected-kind is a "what if we throw a Partyand nobody?"-Atmosphere.

This was at the today's press conference comments on the maintenance of the individual patient players increase the use and dissemination of protected health information-Theproposed rule contains a revised definition of marketing (Thecontext PHI for marketing purposes) and it was interesting Tohear as privacy concerns and marketing (Andreceived, for example, by the first author, patient data AdvocateDeborah peel) were presented.In addition the HHS hear session road show will kick into gear to output this because you "support of the American people want these guidelines havethe."

Themeaningful use last rule (the Blumenthal today said would be out "very small" and include additional providers Datasecurity requirements), and all the host Act - incentive - dollars and, most importantly, all this highly-anticipated, interoperable HIT generated healthcare improvement on quality, Alldepend acceptance among patients is the use of EHRs, so the privacy of the patient and the security Forprotection of concern good platzierte.Es Remainsto whether the general public is ready Themedical industrial complex on this way trust and be seen whether Themedical-industrial complex is in the location, either high bar Formeaningful use meet the proposed regulation, set or the federales Itswill bend.

Finally, a few important nuggets from the NPRM:
BusinessAssociates receive nearly full covered entity treatment in Proposedrule including of exposure of up to $ 1.5 m fines...Andsubcontractors of business, the associates are the long arm ofthe right to reach.
Compliancedates for most of the new rules are 180 days publication this rule last Regel.Wir get a year to all our Businessassociate agreements in order.A Handfulof set changes, specifically by the host file required in raised an example is the inclusion of "reputational damage" in addition Tophysical or financial harm than potentially aggravating factors indetermining the amount of the fine.

I Inviteall readers a look on the NPRM key questions of the Concernto examine and post comments, comments and questions here--and on the regulations.gov once the comment period opens next week.

July 9, 2010

View the Original article