SlideShare a Scribd company logo
1 of 20
Vivian Genaro Motti
Human Centric Design Lab
George Mason University
Communities
Connected for Kids
501 individuals
University of
Chicago Medicine
1.68 million records
People Inc.
1,000 individuals
American Medical
Collections Agency
20 million victims
Inmediata
1,565,338 individuals
Quest Diagnostics
Optum360
11.9 million records
LabCorp
7.7 million records
BioReference
Laboratories
422,600 customers
[Source: https://www.hipaajournal.com/]
[https://www.bitsight.com/blog/security-breaches-healthcare]
Health Insurance Providers
Privacy
Policies
Personal
Information
Protection
and Electronic
Documents
Act (PIPEDA)
• Canada
Personal Data
Protection Law
• Japan
Directives on Data
Protection
• European Union
HIPAA
protects
individuals’
medical
information
handled by
doctors,
hospitals and
health
insurance
companies
• United
States
More than 12 million Americans have sent in their DNA for
analysis to companies like 23andMe and AncestryDNA
[23andme]
Genetic Information
• When signing up to share the DNA with Ancestry,
users opt-in for informed consent research
– Genetic data is sold to third parties, like pharmaceutical
companies
• difficult to delete data once user have consented to it being
used for research
– Users can opt out when agreeing to the service
• Young children can’t give informed consent
• 23andMe and Ancestry do not share genetic
information freely, without a court order
– users can share their information online to find lost
relatives or biological parents
[Sources: www.forbes.com, www.washingtonpost.com]
+ Scientists use the data to
learn more about genetics,
medical conditions and
diseases to find cures and
treatments
+ To resolve criminal cases
- Genetic discrimination by
employers, insurance
companies, banks, etc.
- People could pay an access
to see the leaked data
Addressing key privacy challenges
• Take a holistic approach
• Consider carefully the patient’s benefit
– Individual vs. collective
• Identify potential threats
– What are the misuse case scenarios?
• Cover end to end communication
– From data collection through processing, storage,
sharing and disposal
Action - Patient
• Inform about privacy
• Avoid public posts
– Social media, online forums, mobile app reviews
and sharing
• Avoid public devices, networks
• Use trusted communication services
• Best security practices
– Firewalls, passwords, authentication mechanisms
Action - Practitioners
• What is the patient’s best interest?
– Always ask their consent
• What are the individual and collective
benefits?
– Short term and long term
• Follow legal and ethical standards
• Training and education on best practices
– Authentication, encryption, trusted channels of
communication
Action - Stakeholders
• Inform patients about privacy practices
– Authorization and consent
• Limit use and disclosure
– Mind the entire workflow
– Least privilege principle
• Ensure auditing and accountability
– Account all disclosure, in detail
– Provide access
• Take proactive actions
– Risk analysis
vmotti@gmu.edu
Q&A

More Related Content

What's hot

Care.data 17 09-13
Care.data 17 09-13Care.data 17 09-13
Care.data 17 09-13
howch1961
 
North East Health CIO Network, Mark Thomas, Chair of the North East Health CI...
North East Health CIO Network, Mark Thomas, Chair of the North East Health CI...North East Health CIO Network, Mark Thomas, Chair of the North East Health CI...
North East Health CIO Network, Mark Thomas, Chair of the North East Health CI...
mfolkard
 

What's hot (20)

Salaspuro presentation VTT SmartHealth Ecosystem Event 12.6.2019
Salaspuro presentation VTT SmartHealth Ecosystem Event 12.6.2019Salaspuro presentation VTT SmartHealth Ecosystem Event 12.6.2019
Salaspuro presentation VTT SmartHealth Ecosystem Event 12.6.2019
 
Care.data 17 09-13
Care.data 17 09-13Care.data 17 09-13
Care.data 17 09-13
 
MSD AIA Forum - 2009 Brochure
MSD AIA Forum - 2009 BrochureMSD AIA Forum - 2009 Brochure
MSD AIA Forum - 2009 Brochure
 
My Healthy Future workshops
My Healthy Future workshopsMy Healthy Future workshops
My Healthy Future workshops
 
Promoting an ethical and GDPR-compliant approach to learning analytics
Promoting an ethical and GDPR-compliant approach to learning analyticsPromoting an ethical and GDPR-compliant approach to learning analytics
Promoting an ethical and GDPR-compliant approach to learning analytics
 
People, health professionals and health information Working together in 2014
People, health professionals and health information Working together in 2014People, health professionals and health information Working together in 2014
People, health professionals and health information Working together in 2014
 
Panel: Achieving Interoperability Dr. John Loonsk & Janet King
Panel: Achieving Interoperability Dr. John Loonsk & Janet KingPanel: Achieving Interoperability Dr. John Loonsk & Janet King
Panel: Achieving Interoperability Dr. John Loonsk & Janet King
 
Mobile Health for Multiple Sclerosis
Mobile Health for Multiple SclerosisMobile Health for Multiple Sclerosis
Mobile Health for Multiple Sclerosis
 
0401 1 Denis Costello - Patient Generated Data
0401 1 Denis Costello - Patient Generated Data0401 1 Denis Costello - Patient Generated Data
0401 1 Denis Costello - Patient Generated Data
 
eHealth Practice in Europe: where do we stand?
eHealth Practice in Europe: where do we stand?eHealth Practice in Europe: where do we stand?
eHealth Practice in Europe: where do we stand?
 
Right patient right place right time
Right patient right place right timeRight patient right place right time
Right patient right place right time
 
What's on the Horizon, How HIT Supports Practice Transformation and Chronic D...
What's on the Horizon, How HIT Supports Practice Transformation and Chronic D...What's on the Horizon, How HIT Supports Practice Transformation and Chronic D...
What's on the Horizon, How HIT Supports Practice Transformation and Chronic D...
 
Ristimaki presentation VTT SmartHealth Ecosystem Event 12.6.2019
Ristimaki presentation VTT SmartHealth Ecosystem Event 12.6.2019Ristimaki presentation VTT SmartHealth Ecosystem Event 12.6.2019
Ristimaki presentation VTT SmartHealth Ecosystem Event 12.6.2019
 
Connect After Clinic: How Digital Technologies Can Strengthen the Physician-P...
Connect After Clinic: How Digital Technologies Can Strengthen the Physician-P...Connect After Clinic: How Digital Technologies Can Strengthen the Physician-P...
Connect After Clinic: How Digital Technologies Can Strengthen the Physician-P...
 
Open government platforms U.S. federal government
Open government platforms U.S. federal governmentOpen government platforms U.S. federal government
Open government platforms U.S. federal government
 
MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15
 
Health Camp 2
Health Camp 2Health Camp 2
Health Camp 2
 
North East Health CIO Network, Mark Thomas, Chair of the North East Health CI...
North East Health CIO Network, Mark Thomas, Chair of the North East Health CI...North East Health CIO Network, Mark Thomas, Chair of the North East Health CI...
North East Health CIO Network, Mark Thomas, Chair of the North East Health CI...
 
National eHealth Collaborative (NeHC)
National eHealth Collaborative (NeHC) National eHealth Collaborative (NeHC)
National eHealth Collaborative (NeHC)
 
0401 2 Ananda Plate - Patient Preferences
0401 2 Ananda Plate - Patient Preferences0401 2 Ananda Plate - Patient Preferences
0401 2 Ananda Plate - Patient Preferences
 

Similar to Healthcare Privacy

Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
M2SYS Technology
 
Digital Health Technology: The Ultimate Patient Advocate
Digital Health Technology: The Ultimate Patient AdvocateDigital Health Technology: The Ultimate Patient Advocate
Digital Health Technology: The Ultimate Patient Advocate
David Lee Scher, MD
 

Similar to Healthcare Privacy (20)

From personal health data to a personalized advice
From personal health data to a personalized adviceFrom personal health data to a personalized advice
From personal health data to a personalized advice
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital Health
 
A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Digital Health Technology: The Ultimate Patient Advocate
Digital Health Technology: The Ultimate Patient AdvocateDigital Health Technology: The Ultimate Patient Advocate
Digital Health Technology: The Ultimate Patient Advocate
 
Improving health care outcomes with responsible data science
Improving health care outcomes with responsible data scienceImproving health care outcomes with responsible data science
Improving health care outcomes with responsible data science
 
Constraintsand challenges
Constraintsand challengesConstraintsand challenges
Constraintsand challenges
 
Ethics in social media
Ethics in social mediaEthics in social media
Ethics in social media
 
Telehealth.org FINAL DECK 2023 McMenamin & Maheu - Powerpoint Slides - Therap...
Telehealth.org FINAL DECK 2023 McMenamin & Maheu - Powerpoint Slides - Therap...Telehealth.org FINAL DECK 2023 McMenamin & Maheu - Powerpoint Slides - Therap...
Telehealth.org FINAL DECK 2023 McMenamin & Maheu - Powerpoint Slides - Therap...
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informatics
 
Dave Taylor
Dave TaylorDave Taylor
Dave Taylor
 
Standards of dental informatics, security issues
Standards of dental informatics, security issuesStandards of dental informatics, security issues
Standards of dental informatics, security issues
 
mHealth Summit EU 2015
mHealth Summit EU 2015 mHealth Summit EU 2015
mHealth Summit EU 2015
 
Legal barriers to better use of health data to deliver pharmaceutical innovation
Legal barriers to better use of health data to deliver pharmaceutical innovationLegal barriers to better use of health data to deliver pharmaceutical innovation
Legal barriers to better use of health data to deliver pharmaceutical innovation
 
Three digital health companies will change pharma
Three digital health companies will change pharmaThree digital health companies will change pharma
Three digital health companies will change pharma
 
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
 
Precision and Participatory Medicine - MEDINFO 2015 Panel on big data
Precision and Participatory Medicine - MEDINFO 2015 Panel on big dataPrecision and Participatory Medicine - MEDINFO 2015 Panel on big data
Precision and Participatory Medicine - MEDINFO 2015 Panel on big data
 
Digital Health Trends: Putting the Power in the Patient's Hands
Digital Health Trends: Putting the Power in the Patient's HandsDigital Health Trends: Putting the Power in the Patient's Hands
Digital Health Trends: Putting the Power in the Patient's Hands
 
McMenamin - Slidedeck for Slideshare - Therapist AI & ChatGPT- How to Use Leg...
McMenamin - Slidedeck for Slideshare - Therapist AI & ChatGPT- How to Use Leg...McMenamin - Slidedeck for Slideshare - Therapist AI & ChatGPT- How to Use Leg...
McMenamin - Slidedeck for Slideshare - Therapist AI & ChatGPT- How to Use Leg...
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 

More from Vivian Motti

More from Vivian Motti (7)

Evaluating a Wrist Worn Application for Students with Neurodevelopmental Diso...
Evaluating a Wrist Worn Application for Students with Neurodevelopmental Diso...Evaluating a Wrist Worn Application for Students with Neurodevelopmental Diso...
Evaluating a Wrist Worn Application for Students with Neurodevelopmental Diso...
 
Healthcare Privacy
Healthcare PrivacyHealthcare Privacy
Healthcare Privacy
 
Wearable Health: Opportunities and Challenges
Wearable Health: Opportunities and ChallengesWearable Health: Opportunities and Challenges
Wearable Health: Opportunities and Challenges
 
Empowering Caregivers
Empowering CaregiversEmpowering Caregivers
Empowering Caregivers
 
Write mind
Write mindWrite mind
Write mind
 
Write mind
Write mindWrite mind
Write mind
 
Wearable Life: a Wrist-Worn Application to Assist Students in Special Education
Wearable Life: a Wrist-Worn Application to Assist Students in Special EducationWearable Life: a Wrist-Worn Application to Assist Students in Special Education
Wearable Life: a Wrist-Worn Application to Assist Students in Special Education
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Healthcare Privacy

  • 1. Vivian Genaro Motti Human Centric Design Lab George Mason University
  • 2.
  • 3. Communities Connected for Kids 501 individuals University of Chicago Medicine 1.68 million records People Inc. 1,000 individuals American Medical Collections Agency 20 million victims Inmediata 1,565,338 individuals Quest Diagnostics Optum360 11.9 million records LabCorp 7.7 million records BioReference Laboratories 422,600 customers [Source: https://www.hipaajournal.com/]
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Privacy Policies Personal Information Protection and Electronic Documents Act (PIPEDA) • Canada Personal Data Protection Law • Japan Directives on Data Protection • European Union HIPAA protects individuals’ medical information handled by doctors, hospitals and health insurance companies • United States
  • 10. More than 12 million Americans have sent in their DNA for analysis to companies like 23andMe and AncestryDNA [23andme]
  • 11. Genetic Information • When signing up to share the DNA with Ancestry, users opt-in for informed consent research – Genetic data is sold to third parties, like pharmaceutical companies • difficult to delete data once user have consented to it being used for research – Users can opt out when agreeing to the service • Young children can’t give informed consent • 23andMe and Ancestry do not share genetic information freely, without a court order – users can share their information online to find lost relatives or biological parents [Sources: www.forbes.com, www.washingtonpost.com]
  • 12. + Scientists use the data to learn more about genetics, medical conditions and diseases to find cures and treatments + To resolve criminal cases - Genetic discrimination by employers, insurance companies, banks, etc. - People could pay an access to see the leaked data
  • 13. Addressing key privacy challenges • Take a holistic approach • Consider carefully the patient’s benefit – Individual vs. collective • Identify potential threats – What are the misuse case scenarios? • Cover end to end communication – From data collection through processing, storage, sharing and disposal
  • 14.
  • 15. Action - Patient • Inform about privacy • Avoid public posts – Social media, online forums, mobile app reviews and sharing • Avoid public devices, networks • Use trusted communication services • Best security practices – Firewalls, passwords, authentication mechanisms
  • 16.
  • 17. Action - Practitioners • What is the patient’s best interest? – Always ask their consent • What are the individual and collective benefits? – Short term and long term • Follow legal and ethical standards • Training and education on best practices – Authentication, encryption, trusted channels of communication
  • 18.
  • 19. Action - Stakeholders • Inform patients about privacy practices – Authorization and consent • Limit use and disclosure – Mind the entire workflow – Least privilege principle • Ensure auditing and accountability – Account all disclosure, in detail – Provide access • Take proactive actions – Risk analysis

Editor's Notes

  1. Thanks to the digitalization of medical records, today more patients have access to healthcare services. Information sharing across practitioners has become easier, as well as the analysis of medical data across healthcare facilities. The access, analysis and processing of medical data has become more efficient thanks to more powerful computational tools. For patients, the widespread availability of technology ensured more accurate diagnosis, prompt access to results from exams and lab tests, and the ability to take more informed decisions. Personal tools available to facilitate health management also emerged, including fitness trackers, and mobile apps that can improve medication adherence and encourage healthier lifestyles. Having access to more information facilitates analysis, correlations and aggregation, aiding to advance standard care practices and enhancing the understanding of medical conditions. By retrieving aggregated data healthcare practitioners, patients and caregivers can also take more informed decisions. Collectively, the benefits include better management of epidemics with more informed policies and campaigns, and more efficient matching between organ donors and patients needing a transplant. Individually, more information is known about rare diseases, efficacy of treatments and therapies per individual profile facilitating precision medicine. Digital technologies aid in data collection, analysis, and sharing, however they also increase the risks for privacy breaches. Creating and implementing access controls became more challenging, especially because: more data has been collected, more stakeholders are involved in the care services, more devices and equipment are used to collect, store and process data, and more systems are in use to analyze and share medical information. Although policies exist, enforcing them has been challenging. Also their enactment is oftentimes expensive and complex to implement
  2. As a consequence a number of breaches of patients’ records have been reported. According to HIPAA journal, millions of patients have been affected in the past months by data breaches. Those breaches disclose personal information about the patients (including social security numbers) as well as their medical records (including diagnosis, treatment, and medications). Because the health data is integrated, the breaches not always affect a single provider, but can impact several institutions and organizations working in collaboration.
  3. Mandatory disclosure of data breaches is beneficial to understand the dimensions of the problem. But their frequency and impacts show that substantial efforts are needed to ensure better privacy and security protections in practice. Such breaches have several causes, incidental, accidental, negligence, or malicious, they range from phishing attacks to stolen equipment, usage of untrusted communication channels, and misconfiguration of web servers. The consequences to the organizations and institutions involved are financial losses, fines, and reputation damage. For an individual patient, when his/her data is disclosed, family members and relatives can also be affected…
  4. 1 minute: High-level explanation of what chapter is about and why it’s important to practice/industry My book chapter addresses healthcare privacy. More specifically I focus on how diverse stakeholders can protect patients and their data while delivering high quality care. I describe privacy concerns, threats and risks that emerge with the digitization of healthcare services, the increasing availability of Internet-of-care-things and the usage of online health services for storing and sharing medical data. To ensure patients’ right to privacy, collaborative efforts from multiple stakeholders are necessary. Not only patients, practitioners, and family members are affected, but also medical organizations, including health insurance companies, laboratories, clinics, and hospitals. Privacy preserving mechanisms go beyond the protection of patients’ data, impacting the infrastructure of medical devices, equipment, networks, and systems entirely. The data lifecycle, cutting across collection, storage, sharing and disposal must be taken into account when implementing privacy protections. Although principles, policies, and regulations exist to address privacy issues, such solutions are limited and also costly to implement. They often fail to cover the capabilities of novel technologies that collect and transmit medical data. Healthcare privacy can only be ensured through collective efforts that take into account not only the patient, but all stakeholders involved, including physicians, nurses, dentist, therapists, and so on. As healthcare IT became more pervasive, not only the physician computer should be protected, but the entire ecosystem of devices. From the patients side, wearable trackers, mobile apps, and personal laptops should be protected. From the physician side, the electronic health records as well as its underlying infrastructure should be protected. Besides patients and health practitioners, third party services, including financial institutions, laboratories, clinics and health insurance providers are also involved. To protect health data, privacy solutions should employ a patient-centric approach considering also the ecosystem of devices and data sources, as well as the multiple stakeholders involved in the process of data collection, storage and sharing.
  5. Privacy considerations cut across different dimensions of equipment, and phases in the data life cycle. Including personal devices that the patient carries around, such as fitness trackers and smartphones, to larger equipment in a hospital setting dedicated for imaging exams. Physical artifacts, such as printed records, as well as devices are involved in the privacy control process, including hardware and software systems, as well as the underlying infrastructure for data storage and sharing. The web also provides valuable information about patients, who oftentimes are unaware about the risks and implications involved when using a mobile app, posting in an online forum, or asking for advice in social media.
  6. The challenges involved escalate when online services are considered. A patient can reveal information explicitly, in a web search, or mobile app review. Public posts from instagram, facebook, and other social media channels help to inform diagnosis and medical conditions, unintentionally or not Mobile app reviews and discussion forum can also disclose sensitive information about a patient. Inferences can be drawn from the interaction patterns, search history, and social media posts. Such analysis can provide a lot of medical information about a patient, revealing medical information that not even the patient, or his/her family members, may be aware of In such cases, when hereditary conditions, genetic information, or transmissible diseases are concerned, the privacy breach not only affects the patients, but their relatives too
  7. Aggregated data from various sources can pose additional privacy risks. Even when the information published is de-identified or anonymized, combining various sources helps to find unhidden patterns in the data
  8. To address those issues, a number of privacy policies exist They vary per country Although they are largely employed, they not always are updated to cover novel technologies it doesn’t apply to the vast majority of DNA kits Neither covers social media, wearable devices, fitness trackers
  9. New services, such as 23andme and ancestry, for genetic profiling unveiled a large number of ethical questions for which regulation do not cover. For each technology piece and process of data management there are best practices involved. The same applies for stakeholders, since every single individual has its role, responsibilities and duties to protect the patient privacy and his/her personal data. New services, such as 23andme and ancestry, for genetic profiling unveiled a large number of ethical questions for which regulation do not cover. For each technology piece and process of data management there are best practices involved. The same applies for stakeholders, since every single individual has its role, responsibilities and duties to protect the patient privacy and his/her personal data. https://www.forbes.com/sites/nicolemartin1/2018/12/05/how-dna-companies-like-ancestry-and-23andme-are-using-your-genetic-data/#155fad0a6189 https://www.forbes.com/sites/nicolemartin1/2018/12/05/how-dna-companies-like-ancestry-and-23andme-are-using-your-genetic-data/#155fad0a6189
  10. Since there is no real established precedent for DNA data, there are many issues that could come if your data is leaked and no laws to truly protect you at the moment. 23andme received FDA approval https://www.washingtonpost.com/lifestyle/2018/12/19/should-you-send-your-kids-dna-andme/?utm_term=.5049e326af5c
  11. Find and convict the rapist and murderer People find out a lot of surprising information about their families that I think might be more disturbing to kids than finding out about a disease risk that might happen much later in life,” she says. For instance, paternity revealed by a genetic test can radically change the dynamics of a family and have lasting impacts on children. In a recent case, a man discovered he wasn’t the biological father of his 15-year-old daughter after buying her an AncestryDNA test. A few weeks after getting the results, he filed for divorce from his wife.