This document summarizes key points about privacy and mobile health apps from a presentation given by Professor Jeremy Wyatt. It discusses how easily personal data can be identified even when anonymized, and how social media and mobile apps have increased data sharing. While health professionals are bound by ethics to protect patient data, companies freely trade personal data as a commodity. The document outlines some options for individuals to better control their personal data, and concludes that laws are tightening but individuals still need ways to protect their privacy in the digital era.
Precision Algorithms in Healthcare: Improving treatments with AIDay1 Technologies
It’s 2020 and we can safely say that the year hasn’t been our best or what we wanted it to be like. The alarming spread of COVID-19, and its aftermath has people unrooted and shaken to their toes, and literally everyone is looking at technology and healthcare innovations to find an answer to the pandemic. And fast.
Swiss Re - Center for Global Dialogue Report: Healthcare revolution: Big dat...Thomas Dijohn
dacadoo is proud to be referenced by Swiss Re - Center of Global Dialogue in report 'Healthcare revolution: Big data and smart analytics'.
dacadoo is referenced in the section "Sensor innovations driving the digital health revolution"
XX in Health Week 2013 SF Mixer at Practice FusionLauren Fifield
Exploring the concept of the expert, how newcomers have transformed other industries, the role of the newcomer in healthcare, and how we can actively engage talent to enter our industry.
Precision Algorithms in Healthcare: Improving treatments with AIDay1 Technologies
It’s 2020 and we can safely say that the year hasn’t been our best or what we wanted it to be like. The alarming spread of COVID-19, and its aftermath has people unrooted and shaken to their toes, and literally everyone is looking at technology and healthcare innovations to find an answer to the pandemic. And fast.
Swiss Re - Center for Global Dialogue Report: Healthcare revolution: Big dat...Thomas Dijohn
dacadoo is proud to be referenced by Swiss Re - Center of Global Dialogue in report 'Healthcare revolution: Big data and smart analytics'.
dacadoo is referenced in the section "Sensor innovations driving the digital health revolution"
XX in Health Week 2013 SF Mixer at Practice FusionLauren Fifield
Exploring the concept of the expert, how newcomers have transformed other industries, the role of the newcomer in healthcare, and how we can actively engage talent to enter our industry.
Support for the keynote "Data, Ethics and Health Care,”, Keynote, Creating Value in Health Care through Innovation Management, May 16,2019, Deusto, San Sebastien
5 healthcare technology transformation trends to watch out for in 2017Rahul Gupta
Healthcare is all set to undergo a massive technology/ Digital transformation in 2017. The slides talk about the current challenges faced by the US Healthcare sector, the key technology transformation to watch out for and how they stack up on the hype cycle
The COVID19 Pandemic moved us a decade ahead in telemedicine. Primary and urgent care is being transformed with changes in consumer and patient expectations, improvements in telemedicine and monitoring technology, and consumer appetite for the consumption of these services. Medicare's recent favorable reimbursement has driven adoption with these drivers. Primary care, in particular, is being transformed. Care models are being reinvented and the practice of primary care is morphing from in - office episodic visits to multimodal in person, virtual, and continuous monitoring care.
How Fitness And Wellness Apps Are Transforming The Healthcare Industry In Los...Moon Technolabs Pvt. Ltd.
Are you curious about fitness app solutions in USA? Perhaps you’re wondering whether they’re a difference at all or not. Well, this write-up will clarify your doubts.
This is the annotated and expanded version of WEGO Health’s presentation at the FDA’s Public Hearing and the Health Activist Social Media Survey results with graphs and explanations.
The Incredible Ways Artificial Intelligence Is Now Used In Mental HealthBernard Marr
The world is facing a mental health crisis. With a shortage of mental health professionals, individuals not seeking treatment due to lack of access or high costs, and a significant rise in mental health conditions, artificial intelligence (AI) tools are being assessed and used to create solutions to help support people’s mental health.
Social Media and Medicine: Fad or Shift?Gregg Masters
A social media tutorial for client medical group, including details on physician immersion in the broadly cast "digital health channel'. Some key trends in digital health, including both primary and secondary market research are recapped to suggest certain forward implications for a 'cloud based web presence'. Is social media a fad, I don't think empirical evidence would suggest such a conclusion.
Once the testing process is completed, a telemedicine app is deployed to the app store. There are many factors that are required to be checked while publishing an app especially when it belongs to the healthcare industry. These factors should be taken care of stringently.
To know more visit- https://www.sparxitsolutions.com/blog/telemedicine-app/
The Illinois Health Information Exchange (ILHIE) has just released its Consumer Education Health IT Toolkit. It was developed to provide healthcare professionals with simple and informative educational material to share with their patients. Consumer education and engagement are cornerstones for the implementation of a successful state health IT program.
Wego Health FDA Post Presentation Data Pptguest4c357f
Annotated and expanded version of WEGO Health’s presentation at the FDA’s Public Hearing and the Health Activist Social Media Survey results with graphs and explanations.
Dose of Digital FDA Pharma Social Media Hearing Testimony - Corrective Inform...Jonathan Richman
This is my testimony that I will present to the FDA at the upcoming hearings on the use of social communications in pharma. This specifically will address their question regarding "what parameters should apply to the posting of corrective information on Web sites controlled by third parties?"
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
The potential benefits of mobile medical technology and telemedicine are enormous, from better quality of life to saving lives, not to mention controlling healthcare costs. Yet keeping data safe when it is beyond the confines of hospitals and clinics is a serious challenge, one that cannot be met merely through regulatory compliance. In these slides I show why HIPAA compliant is not the same as being secure, and why protecting health data on mobile devices is a such a big security challenge.
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docxtodd271
Running head: DATA PRIVACY 1
DATA PRIVACY 10
Short- and Long-Term Effects of Sharing Personal and Medical Data
1. Introduction
The advancement in technology has led to the production of a large volume of human information for economic and medicinal uses. Information plays a significant part in the identification of social issues and helps effective device solutions to daily problems in human life. Although personal and medical info is essential, there are at times when people who have access to the data misuse it for financial gains. When it comes to data privacy, a lot of controversies exists as most people are unaware of their right to privacy. People use internet services where they input sensitive personal or medical data. Most online platforms such as social media have become a significant source of traffic for advertising consumer products and services.
Most websites use the information which the users enter and optimize the searches on the internet. Search engines such as Google use browser cookies to direct specific ads to some clients depending on the critical works in the history of individual searches. Online targeted adverts seem like exploitation of internet users or a form of manipulating people to buy some products from an online store. The psychology of the ads employs smart algorithms which use human information to identify what someone likes on the internet. It is a form of attracting potential clients or generating substantial traffic to a website. As the online adverts become a social issue, there is a need for awareness concerning the impacts of sharing personal or medical info over the internet. Some people claim that information leakage leads to misuse of human information and hence there is a need to educate individuals on temporary and lasting consequences of sharing personal info.
2. Personal Data
In Europe, personal info means more than human names alone. A simple detail is shown in the identification documents, bills, and other critical documents which reveal the identity of an individual. Information is a broad field of knowledge which helps Europeans to be aware of their cultural identity, internet addresses, and even critical locational data. In Europe and other modern countries with advanced internet infrastructure, an IP address is personal information which is essential for human identification (ICO, 2018). Own names, addresses, and location data identifies are used to keep a human updated with the time of his location since it is provided by the satellites, and hence information plays an essential role in the process of identifying what people who use the internet. Internet service users do love various things which they search on the internet in their life and the intelligence gathered is then applied in designing catchy adverts which generate traffic to people and benefit some individuals.
There is various information which people input in website forms to open accounts on th.
Support for the keynote "Data, Ethics and Health Care,”, Keynote, Creating Value in Health Care through Innovation Management, May 16,2019, Deusto, San Sebastien
5 healthcare technology transformation trends to watch out for in 2017Rahul Gupta
Healthcare is all set to undergo a massive technology/ Digital transformation in 2017. The slides talk about the current challenges faced by the US Healthcare sector, the key technology transformation to watch out for and how they stack up on the hype cycle
The COVID19 Pandemic moved us a decade ahead in telemedicine. Primary and urgent care is being transformed with changes in consumer and patient expectations, improvements in telemedicine and monitoring technology, and consumer appetite for the consumption of these services. Medicare's recent favorable reimbursement has driven adoption with these drivers. Primary care, in particular, is being transformed. Care models are being reinvented and the practice of primary care is morphing from in - office episodic visits to multimodal in person, virtual, and continuous monitoring care.
How Fitness And Wellness Apps Are Transforming The Healthcare Industry In Los...Moon Technolabs Pvt. Ltd.
Are you curious about fitness app solutions in USA? Perhaps you’re wondering whether they’re a difference at all or not. Well, this write-up will clarify your doubts.
This is the annotated and expanded version of WEGO Health’s presentation at the FDA’s Public Hearing and the Health Activist Social Media Survey results with graphs and explanations.
The Incredible Ways Artificial Intelligence Is Now Used In Mental HealthBernard Marr
The world is facing a mental health crisis. With a shortage of mental health professionals, individuals not seeking treatment due to lack of access or high costs, and a significant rise in mental health conditions, artificial intelligence (AI) tools are being assessed and used to create solutions to help support people’s mental health.
Social Media and Medicine: Fad or Shift?Gregg Masters
A social media tutorial for client medical group, including details on physician immersion in the broadly cast "digital health channel'. Some key trends in digital health, including both primary and secondary market research are recapped to suggest certain forward implications for a 'cloud based web presence'. Is social media a fad, I don't think empirical evidence would suggest such a conclusion.
Once the testing process is completed, a telemedicine app is deployed to the app store. There are many factors that are required to be checked while publishing an app especially when it belongs to the healthcare industry. These factors should be taken care of stringently.
To know more visit- https://www.sparxitsolutions.com/blog/telemedicine-app/
The Illinois Health Information Exchange (ILHIE) has just released its Consumer Education Health IT Toolkit. It was developed to provide healthcare professionals with simple and informative educational material to share with their patients. Consumer education and engagement are cornerstones for the implementation of a successful state health IT program.
Wego Health FDA Post Presentation Data Pptguest4c357f
Annotated and expanded version of WEGO Health’s presentation at the FDA’s Public Hearing and the Health Activist Social Media Survey results with graphs and explanations.
Dose of Digital FDA Pharma Social Media Hearing Testimony - Corrective Inform...Jonathan Richman
This is my testimony that I will present to the FDA at the upcoming hearings on the use of social communications in pharma. This specifically will address their question regarding "what parameters should apply to the posting of corrective information on Web sites controlled by third parties?"
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
The potential benefits of mobile medical technology and telemedicine are enormous, from better quality of life to saving lives, not to mention controlling healthcare costs. Yet keeping data safe when it is beyond the confines of hospitals and clinics is a serious challenge, one that cannot be met merely through regulatory compliance. In these slides I show why HIPAA compliant is not the same as being secure, and why protecting health data on mobile devices is a such a big security challenge.
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docxtodd271
Running head: DATA PRIVACY 1
DATA PRIVACY 10
Short- and Long-Term Effects of Sharing Personal and Medical Data
1. Introduction
The advancement in technology has led to the production of a large volume of human information for economic and medicinal uses. Information plays a significant part in the identification of social issues and helps effective device solutions to daily problems in human life. Although personal and medical info is essential, there are at times when people who have access to the data misuse it for financial gains. When it comes to data privacy, a lot of controversies exists as most people are unaware of their right to privacy. People use internet services where they input sensitive personal or medical data. Most online platforms such as social media have become a significant source of traffic for advertising consumer products and services.
Most websites use the information which the users enter and optimize the searches on the internet. Search engines such as Google use browser cookies to direct specific ads to some clients depending on the critical works in the history of individual searches. Online targeted adverts seem like exploitation of internet users or a form of manipulating people to buy some products from an online store. The psychology of the ads employs smart algorithms which use human information to identify what someone likes on the internet. It is a form of attracting potential clients or generating substantial traffic to a website. As the online adverts become a social issue, there is a need for awareness concerning the impacts of sharing personal or medical info over the internet. Some people claim that information leakage leads to misuse of human information and hence there is a need to educate individuals on temporary and lasting consequences of sharing personal info.
2. Personal Data
In Europe, personal info means more than human names alone. A simple detail is shown in the identification documents, bills, and other critical documents which reveal the identity of an individual. Information is a broad field of knowledge which helps Europeans to be aware of their cultural identity, internet addresses, and even critical locational data. In Europe and other modern countries with advanced internet infrastructure, an IP address is personal information which is essential for human identification (ICO, 2018). Own names, addresses, and location data identifies are used to keep a human updated with the time of his location since it is provided by the satellites, and hence information plays an essential role in the process of identifying what people who use the internet. Internet service users do love various things which they search on the internet in their life and the intelligence gathered is then applied in designing catchy adverts which generate traffic to people and benefit some individuals.
There is various information which people input in website forms to open accounts on th.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
On April 19th, Ipsos MORI presented the results of a newly published study commissioned by the Wellcome Trust on attitudes to commercial access to health data as part of a panel discussion for industry and health sector representatives.
The work was an extensive and robust piece of social research, comprising 16 deliberative workshops with members of the public, patients, cohort study members and healthcare professionals and a follow-up face-to-face survey with over 2,000 UK adults.
We are delighted that this work has helped feed wider debate on issues surrounding commercial access to health data, challenges and solutions.
Full report: https://www.ipsos-mori.com/researchpublications/publications/1803/Commercial-access-to-health-data.aspx
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
Upon completion of this module you will:
- Be able to recognize the necessity of regulating big data
- Understand the difference between privacy and data protection
- Know how to implement actions of data protection into your own (future) company
Duration of the module: approximately 1 – 2 hours
Part of the "2016 Annual Conference: Big Data, Health Law, and Bioethics" held at Harvard Law School on May 6, 2016.
This conference aimed to: (1) identify the various ways in which law and ethics intersect with the use of big data in health care and health research, particularly in the United States; (2) understand the way U.S. law (and potentially other legal systems) currently promotes or stands as an obstacle to these potential uses; (3) determine what might be learned from the legal and ethical treatment of uses of big data in other sectors and countries; and (4) examine potential solutions (industry best practices, common law, legislative, executive, domestic and international) for better use of big data in health care and health research in the U.S.
The Petrie-Flom Center for Health Law Policy, Biotechnology, and Bioethics at Harvard Law School 2016 annual conference was organized in collaboration with the Berkman Center for Internet & Society at Harvard University and the Health Ethics and Policy Lab, University of Zurich.
Learn more at http://petrieflom.law.harvard.edu/events/details/2016-annual-conference.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Unprecedented Technological Trends Push the Envelope in Life SciencesCognizant
The life sciences and pharmaceuticals industry is facing startling digitizational changes on many levels, with these five key technology trends setting the pace: bundling products and services, edge analytics, human augmentation, automation and AI, and patient data ownership.
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
Today, balancing business opportunity and customer's data protection has become a difficult challenge. As technology, data sources and targeting abilities grow, so does the crucial need to respect user privacy and ensure a good data protection. But with laws, practices and definitions that are constantly evolving around the world, it can all seem a bit confusing.
Not sure where to start? Wondering how you can better align with privacy law? Then this webinar is for you.
It is indeed boom time for Big Data in Healthcare. According to CBE insights, Big Data startups garnered USD 400M in investors funding in first half 2014 as compared to USD133M in the whole of 2013.
International Cancer Survivors Day is celebrated during June, placing the spotlight not only on cancer survivors, but also their caregivers.
CANSA has compiled a list of tips and guidelines of support:
https://cansa.org.za/who-cares-for-cancer-patients-caregivers/
PET CT beginners Guide covers some of the underrepresented topics in PET CTMiadAlsulami
This lecture briefly covers some of the underrepresented topics in Molecular imaging with cases , such as:
- Primary pleural tumors and pleural metastases.
- Distinguishing between MPM and Talc Pleurodesis.
- Urological tumors.
- The role of FDG PET in NET.
Under Pressure : Kenneth Kruk's StrategyKenneth Kruk
Kenneth Kruk's story of transforming challenges into opportunities by leading successful medical record transitions and bridging scientific knowledge gaps during COVID-19.
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...rightmanforbloodline
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardson, Verified Chapters 1 - 18, Complete Newest Version
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardson, Verified Chapters 1 - 18, Complete Newest Version
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardson, Verified Chapters 1 - 18, Complete Newest Version
DECODING THE RISKS - ALCOHOL, TOBACCO & DRUGS.pdfDr Rachana Gujar
Introduction: Substance use education is crucial due to its prevalence and societal impact.
Alcohol Use: Immediate and long-term risks include impaired judgment, health issues, and social consequences.
Tobacco Use: Immediate effects include increased heart rate, while long-term risks encompass cancer and heart disease.
Drug Use: Risks vary depending on the drug type, including health and psychological implications.
Prevention Strategies: Education, healthy coping mechanisms, community support, and policies are vital in preventing substance use.
Harm Reduction Strategies: Safe use practices, medication-assisted treatment, and naloxone availability aim to reduce harm.
Seeking Help for Addiction: Recognizing signs, available treatments, support systems, and resources are essential for recovery.
Personal Stories: Real stories of recovery emphasize hope and resilience.
Interactive Q&A: Engage the audience and encourage discussion.
Conclusion: Recap key points and emphasize the importance of awareness, prevention, and seeking help.
Resources: Provide contact information and links for further support.
Rate Controlled Drug Delivery Systems, Activation Modulated Drug Delivery Systems, Mechanically activated, pH activated, Enzyme activated, Osmotic activated Drug Delivery Systems, Feedback regulated Drug Delivery Systems systems are discussed here.
Chandrima Spa Ajman is one of the leading Massage Center in Ajman, which is open 24 hours exclusively for men. Being one of the most affordable Spa in Ajman, we offer Body to Body massage, Kerala Massage, Malayali Massage, Indian Massage, Pakistani Massage Russian massage, Thai massage, Swedish massage, Hot Stone Massage, Deep Tissue Massage, and many more. Indulge in the ultimate massage experience and book your appointment today. We are confident that you will leave our Massage spa feeling refreshed, rejuvenated, and ready to take on the world.
Visit : https://massagespaajman.com/
Call : 052 987 1315
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...The Lifesciences Magazine
Deep Leg Vein Thrombosis occurs when a blood clot forms in one or more of the deep veins in the legs. These clots can impede blood flow, leading to severe complications.
INFECTION OF THE BRAIN -ENCEPHALITIS ( PPT)blessyjannu21
Neurological system includes brain and spinal cord. It plays an important role in functioning of our body. Encephalitis is the inflammation of the brain. Causes include viral infections, infections from insect bites or an autoimmune reaction that affects the brain. It can be life-threatening or cause long-term complications. Treatment varies, but most people require hospitalization so they can receive intensive treatment, including life support.
Cold Sores: Causes, Treatments, and Prevention Strategies | The Lifesciences ...The Lifesciences Magazine
Cold Sores, medically known as herpes labialis, are caused by the herpes simplex virus (HSV). HSV-1 is primarily responsible for cold sores, although HSV-2 can also contribute in some cases.
About this webinar: This talk will introduce what cancer rehabilitation is, where it fits into the cancer trajectory, and who can benefit from it. In addition, the current landscape of cancer rehabilitation in Canada will be discussed and the need for advocacy to increase access to this essential component of cancer care.
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Habitat Breakfast Session - 6th Nov 2014
1. Privacy and mobile health: how to
reduce our apptimism*
* an unrealistic belief that apps solve every health problem
Prof Jeremy Wyatt, University of Leeds
Acknowledgements: Prof Justin Keen & Dr Jon Fistein
2. Outline
1. Our data and why “anonymised” no longer means
much
2. How did we share our data in the pre-mobile era ?
3. How do social media & mobile change this ?
4. Does this “mHealth privacy gap” matter ?
5. How professionals & the NHS manage your data
6. What options do you have if this worries you ?
7. Conclusions
3. 1. What is “Our data” ?
Information about us which:
We feel is ours
If revealed without permission could make us feel
bad
Could also affect our reputation or prospects - of
education, a job, social status, insurance,
marriage…
4. Some views about who controls my data
It’s all mine and no-one can touch it unless I say
so – not even researchers, security services etc.
It’s mine and I don’t want it published, but if
society needs access it can look - as long as it
takes care
There is no personal data: all data belong to the
State
5. Guess who said this:
“We’re … opening up the vast amounts of data generated in
our health service. From this month huge amounts of new data
are going to be released online. We’re going to consult on
actually changing the NHS constitution so that the default
setting is for patients’ data to be used for research unless of
course they want to opt out. Now let me be clear, this does not
threaten privacy, it doesn’t mean anyone can look at your
health records but it does mean using anonymous data to
make new medical breakthroughs... Now the end result will
be… that every time you use the NHS you’re playing a part in
the fight against disease at home and around the world.”
6. Open personal data
Voter registration
House prices
Care.data – health
HMRC tax records
7. How easy is it to identify you with no name ?
87% of US residents can be identified from
age (not dob), sex, zip code (5 digits)
HES contains all hospital admissions from
2001, partial postcode, sex and dob !
Personal fitness data eg. Fitbit – can infer
height, weight, gender from data; adding
location makes it 100% unique,
8. 2. Ways we already share data with companies
Loyalty cards
Motor insurance
Mailing lists & census data
Web searches and mobile phones
9. Loyalty cards
We trade very small benefits for big companies
knowing all about our shopping habits:
They know our fruit & veg, alcohol, contraceptive,
OTC medicine purchases, clothing sizes, kid’s
ages…
Man who discovered daughter was pregnant from
supermarket vouchers
What use do they make of this knowledge – as
well as putting the pasta sauce next to spaghetti
?
10. Motor insurance
They know our driving history, type of car,
miles per year, names of extended family,
accidents
Telemetric insurance – box under bonnet
measures location, speed, acceleration,
braking, time of day / night to calculate risk &
monthly premium
Industry share data “to prevent fraud”
11. How our data is shared in the information age
Google searches
Gmail - adverts
Web cookies – just adverts ?
Social media - adverts
Location of our phone
Apps
13. How do Google traffic maps work ?
Cambridge traffic at 0600, 12-3-
Since 2012, Google 14
captures GPS data from
Android phones, then
processes it to give
average speeds
http://googleblog.blogsp
ot.co.uk/2009/08/bright-side-
of-sitting-in-traffic.
html
14. 3. Smart phone apps and beyond
Apple’s App store contains > 1,000,000 apps
32,000 lifestyle & 25,000 medical apps
http://148apps.biz/app-store-metrics/?mpage=catcount
3,000,000,000 downloads in December
2013, costing $1,000,000,000
http://www.apple.com/pr/library/2014/01/07App-Store-Sales-Top-10-Billion-in-2013.htmli
https://openclipart.org/detail/182175/white-iphone-5-by-barrettward-182175
15. Privacy and mHealth apps
Permissions requested: use accounts,
modify USB, read phone ID, find files,
full net access, view connections…
Our study of 80 apps: average of 4
clear privacy breaches for health apps,
only 1 for medical apps
We know that - we read the Terms &
Conditions ! (this one only 1200 words,
but many much longer…)
First Folio As You Like It Public Domain Photo taken by Cowardly
Lion - Folio Society edition of 1996
With Hannah Panayiotou & Anam Noel,
Leeds medical students
16. Data brokers
“Even as you’re reading this, your smart
phone can reveal your location… data
brokers are going to know more about us
than we know ourselves”. – Madhumita
Venkataraman, Wired Nov 2014
17. Data you are currently sharing
Any phone – call data record (unique phone ID,
phone no. called, time, location – every 7
seconds)
Smart phone:
Wifi networks – unique MAC id (Viasense wifi
sniffers)
Apps: everything you browse (WebMD); pregnancy
due date (MyPregnancyToday), name, email, height,
weight (Fitbit)
18. The data market
Data sources Data aggregators
Smart phone
Credit agency
Open data
(electoral roll
etc.)
Social media
Marketing agency
Insurance data
Data users
Advertising
Financial services
Insurance industry
brokers Health services ?
Your
purchase
s
and
behaviou
r
Browsing history
Purchase history
(online, point of
sale)
19. 4. Does it matter - how companies use your data
Tailored mailings (everyone), tailored vouchers (eg. Tesco
Clubcard)
Tailored adverts on web (Doubleclick, Eyeota, Experian…),
Tailored adverts in shopfronts – Tesco, Godiva (Shoppertrak
instore wifi sensors)
Tailored products shown on websites, eg. CapitalOne cards – [x+1]
website tracker product (200mS to generate your profile)
Tailored critical illness insurance – Inst of Actuaries, based on
HES data
Make money – Facebook make £4 & Google £12 selling your
cookie data to advertisers
Total US interactive advertising market 2013: $43Bn
20. The Amscreen technology
You stand outside a shop
you want to
enter shop
TV camera TV screen
Quividi algorithm
Shop’s product database
your age,
gender
time, location,
stock levels
images of suitable
items, given age,
gender, location, time
21. 5. Health data: professional ethics
GMC and other professional bodies:
obligation on clinicians to protect all personal
data to best of their ability
Exceptions:
Notifiable diseases
High risk of immediate harm to others
22. How your GP and hospital manage your data
Personal data captured by GPs & hospitals is
governed by Caldicott 2 principles
All data for management, research, quality
improvement etc. must be stripped of identifiers
Caldicott Guardians help resolve grey areas
Central data returns to HSCIC:
National Hospital Episode Statistics
Many national audits on specific diseases
GPs may have to send in their data soon
23. Caldicott 2 principles
Justify the purpose(s)
Don't use patient identifiable information unless it is
necessary
Use the minimum necessary patient-identifiable information
Access to patient identifiable information should be on a
strict need-to-know basis
Everyone with access to patient identifiable information
should be aware of their responsibilities
Understand and comply with the law
The duty to share information can be as important as the
duty to protect patient confidentiality.
24. Three categories of data the NHS recognises
Category of data Example How NHS manages it
1. Personal level
My diagnosis, blood
identifiable data
results
Access by health professionals with a
smart ID card and “legitimate
relationship” only; audit trail of access
2. Aggregated
data
Average waiting
time; rate of
anaemia
Open publication - NHSChoices etc.
3. Everything else
– ie. anonymised
personal level
data
Blood results for the
last 1000 patients
Secure “safe haven” to which
researchers must log in after getting
ethical approval, & where their actions
are monitored
25. 6. What options do you have if this worries you ?
Option Pros Cons
1. Do nothing, ignore it, it’ll
go away
Simple You get manipulated &
your life choices may
reduce
2. Take an informed,
sceptical approach to
apps & data sharing
Should improve your life a
bit
Untidy, never know if it’s
helping or not
3. Explore user controlled
data schemes
Empowers you by
controlling your data
Few organisations can
cope with it yet
4. Become a complete
data recluse
No erosion of privacy No smart phone, apps,
social media…
26. Some questions to ask of any app before using it
1. Who published this app ?
2. Who is it for, and what is the purpose ?
3. Where does my data go after it leaves the
app ?
4. Where did the content come from, and when ?
5. Is its advice accurate ?
6. Is there any evidence that it actually works ?
(work of Leeds, Warwick & Coventry Universities & UCL, in
collaboration with the Royal College of Physicians, London)
27. Our Data Mutual - www.ourdatamutual.org
OUR MANIFESTO
ONE
Our data has a value. We want a cut of that value - and a say in how it's used.
TWO
We want our data to be used for good.
THREE
No one is responsible for protecting us from abuse of our data, so we're creating 'our data
mutual' to protect ourselves.
28. MyDex
We provide you with a hyper-secure storage
area so you can manage your personal
data your way, from any aspect of your life.
This includes text, numbers, images, video,
certificates and sound.
No-one but the individual can access or see the
data
https://mydex.org/ - a social enterprise
29. Patients know best www.patientsknowbest.com
We put patients in control of their medical
records. Everyone benefits, including
clinicians, researchers and charities
We are a social enterprise, and our mission
is that patients know best
BMJ online poll: 58% of 667 responders
voted in favour of giving patients control of
their records
30. MiData www.midatalab.org.uk/midata-explained
Midata programme (from BIS) encourages companies to hand
personal transaction data they hold back to customers in machine
readable format so they can use the data for their own purposes
MiData means every individual can get not just their personal
data back but also valuable proof of relationships - ID Assurance
ID Assurance means using third-party evidence to prove claims,
for example of name or address.
In paper world we do this with documents such as a passport or
electricity bill. Midata delivers electronic versions of these.
Properly encrypted and signed, these help build up to a
trustworthy online identity people can use to get things done.
31. 7. Conclusions
1. We knowingly (?) trade off our privacy for benefits
2. Your GP and hospital work hard to protect your data
3. Google, Facebook, Experian and now HSCIC don’t
4. They trade your data as a commodity in a $43Bn+
global business
5. The EU is tightening up data protection law soon, which
may help a bit
6. Meanwhile, you have several options to protect your
data, including (soon) to control all your data yourself
32.
33. The Law
EU Data Protection Directive now
UK Data Protection Act
EU Data Protection Regulation from 2015
Human Rights Act right to privacy
34. Current UK law
Eight data protection principles:
1. Fair processing: consent, vital interests or legal requirement to
process data
2. Obtained only for specified purpose
3. Relevant, not excessive for purpose
4. Accurate and kept up to date
5. Not kept longer than needed
6. Processed according to rights of data subjects
7. Protection against unauthorised access or loss of data
8. Not transferred outside EU
35. Additional requirements for processing sensitive
data
Explicit consent*
Necessary to comply with law, or in course of legal proceedings
Necessary to protect vital interests of individual or another person
Carried out by not for profit & not disclosed elsewhere
Individual has published their data
Necessary for statutory or government functions (eg. RIP), carried out by
health professional & necessary for medical purposes
Necessary to monitor equal opportunity
* …”any freely given specific and informed indication of his wishes by which the
data subject signifies his agreement to personal data relating to him being
processed”.
36. EU General Data Protection Regulation 2015
Data controllers must be able to prove consent (opt-in – eg.
cookies must ask for permission)
Consent may be withdrawn
Limited consent: scope and timescale
Right to erasure (replaced right to be forgotten)
Privacy by design; privacy defaults to highest setting
Sanctions: fine of up to 100M EUR or 5% of annual
worldwide turnover, whichever is greater
Data Protection Impact Assessments to be conducted
when specific risks may occur to rights or freedoms of data
subjects