Protecting health privacy even when privacy is lost

被引:9
|
作者
Kasperbauer, T. J. [1 ]
机构
[1] Indiana Univ Sch Med, Ctr Bioeth, Indianapolis, IN 46202 USA
关键词
confidentiality; privacy; information technology;
D O I
10.1136/medethics-2019-105880
中图分类号
B82 [伦理学(道德学)];
学科分类号
摘要
The standard approach to protecting privacy in healthcare aims to control access to personal information. We cannot regain control of information after it has been shared, so we must restrict access from the start. This 'control' conception of privacy conflicts with data-intensive initiatives like precision medicine and learning health systems, as they require patients to give up significant control of their information. Without adequate alternatives to the control-based approach, such data-intensive programmes appear to require a loss of privacy. This paper argues that the control view of privacy is shortsighted and overlooks important ways to protect health information even when widely shared. To prepare for a world where we no longer control our data, we must pursue three alternative strategies: obfuscate health data, penalise the misuse of health data and improve transparency around who shares our data and for what purposes. Prioritising these strategies is necessary when health data are widely shared both within and outside of the health system.
引用
收藏
页码:768 / 772
页数:5
相关论文
共 50 条
  • [31] Lost in the Cloud: Cloud. Storage, Privacy, and Suggestions for Protecting Users' Data
    Johnson, Eric
    [J]. STANFORD LAW REVIEW, 2017, 69 (03) : 867 - 909
  • [33] WHEN PRIVACY THREATENS PUBLIC-HEALTH
    NEWCOMBE, HB
    [J]. CANADIAN JOURNAL OF PUBLIC HEALTH-REVUE CANADIENNE DE SANTE PUBLIQUE, 1995, 86 (03): : 188 - 192
  • [34] When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark
    Liu, Qin
    Yang, Jiamin
    Jiang, Hongbo
    Wu, Jie
    Peng, Tao
    Wang, Tian
    Wang, Guojun
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, : 590 - 599
  • [35] Protecting customer privacy when marketing with second-party data
    Schneider, Matthew J.
    Jagpal, Sharan
    Gupta, Sachin
    Li, Shaobo
    Yu, Yan
    [J]. INTERNATIONAL JOURNAL OF RESEARCH IN MARKETING, 2017, 34 (03) : 593 - 603
  • [36] Protecting health monitoring privacy in fitness training: A federated learning framework based on personalized differential privacy
    Shao, Lifang
    [J]. INTERNET TECHNOLOGY LETTERS, 2024,
  • [37] PrivSem: Protecting location privacy using semantic and differential privacy
    Li, Yanhui
    Cao, Xin
    Yuan, Ye
    Wang, Guoren
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2019, 22 (06): : 2407 - 2436
  • [38] Protecting location privacy and query privacy: a combined clustering approach
    Lin, Chi
    Wu, Guowei
    Yu, Chang Wu
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 3021 - 3043
  • [39] PrivSem: Protecting location privacy using semantic and differential privacy
    Yanhui Li
    Xin Cao
    Ye Yuan
    Guoren Wang
    [J]. World Wide Web, 2019, 22 : 2407 - 2436
  • [40] Protecting privacy? Government and parliamentary responsiveness to the privacy commissioner of Canada
    Bergman, Gwyneth
    Macfarlane, Emmett
    [J]. CANADIAN PUBLIC ADMINISTRATION-ADMINISTRATION PUBLIQUE DU CANADA, 2021, 64 (03): : 437 - 457