-
1
-
-
0347901898
-
-
Article, Available at
-
United Nations. Universal Declaration of Human Rights, Article 12. Available at http://www.nps.gov/elro/teach-er-vk/documents/udhr.htm.
-
Universal Declaration of Human Rights
, pp. 12
-
-
-
2
-
-
50249186767
-
-
Naser C, Alpert S. Protecting the privacy of medical records: An ethical analysis (White Paper). Lexington, MA: National Coalition for Patient Rights; 1999.
-
Naser C, Alpert S. Protecting the privacy of medical records: An ethical analysis (White Paper). Lexington, MA: National Coalition for Patient Rights; 1999.
-
-
-
-
3
-
-
50249101510
-
-
The EU Directive mentioned above similarly treats medical violations of privacy as particularly egregious cases
-
The EU Directive mentioned above similarly treats medical violations of privacy as particularly egregious cases.
-
-
-
-
4
-
-
50249161827
-
-
See note 2, Naser, Alpert 1999.
-
See note 2, Naser, Alpert 1999.
-
-
-
-
5
-
-
0038798802
-
Protecting medical privacy: Challenges in the age of genetic information
-
Alpert SA. Protecting medical privacy: Challenges in the age of genetic information. Journal of Social Issues 2003;59(2):301-22;
-
(2003)
Journal of Social Issues
, vol.59
, Issue.2
, pp. 301-322
-
-
Alpert, S.A.1
-
8
-
-
0346072233
-
Protecting privacy to improve health care
-
Goldman J. Protecting privacy to improve health care. Health Affairs 1998;17:47-60.
-
(1998)
Health Affairs
, vol.17
, pp. 47-60
-
-
Goldman, J.1
-
9
-
-
50249138653
-
-
See note 6, Goldman 1998.
-
See note 6, Goldman 1998.
-
-
-
-
10
-
-
0034330790
-
Virtually exposed: Privacy and e-health
-
Goldman J, Hudson Z. Virtually exposed: Privacy and e-health. Health Affairs 2000;19:140-8.
-
(2000)
Health Affairs
, vol.19
, pp. 140-148
-
-
Goldman, J.1
Hudson, Z.2
-
11
-
-
50249141071
-
-
These and more survey results can be found at the Electronic Privacy Information Center EPIC, 27 April, available at, accessed 27 May 2008
-
These and more survey results can be found at the Electronic Privacy Information Center (EPIC), 27 April 2007; available at http://www.epic.org/ privacy/survey/ (accessed 27 May 2008).
-
(2007)
-
-
-
12
-
-
50249147270
-
-
See note 5, Alpert 2003.
-
See note 5, Alpert 2003.
-
-
-
-
13
-
-
50249176915
-
-
See note 6, Goldman 1998.
-
See note 6, Goldman 1998.
-
-
-
-
15
-
-
0039677258
-
Privacy and individual empowerment in the interactive age
-
Bennett C, Grant R, eds, Toronto: University of Toronto Press;
-
Goldman J. Privacy and individual empowerment in the interactive age. In: Bennett C, Grant R, eds. Visions of Privacy: Policy Choices for a Digital Age. Toronto: University of Toronto Press; 1999.
-
(1999)
Visions of Privacy: Policy Choices for a Digital Age
-
-
Goldman, J.1
-
17
-
-
50249153952
-
-
See note 14, Brandeis, Warren 1890.
-
See note 14, Brandeis, Warren 1890.
-
-
-
-
18
-
-
50249187528
-
-
See note 5, Westin 1967.
-
See note 5, Westin 1967.
-
-
-
-
21
-
-
50249150123
-
-
See note 5, Westin 1967.
-
See note 5, Westin 1967.
-
-
-
-
22
-
-
50249133523
-
-
See note 5, Alpert 2003.
-
See note 5, Alpert 2003.
-
-
-
-
23
-
-
50249139463
-
-
See note 5, Alpert 2003.
-
See note 5, Alpert 2003.
-
-
-
-
24
-
-
50249156732
-
-
See note 5, Alpert 2003.
-
See note 5, Alpert 2003.
-
-
-
-
25
-
-
50249147269
-
-
Of course the illicit use of data is not particular to the networked environment. What has changed, however, is the scope of potential violations: As the network expands and as the amount of data increases, so does the possibility of confidentiality violations. In addition, a networked environment facilitates the illicit acquisition (e.g, through theft) and dissemination of data. This is in large part due to digitalization of information, which is easier to store and to steal without its original owner even noticing
-
Of course the illicit use of data is not particular to the networked environment. What has changed, however, is the scope of potential violations: As the network expands and as the amount of data increases, so does the possibility of confidentiality violations. In addition, a networked environment facilitates the illicit acquisition (e.g., through theft) and dissemination of data. This is in large part due to digitalization of information, which is easier to store and to steal without its original owner even noticing.
-
-
-
-
26
-
-
0003529913
-
-
Health Privacy Working Group, available at
-
Health Privacy Working Group. Best Principles for Health Policy; 1999; available at http://www.healthprivacy.org/usr_doc/33807.pdf.
-
(1999)
Best Principles for Health Policy
-
-
-
27
-
-
50249162992
-
-
The Register; available at, accessed 27 May 2008
-
The Register; available at http://www.theregister.co.uk/2005/04/21/ icam_surveillance_report/ (accessed 27 May 2008).
-
-
-
-
28
-
-
50249117525
-
-
United States Senate Committee on the Judiciary, 13 Apr 2005; available at http://judiciary.senate.gov/testimony.cfm?id=1437&wit_id=4161 (accessed 27 May 2008).
-
United States Senate Committee on the Judiciary, 13 Apr 2005; available at http://judiciary.senate.gov/testimony.cfm?id=1437&wit_id=4161 (accessed 27 May 2008).
-
-
-
-
29
-
-
50249173804
-
-
United States Senate Committee on the Judiciary, 13 Apr 2005; available at http://judiciary.senate.gov/testimony.cfm?id=1437&wit_id=4162 (accessed 27 May 2008).
-
United States Senate Committee on the Judiciary, 13 Apr 2005; available at http://judiciary.senate.gov/testimony.cfm?id=1437&wit_id=4162 (accessed 27 May 2008).
-
-
-
-
30
-
-
50249166450
-
-
For a listing of recent security breaches and data violations, see Privacy Rights Clearinghouse, 20 April 2005; avaliable at http://www. privacyrights.org/ar/ChronDataBreaches.htm (accessed 27 May 2008).
-
For a listing of recent security breaches and data violations, see Privacy Rights Clearinghouse, 20 April 2005; avaliable at http://www. privacyrights.org/ar/ChronDataBreaches.htm (accessed 27 May 2008).
-
-
-
-
31
-
-
50249129494
-
-
See note 24, Health Privacy Working Group 1999.
-
See note 24, Health Privacy Working Group 1999.
-
-
-
-
32
-
-
50249177487
-
-
In particular, we have reviewed laws in three jurisdictions: The United States, including the 1973 Fair Information Practices and the 1974 Privacy Act; the OECD, including the 1980 Guidelines on the Protection of Privacy and Transborder Flows of Personal Data; and Canada, including the 1995 Canadian Standards Association Model Code for the Protection of Personal Information. More information about these and other existing Fair Information Practices can be found at the web site for The Privacy Rights Clearinghouse, a non-profit consumer group located in California; updated Feb 2004; available at http://www.privacyrights.org/ar/fairinfo.htm (accessed 27 May 2008).
-
In particular, we have reviewed laws in three jurisdictions: The United States, including the 1973 Fair Information Practices and the 1974 Privacy Act; the OECD, including the 1980 Guidelines on the Protection of Privacy and Transborder Flows of Personal Data; and Canada, including the 1995 Canadian Standards Association Model Code for the Protection of Personal Information. More information about these and other existing Fair Information Practices can be found at the web site for The Privacy Rights Clearinghouse, a non-profit consumer group located in California; updated Feb 2004; available at http://www.privacyrights.org/ar/fairinfo.htm (accessed 27 May 2008).
-
-
-
-
33
-
-
50249106200
-
-
Any provisions for informed consent need to be drafted in such a way that ensures the sharing of information is not unduly cumbersome on data users. It is probably unrealistic to assume that patients can or should give their assent to each and every use of their medical data
-
Any provisions for informed consent need to be drafted in such a way that ensures the sharing of information is not unduly cumbersome on data users. It is probably unrealistic to assume that patients can or should give their assent to each and every use of their medical data.
-
-
-
-
34
-
-
50249151231
-
-
Valid concerns have been raised, however, that such a centralization may create additional security vulnerabilities
-
Valid concerns have been raised, however, that such a centralization may create additional security vulnerabilities.
-
-
-
-
35
-
-
50249138094
-
-
Sometimes, it is important to recognize that the flexibility of opt-out provisions is limited by what is technologically feasible. It goes without saying that any steps or provisions taken to protect confidentiality need to take account of what is possible with our existing technology. At the same time, however, technical limitations should never be used to justify breaches of confidentiality or privacy
-
Sometimes, it is important to recognize that the flexibility of opt-out provisions is limited by what is technologically feasible. It goes without saying that any steps or provisions taken to protect confidentiality need to take account of what is possible with our existing technology. At the same time, however, technical limitations should never be used to justify breaches of confidentiality or privacy.
-
-
-
-
36
-
-
50249149364
-
-
Solove D, Hoofnagle C. A model regime of privacy protection. Public Law Research Paper No. 132. Washington, DC: George Washington University Law School; 2005; available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=681902.
-
Solove D, Hoofnagle C. A model regime of privacy protection. Public Law Research Paper No. 132. Washington, DC: George Washington University Law School; 2005; available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=681902.
-
-
-
-
37
-
-
50249176914
-
-
It is also worth noting that some observers have suggested that penalties for abuses should be strengthened in order to act as a deterrent against future abuses
-
It is also worth noting that some observers have suggested that penalties for abuses should be strengthened in order to act as a deterrent against future abuses.
-
-
-
|