메뉴 건너뛰기




Volumn 17, Issue 4, 2008, Pages 429-440

An architecture for privacy in a networked health information environment

Author keywords

[No Author keywords available]

Indexed keywords

BIOLOGY; COMPUTER NETWORK; CONFIDENTIALITY; EPIDEMIOLOGY; ETHICS; HEALTH CARE DELIVERY; HUMAN; INTERNATIONAL COOPERATION; ORGANIZATION AND MANAGEMENT; PERSONAL AUTONOMY; PRIVACY; REVIEW; STANDARD; TRUST; UNITED STATES;

EID: 50249170976     PISSN: 09631801     EISSN: 14692147     Source Type: Journal    
DOI: 10.1017/S0963180108080559     Document Type: Review
Times cited : (8)

References (37)
  • 1
    • 0347901898 scopus 로고    scopus 로고
    • Article, Available at
    • United Nations. Universal Declaration of Human Rights, Article 12. Available at http://www.nps.gov/elro/teach-er-vk/documents/udhr.htm.
    • Universal Declaration of Human Rights , pp. 12
  • 2
    • 50249186767 scopus 로고    scopus 로고
    • Naser C, Alpert S. Protecting the privacy of medical records: An ethical analysis (White Paper). Lexington, MA: National Coalition for Patient Rights; 1999.
    • Naser C, Alpert S. Protecting the privacy of medical records: An ethical analysis (White Paper). Lexington, MA: National Coalition for Patient Rights; 1999.
  • 3
    • 50249101510 scopus 로고    scopus 로고
    • The EU Directive mentioned above similarly treats medical violations of privacy as particularly egregious cases
    • The EU Directive mentioned above similarly treats medical violations of privacy as particularly egregious cases.
  • 4
    • 50249161827 scopus 로고    scopus 로고
    • See note 2, Naser, Alpert 1999.
    • See note 2, Naser, Alpert 1999.
  • 5
    • 0038798802 scopus 로고    scopus 로고
    • Protecting medical privacy: Challenges in the age of genetic information
    • Alpert SA. Protecting medical privacy: Challenges in the age of genetic information. Journal of Social Issues 2003;59(2):301-22;
    • (2003) Journal of Social Issues , vol.59 , Issue.2 , pp. 301-322
    • Alpert, S.A.1
  • 8
    • 0346072233 scopus 로고    scopus 로고
    • Protecting privacy to improve health care
    • Goldman J. Protecting privacy to improve health care. Health Affairs 1998;17:47-60.
    • (1998) Health Affairs , vol.17 , pp. 47-60
    • Goldman, J.1
  • 9
    • 50249138653 scopus 로고    scopus 로고
    • See note 6, Goldman 1998.
    • See note 6, Goldman 1998.
  • 10
    • 0034330790 scopus 로고    scopus 로고
    • Virtually exposed: Privacy and e-health
    • Goldman J, Hudson Z. Virtually exposed: Privacy and e-health. Health Affairs 2000;19:140-8.
    • (2000) Health Affairs , vol.19 , pp. 140-148
    • Goldman, J.1    Hudson, Z.2
  • 11
    • 50249141071 scopus 로고    scopus 로고
    • These and more survey results can be found at the Electronic Privacy Information Center EPIC, 27 April, available at, accessed 27 May 2008
    • These and more survey results can be found at the Electronic Privacy Information Center (EPIC), 27 April 2007; available at http://www.epic.org/ privacy/survey/ (accessed 27 May 2008).
    • (2007)
  • 12
    • 50249147270 scopus 로고    scopus 로고
    • See note 5, Alpert 2003.
    • See note 5, Alpert 2003.
  • 13
    • 50249176915 scopus 로고    scopus 로고
    • See note 6, Goldman 1998.
    • See note 6, Goldman 1998.
  • 15
    • 0039677258 scopus 로고    scopus 로고
    • Privacy and individual empowerment in the interactive age
    • Bennett C, Grant R, eds, Toronto: University of Toronto Press;
    • Goldman J. Privacy and individual empowerment in the interactive age. In: Bennett C, Grant R, eds. Visions of Privacy: Policy Choices for a Digital Age. Toronto: University of Toronto Press; 1999.
    • (1999) Visions of Privacy: Policy Choices for a Digital Age
    • Goldman, J.1
  • 17
    • 50249153952 scopus 로고    scopus 로고
    • See note 14, Brandeis, Warren 1890.
    • See note 14, Brandeis, Warren 1890.
  • 18
    • 50249187528 scopus 로고    scopus 로고
    • See note 5, Westin 1967.
    • See note 5, Westin 1967.
  • 21
    • 50249150123 scopus 로고    scopus 로고
    • See note 5, Westin 1967.
    • See note 5, Westin 1967.
  • 22
    • 50249133523 scopus 로고    scopus 로고
    • See note 5, Alpert 2003.
    • See note 5, Alpert 2003.
  • 23
    • 50249139463 scopus 로고    scopus 로고
    • See note 5, Alpert 2003.
    • See note 5, Alpert 2003.
  • 24
    • 50249156732 scopus 로고    scopus 로고
    • See note 5, Alpert 2003.
    • See note 5, Alpert 2003.
  • 25
    • 50249147269 scopus 로고    scopus 로고
    • Of course the illicit use of data is not particular to the networked environment. What has changed, however, is the scope of potential violations: As the network expands and as the amount of data increases, so does the possibility of confidentiality violations. In addition, a networked environment facilitates the illicit acquisition (e.g, through theft) and dissemination of data. This is in large part due to digitalization of information, which is easier to store and to steal without its original owner even noticing
    • Of course the illicit use of data is not particular to the networked environment. What has changed, however, is the scope of potential violations: As the network expands and as the amount of data increases, so does the possibility of confidentiality violations. In addition, a networked environment facilitates the illicit acquisition (e.g., through theft) and dissemination of data. This is in large part due to digitalization of information, which is easier to store and to steal without its original owner even noticing.
  • 26
    • 0003529913 scopus 로고    scopus 로고
    • Health Privacy Working Group, available at
    • Health Privacy Working Group. Best Principles for Health Policy; 1999; available at http://www.healthprivacy.org/usr_doc/33807.pdf.
    • (1999) Best Principles for Health Policy
  • 27
    • 50249162992 scopus 로고    scopus 로고
    • The Register; available at, accessed 27 May 2008
    • The Register; available at http://www.theregister.co.uk/2005/04/21/ icam_surveillance_report/ (accessed 27 May 2008).
  • 28
    • 50249117525 scopus 로고    scopus 로고
    • United States Senate Committee on the Judiciary, 13 Apr 2005; available at http://judiciary.senate.gov/testimony.cfm?id=1437&wit_id=4161 (accessed 27 May 2008).
    • United States Senate Committee on the Judiciary, 13 Apr 2005; available at http://judiciary.senate.gov/testimony.cfm?id=1437&wit_id=4161 (accessed 27 May 2008).
  • 29
    • 50249173804 scopus 로고    scopus 로고
    • United States Senate Committee on the Judiciary, 13 Apr 2005; available at http://judiciary.senate.gov/testimony.cfm?id=1437&wit_id=4162 (accessed 27 May 2008).
    • United States Senate Committee on the Judiciary, 13 Apr 2005; available at http://judiciary.senate.gov/testimony.cfm?id=1437&wit_id=4162 (accessed 27 May 2008).
  • 30
    • 50249166450 scopus 로고    scopus 로고
    • For a listing of recent security breaches and data violations, see Privacy Rights Clearinghouse, 20 April 2005; avaliable at http://www. privacyrights.org/ar/ChronDataBreaches.htm (accessed 27 May 2008).
    • For a listing of recent security breaches and data violations, see Privacy Rights Clearinghouse, 20 April 2005; avaliable at http://www. privacyrights.org/ar/ChronDataBreaches.htm (accessed 27 May 2008).
  • 31
    • 50249129494 scopus 로고    scopus 로고
    • See note 24, Health Privacy Working Group 1999.
    • See note 24, Health Privacy Working Group 1999.
  • 32
    • 50249177487 scopus 로고    scopus 로고
    • In particular, we have reviewed laws in three jurisdictions: The United States, including the 1973 Fair Information Practices and the 1974 Privacy Act; the OECD, including the 1980 Guidelines on the Protection of Privacy and Transborder Flows of Personal Data; and Canada, including the 1995 Canadian Standards Association Model Code for the Protection of Personal Information. More information about these and other existing Fair Information Practices can be found at the web site for The Privacy Rights Clearinghouse, a non-profit consumer group located in California; updated Feb 2004; available at http://www.privacyrights.org/ar/fairinfo.htm (accessed 27 May 2008).
    • In particular, we have reviewed laws in three jurisdictions: The United States, including the 1973 Fair Information Practices and the 1974 Privacy Act; the OECD, including the 1980 Guidelines on the Protection of Privacy and Transborder Flows of Personal Data; and Canada, including the 1995 Canadian Standards Association Model Code for the Protection of Personal Information. More information about these and other existing Fair Information Practices can be found at the web site for The Privacy Rights Clearinghouse, a non-profit consumer group located in California; updated Feb 2004; available at http://www.privacyrights.org/ar/fairinfo.htm (accessed 27 May 2008).
  • 33
    • 50249106200 scopus 로고    scopus 로고
    • Any provisions for informed consent need to be drafted in such a way that ensures the sharing of information is not unduly cumbersome on data users. It is probably unrealistic to assume that patients can or should give their assent to each and every use of their medical data
    • Any provisions for informed consent need to be drafted in such a way that ensures the sharing of information is not unduly cumbersome on data users. It is probably unrealistic to assume that patients can or should give their assent to each and every use of their medical data.
  • 34
    • 50249151231 scopus 로고    scopus 로고
    • Valid concerns have been raised, however, that such a centralization may create additional security vulnerabilities
    • Valid concerns have been raised, however, that such a centralization may create additional security vulnerabilities.
  • 35
    • 50249138094 scopus 로고    scopus 로고
    • Sometimes, it is important to recognize that the flexibility of opt-out provisions is limited by what is technologically feasible. It goes without saying that any steps or provisions taken to protect confidentiality need to take account of what is possible with our existing technology. At the same time, however, technical limitations should never be used to justify breaches of confidentiality or privacy
    • Sometimes, it is important to recognize that the flexibility of opt-out provisions is limited by what is technologically feasible. It goes without saying that any steps or provisions taken to protect confidentiality need to take account of what is possible with our existing technology. At the same time, however, technical limitations should never be used to justify breaches of confidentiality or privacy.
  • 36
    • 50249149364 scopus 로고    scopus 로고
    • Solove D, Hoofnagle C. A model regime of privacy protection. Public Law Research Paper No. 132. Washington, DC: George Washington University Law School; 2005; available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=681902.
    • Solove D, Hoofnagle C. A model regime of privacy protection. Public Law Research Paper No. 132. Washington, DC: George Washington University Law School; 2005; available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=681902.
  • 37
    • 50249176914 scopus 로고    scopus 로고
    • It is also worth noting that some observers have suggested that penalties for abuses should be strengthened in order to act as a deterrent against future abuses
    • It is also worth noting that some observers have suggested that penalties for abuses should be strengthened in order to act as a deterrent against future abuses.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.