This wiki has undergone a migration to Confluence found Here
<meta name="googlebot" content="noindex">

Difference between revisions of ""Is Privacy Obsolete" Study Group Page""

From HL7Wiki
Jump to navigation Jump to search
 
(48 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
[[Security|Back to Security Main Page]]
 
[[Security|Back to Security Main Page]]
  
 +
[[GDPR (General Data Protection Regulation)|GDPR]]
  
  
Line 37: Line 38:
  
 
== Deliverables ==
 
== Deliverables ==
 
+
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Is%20Privacy%20Obsolete%20Study%20Group%202018%200126%20HL7.docx Is Privacy Obsolete Jan 2018 WGM ppt] by Mike Davis
 +
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Is%20Privacy%20Obsolete%20Jan%202018%20WGM.pptx Is Privacy Obsolete Jan 2018 WGM ppt] by Mike Davis
 +
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Breaches%20v2.xlsx Breach Analysis Spreadsheet] by Mike Davis
 +
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Bio%20tech%20privacy%20HL7%20WG%20Final.pptx BIOMETRICS: Balancing Privacy with Innovation] by Devon Connor Green.
  
 
== Reference Material ==
 
== Reference Material ==
Line 43: Line 47:
 
This Report: 1) analyzes the scope of privacy and security protections of an individual’s health information for these new and emerging technology products that are not regulated by HIPAA; 2) identifies key gaps that exist between HIPAA regulated entities and those not regulated by HIPAA; and 3) recommends addressing those gaps in a way that protects consumers while leveling the playing field for innovators inside and outside of HIPAA...This Report focuses on “mHealth technologies” and “health social media.” The former includes entities that collect or deal in personal health records (PHRs)5 and cloud-based or mobile software tools that intend to collect health information6 directly from individuals and enable sharing of such information, such as wearable fitness trackers. The latter includes internet-based social media sites on which individuals create or take advantage of specific opportunities to share their health conditions and experiences. Taken together, these mHealth technologies and health social media that are outside the scope of HIPAA are referred to as “non-covered entities” or NCEs. This Report does not cover products, services, and data sources where health information is derived from other data (such as GPS reporting, where one can infer an individual’s physical activity, 7 or air quality reporting data from which respiratory health might be inferred), or information casually disclosed by individuals, such as a personal Facebook post that one has the flu. Products that may meet the definition of a device under section 201(h) of the Federal Food, Drug, and Cosmetic Act (FD&C Act), such as apps that can control the inflation and deflation of a blood pressure cuff or the delivery of insulin on an insulin pump, also are not discussed here, though these tools also may not be regulated by HIPAA.
 
This Report: 1) analyzes the scope of privacy and security protections of an individual’s health information for these new and emerging technology products that are not regulated by HIPAA; 2) identifies key gaps that exist between HIPAA regulated entities and those not regulated by HIPAA; and 3) recommends addressing those gaps in a way that protects consumers while leveling the playing field for innovators inside and outside of HIPAA...This Report focuses on “mHealth technologies” and “health social media.” The former includes entities that collect or deal in personal health records (PHRs)5 and cloud-based or mobile software tools that intend to collect health information6 directly from individuals and enable sharing of such information, such as wearable fitness trackers. The latter includes internet-based social media sites on which individuals create or take advantage of specific opportunities to share their health conditions and experiences. Taken together, these mHealth technologies and health social media that are outside the scope of HIPAA are referred to as “non-covered entities” or NCEs. This Report does not cover products, services, and data sources where health information is derived from other data (such as GPS reporting, where one can infer an individual’s physical activity, 7 or air quality reporting data from which respiratory health might be inferred), or information casually disclosed by individuals, such as a personal Facebook post that one has the flu. Products that may meet the definition of a device under section 201(h) of the Federal Food, Drug, and Cosmetic Act (FD&C Act), such as apps that can control the inflation and deflation of a blood pressure cuff or the delivery of insulin on an insulin pump, also are not discussed here, though these tools also may not be regulated by HIPAA.
 
*[http://wiki.hl7.org/index.php?title=FHIR_Bulk_Data_Transfer_Privacy_and_Security_Concerns Security WG review of FHIR Bulk Data Transfer Privacy and Security Concerns]
 
*[http://wiki.hl7.org/index.php?title=FHIR_Bulk_Data_Transfer_Privacy_and_Security_Concerns Security WG review of FHIR Bulk Data Transfer Privacy and Security Concerns]
===[[FHIR Consumer Centered Data Exchange (CCDE) Connectathon]]===
+
==GDPR EU General Data Protection Regulations==
 
+
*[https://gdpr-info.eu/ Useful GDPR regulation text reference]
 +
*[https://vimeo.com/267769545 Standards support for key GDPR Policies] - Rene Spronk
 +
*[http://www.ringholm.com/column/GDPR_impact_on%20healthcare_data_interoperability.htm Impact of the GDPR on the use of interoperability standards]
 +
*[https://www.ihe-europe.net/sites/default/files/GDPR_WEB_00.pdf IHE Whitepaper on GDPR]
 +
*[http://wiki.hl7.org/index.php?title=201805_GDPR May Cologne Connectathon 201805 GDPR]
  
 
=Library=
 
=Library=
Line 52: Line 60:
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Is%20Privacy%20Obsolete%20Jan%202018%20WGM.pptx Is Privacy Obsolete?] Report out presentation for January 2018 WGM.
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Is%20Privacy%20Obsolete%20Jan%202018%20WGM.pptx Is Privacy Obsolete?] Report out presentation for January 2018 WGM.
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Is%20Privacy%20Obsolete%20Study%20Group%202018%200126%20HL7.docx Is Privacy Obsolete White Paper January 2018]
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Is%20Privacy%20Obsolete%20Study%20Group%202018%200126%20HL7.docx Is Privacy Obsolete White Paper January 2018]
 +
==[http://wiki.hl7.org/index.php?title=Privacy_and_Security,_Big_Data,_Provenance_and_Privacy_Reference_Materials Big Data Privacy, Security, and Provenance]==
  
==India Privacy Law Changes==
+
==India Privacy Law Changes==  
 
Thanks to Adrian Gropper for bringing this up
 
Thanks to Adrian Gropper for bringing this up
 
*[http://www.cnn.com/2017/08/24/asia/indian-court-right-to-privacy/?iid=EL India Supreme Court rules privacy a 'fundamental right' in landmark case Augues 24, 2017]
 
*[http://www.cnn.com/2017/08/24/asia/indian-court-right-to-privacy/?iid=EL India Supreme Court rules privacy a 'fundamental right' in landmark case Augues 24, 2017]
Line 72: Line 81:
 
https://www.nytimes.com/2017/10/05/opinion/privacy-rights-security-breaches.html?mwrsm=Email
 
https://www.nytimes.com/2017/10/05/opinion/privacy-rights-security-breaches.html?mwrsm=Email
  
==From Diana Proud-Madruga (Electrosoft==
+
==From Diana Proud-Madruga (Electrosoft) SOA Cochair==
 
*[https://www.linkedin.com/pulse/20140625045136-2259773-privacy-and-data-security-violations-what-s-the-harm/ Privacy and Data Security Violations - What's the Harm?]
 
*[https://www.linkedin.com/pulse/20140625045136-2259773-privacy-and-data-security-violations-what-s-the-harm/ Privacy and Data Security Violations - What's the Harm?]
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Privacy%20and%20Data%20Security%20Violations%20What’s%20the%20Harm%20-Solov.pdf Privacy and Data Security Violations - What's the Harm?]- by Solove - pdf
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Privacy%20and%20Data%20Security%20Violations%20What’s%20the%20Harm%20-Solov.pdf Privacy and Data Security Violations - What's the Harm?]- by Solove - pdf
Line 80: Line 89:
 
*[https://www.linkedin.com/today/post/article/20140723044449-2259773-how-should-the-law-handle-privacy-and-data-security-harms How Should the Law handle Privacy and Security Harms]
 
*[https://www.linkedin.com/today/post/article/20140723044449-2259773-how-should-the-law-handle-privacy-and-data-security-harms How Should the Law handle Privacy and Security Harms]
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Is%20privacy%20dead%20in%20an%20online%20world%20-%20BBC%20News.pdf Is privacy dead in an online world - BBC News.pdf]
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Is%20privacy%20dead%20in%20an%20online%20world%20-%20BBC%20News.pdf Is privacy dead in an online world - BBC News.pdf]
*[https://gforge.hl7.org/gf/project/security] docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/info-accountability-cacm-weitzner.pdf Information Accountability cacm Weitzner, Abelson, Bereners-Lee, Feigenbaum, Jendler, and Sussman]
+
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/info-accountability-cacm-weitzner.pdf Information Accountability cacm Weitzner, Abelson, Bereners-Lee, Feigenbaum, Jendler, and Sussman]
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Privacy%20as%20Business%20Opportunity%20-%20GDPR.pdf Privacy as Business Opportunity - GDPR]
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Privacy%20as%20Business%20Opportunity%20-%20GDPR.pdf Privacy as Business Opportunity - GDPR]
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/VA%20Data%20Breach.pdf VA Data Breach]
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/VA%20Data%20Breach.pdf VA Data Breach]
 +
 
==Devon Connor Green HL7 Norway, Privacy Attorney==
 
==Devon Connor Green HL7 Norway, Privacy Attorney==
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Bio%20tech%20privacy%20HL7%20WG%20Final.pptx BIOMETRICS: Balancing Privacy with Innovation]
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Bio%20tech%20privacy%20HL7%20WG%20Final.pptx BIOMETRICS: Balancing Privacy with Innovation]
Line 98: Line 108:
 
*Necessary for the purposes of legitimate interests pursued by the controller or a third party, except where such interests are overridden by the interests, rights or freedoms of the data subject
 
*Necessary for the purposes of legitimate interests pursued by the controller or a third party, except where such interests are overridden by the interests, rights or freedoms of the data subject
 
This means that consent is not the only basis on which an organization can process personal data under the new European General Data Protection Regulations.  
 
This means that consent is not the only basis on which an organization can process personal data under the new European General Data Protection Regulations.  
 +
==Theresa Årdal Connor Privacy Attorney Norway==
 +
Pertinent EU Links
 +
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/HIMSS%20GDPR%20Webinar%20-%20final%203-20-2018.pdf HIMSS - What Healthcare Organizations need to know about the GDPR] and [https://himss.webex.com/ec3100/eventcenter/recording/recordAction.do?theAction=poprecord&siteurl=himss&entappname=url3100&internalRecordTicket=4832534b000000049e667bcc7b800ce86914021b02caba29afc46ecff27ca74c0cf33e5cbdb77664&renewticket=0&isurlact=true&format=short&rnd=1200686872&RCID=d8fdf672a7c2486c83b5644a70c0ccf3&rID=127858932&needFilter=false&recordID=127858932&apiname=lsr.php&AT=pb&actappname=ec3100&&SP=EC&entactname=%2FnbrRecordingURL.do&actname=%2Feventcenter%2Fframe%2Fg.do HIMSS Presentation recording]
 +
*[http://www.bbc.com/news/world-europe-43496739 Dutch referendum: Spy tapping powers 'rejected']
 +
*[https://observatory.mappingtheinternet.eu/page/data-retention-legislation-europe Data retention legislation in Europe]
 +
*[https://www.thelocal.de/20180322/german-justice-minister-demands-meeting-with-facebook-scandal-cambridge-analytica German Justice Minister demands Facebook explain data scandal]
 +
*[https://www.openrightsgroup.org/assets/files/legal/Data_Retention_status_table_updated_April_2015_uploaded_finalwithadditions.pdf Table of EU Data Retention Issues]
 +
*[https://observatory.mappingtheinternet.eu/page/personal-data-breaches-policies-europe EU Data Breaches June 2017]
 +
*[http://www.bbc.com/news/technology-43752344 Google loses 'right to be forgotten' case]
 +
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/20180403_me_french_attorney_dan_shefet_is_on_a_digital_privacy_crusade_against_tech_titans.mp3 The Paris Lawyer Who Gives Google Nightmares - Dan Shefet French attorney]
 +
*[https://www.dlapiperdataprotection.com/index.html International Privacy Protection Law tool]
 +
*[https://iclg.com/practice-areas/data-protection-laws-and-regulations International Privacy Laws]
 +
*[https://iclg.com/practice-areas/data-protection-laws-and-regulations/norway Norway Data Protection Laws and Regulations]
 +
 +
==Suzanne Gonzales-Webb CBCP Cochair==
 +
*[https://www.wired.com/2017/06/ntitrust-watchdogs-eye-big-techs-monopoly-data/ Digital Privacy Is Making Antitrust Exciting Again]
 +
Nitasha Tiku 6/4/17 Wired A couple weeks ago, during an unassuming antitrust conference at Oxford University, a German bureaucrat uttered a few words that should send a chill through Silicon Valley. In front of a crowd of nearly 200 competition law experts—including enforcement agents, scholars, and economic policy-makers from the United States and Europe—Andreas Mundt, president of Germany’s antitrust agency, Bundeskartellamt, said he was “deeply convinced privacy is a competition issue.” It’s a conviction major tech platforms are listening to closely, especially since Mundt’s agency is in the midst of a high-profile investigation into whether Facebook abused its dominance as a social network by forcing customers to agree to unfair terms about the way the company uses their data. Mundt’s words may have sounded mundane, but his implication was anything but: the world’s foremost antitrust regulators were publicly discussing whether they should intervene if a transaction weakens consumer privacy protections, a pervasive concern in the era of big data.
 +
*[https://www.wired.com/story/opinion-new-data-cold-war/ The Next Cold War Is Here, and It's All About Data] Tom Pendergast Wired 03.28.18
 +
Combatants in the new Cold War are fighting over the currency of the modern age: personal information. The battles are over who controls data. Vying against each other are those societies that believe that individuals have an absolute right to control their personal data—to exercise the same kind of dominion over data that they do over their bodies or their personal property—and those that believe that personal data is a good to be traded on the open market and thus subject to the same market forces at play elsewhere. May the most innovative, efficient company win.
  
 +
==Breach Investigations, Court Cases, Legistation, and Finds==
 +
*[https://www.fidelity.com/news/article/top-news/201803121026RTRSNEWSCOMBINED_L1N1QU0GF_1 Data breach victims can sue Yahoo in the United States]By Jonathan Stempel, Reuters 3/12/2018. Yahoo has been ordered by a federal judge to face much of a lawsuit in the United States claiming that the personal information of all 3 billion users was compromised in a series of data breaches.In a decision on Friday night, U.S. District Judge Lucy Koh in San Jose, California rejected a bid by Verizon Communications Inc., which bought Yahoo's Internet business last June, to dismiss many claims, including for negligence and breach of contract.
 +
*[https://healthitsecurity.com/news/2017-updated-state-data-breach-laws-account-for-medical-information 2017 Updated State Data Breach Laws Account for Medical Information]  By Elizabeth Snell Health IT Security December 29, 2017 State data breach laws can be critical for protecting sensitive data, and healthcare organizations must ensure they adhere to them along with federal regulations. The data breach notification process is a crucial aspect to state law, and can lead to settlements should entities fail to adhere to state requirements. With large-scale data breaches continuing to be a regular occurrence in numerous industries – including healthcare – more states are updating their data breach response process. More states are also beginning to account for medical information and data protected under HIPAA regulations. Nearly every state has its own state data breach notification law in place, and there has even been a push in 2017 for one standardized national notification law.
 +
*[https://healthitsecurity.com/news/2.3m-ocr-settlement-reached-for-21st-century-oncology-data-breach $2.3M OCR Settlement Reached for 21st Century Oncology Data Breach]OCR found in its investigation that 21CO impermissibly disclosed the PHI of 2,213,597 of its patients and “failed to conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of the ePHI.” 21CO also failed to implement security measures to reduce risks and vulnerabilities and failed to implement procedures to regularly review information system activity. This included having audit logs, access reports, and security incident reports. The organization also disclosed PHI to its business associates without having a proper business associate agreement in place, according to OCR.
 +
*[https://healthitsecurity.com/news/what-should-entities-expect-with-ocr-hipaa-enforcement What Should Entities Expect with OCR HIPAA Enforcement?] By Elizabeth Snell November 02, 2017 - There have been nine OCR HIPAA enforcement settlements so far in 2017, highlighting the need for covered entities and business associates to focus on audit controls, risk management, and business associate agreements. While there has been a new administration leading the way, healthcare data privacy and security experts do not expect an exceedingly different approach when it comes to ensuring entities remain compliant. Under the current administration, OCR is taking a “back-to-basics” approach in terms of enforcement, Meisinger told HealthITSecurity.com. Rather than making policy statements, the agency is interested in enforcement.
 +
*[https://healthitsecurity.com/news/single-national-data-breach-notification-standard-proposed Single National Data Breach Notification Standard Proposed]By Elizabeth Snell HealthData Management October 13, 2017 “This bill will replace the patchwork of 48 state breach notification laws with a single nationwide standard that would clarify and strengthen companies’ obligations to report intrusions that compromise consumers’ personal information,” Langevin stated. “Americans put a lot of trust in companies by giving them personal and private information, and they should have confidence that their data is secure.”
 +
*[https://healthitsecurity.com/news/new-york-reaches-1.15m-settlement-over-aetna-data-breach New York Reaches $1.15M Settlement over Aetna Data Breach]By Elizabeth Snell HealthData Management January 26, 2018 - New York Attorney General Eric Schneiderman announced that a $1.15 million settlement has been reached following the Aetna data breach that occurred in 2017. Aetna sent letters to patients in the mail back in July 2017. Information about ordering prescription HIV drugs was clearly visible through the envelope's clear window, with approximately 12,000 individuals total being impacted by the incident.T he HIV status of 2,460 New Yorkers was exposed, according to Schneiderman. Aetna will need to pay the civil penalty and develop and maintain enhanced operating procedures with regard to protecting PHI and personally identifiable information (PII) in mailings. The organization will also be required to hire an independent consultant to monitor and report on the settlement’s injunctive provisions Through its own carelessness, Aetna blatantly violated its promise to safeguard members’ private health information,” Schneiderman said in a statement. “Health insurance companies handle personal health information on a daily basis and have a fundamental responsibility to be vigilant in protecting their members. We won’t hesitate to act to ensure that insurance companies live up to their responsibilities to the New Yorkers they serve.”
 +
*[http://www.bbc.com/news/world-europe-43496739  Dutch referendum: Spy tapping powers 'rejected'] BCC March 22, 2018. Voters in the Netherlands appear to have narrowly rejected new online data collection powers for intelligence agencies in a referendum. The Netherlands put to a referendum new legislation, officially the Intelligence and Security Law. The bill gives new powers to the Netherlands' intelligence services. They would be able to install wire taps on whole areas, rather than just individuals, store information for up to three years and share this data with other spy agencies.
 
==ISTPA==
 
==ISTPA==
 
International Security, Trust and Privacy Alliance
 
International Security, Trust and Privacy Alliance
Line 120: Line 157:
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Cambridge_Health_Alliance_Team-Based_Care_Toolkit.pdf Cambridge_Health_Alliance_Team-Based_Care_Toolkit]
 
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/Cambridge_Health_Alliance_Team-Based_Care_Toolkit.pdf Cambridge_Health_Alliance_Team-Based_Care_Toolkit]
  
==Theresa Årdal Connor Privacy Attorney Norway==
+
 
Pertinent EU Links
+
==Facebook and Cambria Analytica==
*[https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/HIMSS%20GDPR%20Webinar%20-%20final%203-20-2018.pdf HIMSS - What Healthcare Organizations need to know about the GDPR] and [https://himss.webex.com/ec3100/eventcenter/recording/recordAction.do?theAction=poprecord&siteurl=himss&entappname=url3100&internalRecordTicket=4832534b000000049e667bcc7b800ce86914021b02caba29afc46ecff27ca74c0cf33e5cbdb77664&renewticket=0&isurlact=true&format=short&rnd=1200686872&RCID=d8fdf672a7c2486c83b5644a70c0ccf3&rID=127858932&needFilter=false&recordID=127858932&apiname=lsr.php&AT=pb&actappname=ec3100&&SP=EC&entactname=%2FnbrRecordingURL.do&actname=%2Feventcenter%2Fframe%2Fg.do HIMSS Presentation recording]
+
*[https://www.reuters.com/article/us-facebook-cambridge-analytica/facebook-under-pressure-as-eu-u-s-urge-probes-of-data-practices-idUSKBN1GV1V6 Facebook under pressure as U.S., EU urge probes of data practices] By Dustin Volz and Munsif Vengattil3/19/2018 (Reuters) - Facebook Inc Chief Executive Mark Zuckerberg faced calls on Monday from U.S. and European lawmakers to explain how a consultancy that worked on President Donald Trump's election campaign gained improper access to data on 50 million Facebook users.
*[http://www.bbc.com/news/world-europe-43496739 Dutch referendum: Spy tapping powers 'rejected']
+
*[Cambridge Analytica researcher touted data-mining in Russia speech https://www.fidelity.com/news/article/default/201803201101CNN_____MONEY____-2018-03-20-technology-aleksandr-kogan-video-facebook-cambridge-analytica-index_html?srcIndex=2 Cambridge Analytica researcher touted data-mining in Russia speech] by Marshall Cohen, CNNMoney.com 3/20/2018. The researcher at the center of the Cambridge Analytica data-mining scandal touted controversial techniques at a lecture four years ago in Russia, despite downplaying the methods in an email to colleagues after his work attracted international scrutiny.
*[https://observatory.mappingtheinternet.eu/page/data-retention-legislation-europe Data retention legislation in Europe]
+
*[https://www.fidelity.com/news/article/default/201803201101CNN_____MONEY____-2018-03-20-technology-aleksandr-kogan-video-facebook-cambridge-analytica-index_html?srcIndex=2 Cambridge Analytica researcher touted data-mining in Russia speech]
*[https://www.thelocal.de/20180322/german-justice-minister-demands-meeting-with-facebook-scandal-cambridge-analytica German Justice Minister demands Facebook explain data scandal]
+
*[https://www.fidelity.com/news/article/default/201803201807MRKTWTCHNEWS_SVC000609?srcIndex=1 Cambridge Analytica CEO suspended after taking credit for Trump campaign on video]
*[https://www.openrightsgroup.org/assets/files/legal/Data_Retention_status_table_updated_April_2015_uploaded_finalwithadditions.pdf Table of EU Data Retention Issues]
+
*[https://www.theguardian.com/news/2018/mar/20/facebook-data-cambridge-analytica-sandy-parakilas 'Utterly horrifying': ex-Facebook insider says covert data harvesting was routine] by Paul Lewis The Guardian March 20.2018. Sandy Parakilas in San Francisco. ‘It has been painful watching. Because I know that they could have prevented it.’ Hundreds of millions of Facebook users are likely to have had their private information harvested by companies that exploited the same terms as the firm that collected data and passed it on to Cambridge Analytica, according to a new whistleblower.
*[https://observatory.mappingtheinternet.eu/page/personal-data-breaches-policies-europe EU Data Breaches June 2017]
+
*[https://www.theguardian.com/commentisfree/2018/mar/22/restructure-facebook-ftc-regulate-9-steps-now?CMP=Share_iOSApp_Other Facebook must be restructured. The FTC should take these nine steps now] By Barry Lynn and Matt Stoller The GuardianThu 22 Mar 2018. ‘Rather than simply carve away some of Facebook’s huge profits, the FTC should immediately move to restructure the corporation.’
 +
*[https://www.cnbc.com/2018/04/05/facebook-building-8-explored-data-sharing-agreement-with-hospitals.html Facebook asked hospitals to share patient data]Facebook asked hospitals for anonymized data about their patients for a proposed research project (CNBC 4/6/2018). The social media platform reportedly intended to compare the data, which included prescription information and illnesses, with its own data that it collected from users, in order to flag users that may need hospital care.  The social media company discussed its plan with organizations including Stanford Medical School and American College of Cardiology. The data the company would have collected would have been completely anonymous and only available for medical research, according to the report. Cathleen Gates, the interim CEO of the American College of Cardiology, said in a statement provided to CNBC that Facebook’s proposed data project could help medical research.“As part of its mission to transform cardiovascular care and improve heart health, the American College of Cardiology has been engaged in discussions with Facebook around the use of anonymized Facebook data, coupled with anonymized ACC data, to further scientific research on the ways social media can aid in the prevention and treatment of heart disease — the #1 cause of death in the world,” she said.
 +
 
 +
==International Breaches==
 +
*[http://www.bbc.co.uk/news/world-asia-india-42575443 Aadhaar: 'Leak' in world's biggest database worries Indians] Indian officials in charge of a controversial biometric identity scheme have filed a police complaint after a report that citizens' personal details were being sold for as little as 500 rupees ($7.8;£5.8) online.
 +
*[https://www.healthdatamanagement.com/list/the-10-largest-healthcare-data-breaches-hdm-covered-in-2017 10 Largest Healthcare Data Breaches covered by HealthData Management 2017]affecting nearly 1.9 million individuals.
 +
*[https://www.thelocal.de/20180322/german-justice-minister-demands-meeting-with-facebook-scandal-cambridge-analytica German Justice Minister demands Facebook explain data scandal] news@thelocal.de @thelocalgermany 22 March 2018. Germany is the latest country to demand answers from Facebook after it emerged data from 50 million users was used to inform targeted election campaigns. German Justice Minister Katharina Barley on Thursday called such methods "a danger to democracy." It's unacceptable that data is used "against users' will in order to bombard them with election advertising or hate against political opponents," she continued. "Such campaigning methods are a danger to democracy."
 +
 
 +
==International Hacks==
 +
*[https://healthitsecurity.com/news/us-reports-north-korea-caused-wannacry-ransomware-attack US Reports North Korea Caused WannaCry Ransomware Attack] By Elizabeth Snell Health IT Security January 02, 2018. The WannaCry ransomware attack that affected numerous sectors around the world, including healthcare organizations, was caused by North Korea, according to Tom Bossert, assistant to the president for homeland security and counterterrorism. Bossert explained in a Wall Street Journal op-ed that North Korea was directly responsible for the cyber attack that “encrypted and rendered useless hundreds of thousands of computers in hospitals, schools, businesses and homes.”
 +
*[https://www.healthdatamanagement.com/list/the-10-largest-healthcare-data-breaches-hdm-covered-in-2017 10 largest breaches that HealthData Management covered in 2017] affecting nearly 1.9 million individuals.
 +
*[https://www.fidelity.com/news/article/top-news/201712141215RTRSNEWSCOMBINED_L1N1OE1C9_1 Hackers halt plant operations in watershed cyber attack] Dec 14 (Reuters) - Hackers likely working for a nation-state recently invaded the safety system of a critical infrastructure facility in a watershed attack that halted plant operations, according to cyber investigators and the firm whose software was targeted.
 +
 
 +
==Unwarranted Surveillance==
 +
*[https://gizmodo.com/the-house-that-spied-on-me-1822429852?rev=1518027891546 The House That Spied on Me] By Kashmir Hill and Surya Mattu. This story was produced with support from the Mozilla Foundation as part of its mission to educate individuals about their security and privacy on the internet. "I thought the house would take care of me but instead everything in it now had the power to ask me to do things. Ultimately, I’m not going to warn you against making everything in your home smart because of the privacy risks, although there are quite a few. I’m going to warn you against a smart home because living in it is annoying as hell."
 +
*[http://www.bbc.com/news/world-asia-china-42973456 Chinese police spot suspects with surveillance sunglasses]Police in China have begun using sunglasses equipped with facial recognition technology to identify suspected criminals. The glasses are connected to an internal database of suspects, meaning officers can quickly scan crowds while looking for fugitives. But critics fear the technology will give even more power to the government. The sunglasses have already helped police capture seven suspects, according to Chinese state media. Police used the new equipment at a busy train station in the central city of Zhengzhou to identify the suspects. The seven people who were apprehended are accused of crimes ranging from hit-and-runs to human trafficking.
 +
==Privacy Protective Policy and Technologies==
 +
*[http://www.healthcareitnews.com/news/special-report-policies-processes-and-technologies-guard-iot-healthcare?mkt_tok=eyJpIjoiTldFd056SXhPVFEzTldNNSIsInQiOiI3VWp0UjBNcEhmRkhmV0VaSUl0cmlwWThXdEllOG5WV2wraHh3YXQyY2ZLNGF3UlE1V05iQUxBVW1qbXVEaHo5UnBjZWFlMlhPMXVXVWdZbWN0VzdPRlNaZUFmcVhaWlFCOHhkUlZqd0hLQ2FpRjVVYjhvcVhvZGhZZUd0Nmt1UCJ9 Special Report: The policies, processes and technologies to guard the IoT for healthcare] By Bill Siwicki HealthcareIT News March 15, 2018. Experts are anticipating the wrath of cybercriminals targeting the hundreds of thousands of IoT devices already deployed in 2018 and beyond. While medical equipment has long presented thorny security problems, Internet of Things devices in hospitals bring entirely new, and often daunting, cyberthreats.
  
 
==Counter Points==
 
==Counter Points==

Latest revision as of 23:14, 8 July 2018

Back to Security Main Page

GDPR


Links

Study Group Mission and Scope

  • Study Group PSS - TBD

Deliverables

Reference Material

ONC Examining Oversight of the Privacy & Security of Health Data Collected by Entities Not Regulated by HIPAA This Report: 1) analyzes the scope of privacy and security protections of an individual’s health information for these new and emerging technology products that are not regulated by HIPAA; 2) identifies key gaps that exist between HIPAA regulated entities and those not regulated by HIPAA; and 3) recommends addressing those gaps in a way that protects consumers while leveling the playing field for innovators inside and outside of HIPAA...This Report focuses on “mHealth technologies” and “health social media.” The former includes entities that collect or deal in personal health records (PHRs)5 and cloud-based or mobile software tools that intend to collect health information6 directly from individuals and enable sharing of such information, such as wearable fitness trackers. The latter includes internet-based social media sites on which individuals create or take advantage of specific opportunities to share their health conditions and experiences. Taken together, these mHealth technologies and health social media that are outside the scope of HIPAA are referred to as “non-covered entities” or NCEs. This Report does not cover products, services, and data sources where health information is derived from other data (such as GPS reporting, where one can infer an individual’s physical activity, 7 or air quality reporting data from which respiratory health might be inferred), or information casually disclosed by individuals, such as a personal Facebook post that one has the flu. Products that may meet the definition of a device under section 201(h) of the Federal Food, Drug, and Cosmetic Act (FD&C Act), such as apps that can control the inflation and deflation of a blood pressure cuff or the delivery of insulin on an insulin pump, also are not discussed here, though these tools also may not be regulated by HIPAA.

GDPR EU General Data Protection Regulations

Library

From Mike Davis, VHA Security Architect

Big Data Privacy, Security, and Provenance

India Privacy Law Changes

Thanks to Adrian Gropper for bringing this up

ISO Proposed Consumer Protection Standard for Privacy by Design of Consumer Goods and Services

From Chris Shawn, Security Cochair, VA

Another article that may be relevant to the “Is privacy dead?” question:

“In practice, this means that we can no longer expect a meaningful difference between observability and identifiability — if we can be observed, we can be identified.”

https://www.nytimes.com/2017/10/05/opinion/privacy-rights-security-breaches.html?mwrsm=Email

From Diana Proud-Madruga (Electrosoft) SOA Cochair

Devon Connor Green HL7 Norway, Privacy Attorney

One of the most popular myths about the new European General Data Protection Regulations is that companies must have consent to process people’s personal data. According to the ICO: “Consent under the current data protection law has always required a clear, affirmative action – the GDPR clarifies that pre-ticked opt-in boxes are not indications of valid consent. The GDPR is also explicit that you’ve got to make it easy for people to exercise their right to withdraw consent.  The requirement for clear and and plain language when explaining consent is now strongly emphasised. And you’ve got to make sure the consent you’ve already got meets the standards of the GDPR. If not, you’ll have to refresh it.” But how can data only be processed if an organisation has explicit consent to do so? The answer to this is that the rules around consent only apply if you are relying on consent to process personal data, i.e. consent is only one way to comply with GDPR, there are others. For data processing to be lawful in the new General Data Protection Regulations, companies and organisations need to identify a lawful basis before starting. There are five other ways in the main (as well as consent):

  • Processing is necessary for the performance of a contract with the data subject or to take steps to enter into a contract
  • Processing is necessary for compliance with a legal obligation
  • Processing is  necessary to protect the vital interests of a data subject or another person
  • Processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller
  • Necessary for the purposes of legitimate interests pursued by the controller or a third party, except where such interests are overridden by the interests, rights or freedoms of the data subject

This means that consent is not the only basis on which an organization can process personal data under the new European General Data Protection Regulations.

Theresa Årdal Connor Privacy Attorney Norway

Pertinent EU Links

Suzanne Gonzales-Webb CBCP Cochair

Nitasha Tiku 6/4/17 Wired A couple weeks ago, during an unassuming antitrust conference at Oxford University, a German bureaucrat uttered a few words that should send a chill through Silicon Valley. In front of a crowd of nearly 200 competition law experts—including enforcement agents, scholars, and economic policy-makers from the United States and Europe—Andreas Mundt, president of Germany’s antitrust agency, Bundeskartellamt, said he was “deeply convinced privacy is a competition issue.” It’s a conviction major tech platforms are listening to closely, especially since Mundt’s agency is in the midst of a high-profile investigation into whether Facebook abused its dominance as a social network by forcing customers to agree to unfair terms about the way the company uses their data. Mundt’s words may have sounded mundane, but his implication was anything but: the world’s foremost antitrust regulators were publicly discussing whether they should intervene if a transaction weakens consumer privacy protections, a pervasive concern in the era of big data.

Combatants in the new Cold War are fighting over the currency of the modern age: personal information. The battles are over who controls data. Vying against each other are those societies that believe that individuals have an absolute right to control their personal data—to exercise the same kind of dominion over data that they do over their bodies or their personal property—and those that believe that personal data is a good to be traded on the open market and thus subject to the same market forces at play elsewhere. May the most innovative, efficient company win.

Breach Investigations, Court Cases, Legistation, and Finds

  • Data breach victims can sue Yahoo in the United StatesBy Jonathan Stempel, Reuters 3/12/2018. Yahoo has been ordered by a federal judge to face much of a lawsuit in the United States claiming that the personal information of all 3 billion users was compromised in a series of data breaches.In a decision on Friday night, U.S. District Judge Lucy Koh in San Jose, California rejected a bid by Verizon Communications Inc., which bought Yahoo's Internet business last June, to dismiss many claims, including for negligence and breach of contract.
  • 2017 Updated State Data Breach Laws Account for Medical Information By Elizabeth Snell Health IT Security December 29, 2017 State data breach laws can be critical for protecting sensitive data, and healthcare organizations must ensure they adhere to them along with federal regulations. The data breach notification process is a crucial aspect to state law, and can lead to settlements should entities fail to adhere to state requirements. With large-scale data breaches continuing to be a regular occurrence in numerous industries – including healthcare – more states are updating their data breach response process. More states are also beginning to account for medical information and data protected under HIPAA regulations. Nearly every state has its own state data breach notification law in place, and there has even been a push in 2017 for one standardized national notification law.
  • $2.3M OCR Settlement Reached for 21st Century Oncology Data BreachOCR found in its investigation that 21CO impermissibly disclosed the PHI of 2,213,597 of its patients and “failed to conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of the ePHI.” 21CO also failed to implement security measures to reduce risks and vulnerabilities and failed to implement procedures to regularly review information system activity. This included having audit logs, access reports, and security incident reports. The organization also disclosed PHI to its business associates without having a proper business associate agreement in place, according to OCR.
  • What Should Entities Expect with OCR HIPAA Enforcement? By Elizabeth Snell November 02, 2017 - There have been nine OCR HIPAA enforcement settlements so far in 2017, highlighting the need for covered entities and business associates to focus on audit controls, risk management, and business associate agreements. While there has been a new administration leading the way, healthcare data privacy and security experts do not expect an exceedingly different approach when it comes to ensuring entities remain compliant. Under the current administration, OCR is taking a “back-to-basics” approach in terms of enforcement, Meisinger told HealthITSecurity.com. Rather than making policy statements, the agency is interested in enforcement.
  • Single National Data Breach Notification Standard ProposedBy Elizabeth Snell HealthData Management October 13, 2017 “This bill will replace the patchwork of 48 state breach notification laws with a single nationwide standard that would clarify and strengthen companies’ obligations to report intrusions that compromise consumers’ personal information,” Langevin stated. “Americans put a lot of trust in companies by giving them personal and private information, and they should have confidence that their data is secure.”
  • New York Reaches $1.15M Settlement over Aetna Data BreachBy Elizabeth Snell HealthData Management January 26, 2018 - New York Attorney General Eric Schneiderman announced that a $1.15 million settlement has been reached following the Aetna data breach that occurred in 2017. Aetna sent letters to patients in the mail back in July 2017. Information about ordering prescription HIV drugs was clearly visible through the envelope's clear window, with approximately 12,000 individuals total being impacted by the incident.T he HIV status of 2,460 New Yorkers was exposed, according to Schneiderman. Aetna will need to pay the civil penalty and develop and maintain enhanced operating procedures with regard to protecting PHI and personally identifiable information (PII) in mailings. The organization will also be required to hire an independent consultant to monitor and report on the settlement’s injunctive provisions Through its own carelessness, Aetna blatantly violated its promise to safeguard members’ private health information,” Schneiderman said in a statement. “Health insurance companies handle personal health information on a daily basis and have a fundamental responsibility to be vigilant in protecting their members. We won’t hesitate to act to ensure that insurance companies live up to their responsibilities to the New Yorkers they serve.”
  • Dutch referendum: Spy tapping powers 'rejected' BCC March 22, 2018. Voters in the Netherlands appear to have narrowly rejected new online data collection powers for intelligence agencies in a referendum. The Netherlands put to a referendum new legislation, officially the Intelligence and Security Law. The bill gives new powers to the Netherlands' intelligence services. They would be able to install wire taps on whole areas, rather than just individuals, store information for up to three years and share this data with other spy agencies.

ISTPA

International Security, Trust and Privacy Alliance

Sharing with Protections - a New Paradigm

  • Moving beyond Protection from Sharing in the age of Big Data, Learning Health System, and Health IOT

Balancing Clinician Need to Know (N2K) and Patient Privacy Expectations


Facebook and Cambria Analytica

  • Facebook under pressure as U.S., EU urge probes of data practices By Dustin Volz and Munsif Vengattil3/19/2018 (Reuters) - Facebook Inc Chief Executive Mark Zuckerberg faced calls on Monday from U.S. and European lawmakers to explain how a consultancy that worked on President Donald Trump's election campaign gained improper access to data on 50 million Facebook users.
  • [Cambridge Analytica researcher touted data-mining in Russia speech https://www.fidelity.com/news/article/default/201803201101CNN_____MONEY____-2018-03-20-technology-aleksandr-kogan-video-facebook-cambridge-analytica-index_html?srcIndex=2 Cambridge Analytica researcher touted data-mining in Russia speech] by Marshall Cohen, CNNMoney.com 3/20/2018. The researcher at the center of the Cambridge Analytica data-mining scandal touted controversial techniques at a lecture four years ago in Russia, despite downplaying the methods in an email to colleagues after his work attracted international scrutiny.
  • Cambridge Analytica researcher touted data-mining in Russia speech
  • Cambridge Analytica CEO suspended after taking credit for Trump campaign on video
  • 'Utterly horrifying': ex-Facebook insider says covert data harvesting was routine by Paul Lewis The Guardian March 20.2018. Sandy Parakilas in San Francisco. ‘It has been painful watching. Because I know that they could have prevented it.’ Hundreds of millions of Facebook users are likely to have had their private information harvested by companies that exploited the same terms as the firm that collected data and passed it on to Cambridge Analytica, according to a new whistleblower.
  • Facebook must be restructured. The FTC should take these nine steps now By Barry Lynn and Matt Stoller The GuardianThu 22 Mar 2018. ‘Rather than simply carve away some of Facebook’s huge profits, the FTC should immediately move to restructure the corporation.’
  • Facebook asked hospitals to share patient dataFacebook asked hospitals for anonymized data about their patients for a proposed research project (CNBC 4/6/2018). The social media platform reportedly intended to compare the data, which included prescription information and illnesses, with its own data that it collected from users, in order to flag users that may need hospital care. The social media company discussed its plan with organizations including Stanford Medical School and American College of Cardiology. The data the company would have collected would have been completely anonymous and only available for medical research, according to the report. Cathleen Gates, the interim CEO of the American College of Cardiology, said in a statement provided to CNBC that Facebook’s proposed data project could help medical research.“As part of its mission to transform cardiovascular care and improve heart health, the American College of Cardiology has been engaged in discussions with Facebook around the use of anonymized Facebook data, coupled with anonymized ACC data, to further scientific research on the ways social media can aid in the prevention and treatment of heart disease — the #1 cause of death in the world,” she said.

International Breaches

  • Aadhaar: 'Leak' in world's biggest database worries Indians Indian officials in charge of a controversial biometric identity scheme have filed a police complaint after a report that citizens' personal details were being sold for as little as 500 rupees ($7.8;£5.8) online.
  • 10 Largest Healthcare Data Breaches covered by HealthData Management 2017affecting nearly 1.9 million individuals.
  • German Justice Minister demands Facebook explain data scandal news@thelocal.de @thelocalgermany 22 March 2018. Germany is the latest country to demand answers from Facebook after it emerged data from 50 million users was used to inform targeted election campaigns. German Justice Minister Katharina Barley on Thursday called such methods "a danger to democracy." It's unacceptable that data is used "against users' will in order to bombard them with election advertising or hate against political opponents," she continued. "Such campaigning methods are a danger to democracy."

International Hacks

  • US Reports North Korea Caused WannaCry Ransomware Attack By Elizabeth Snell Health IT Security January 02, 2018. The WannaCry ransomware attack that affected numerous sectors around the world, including healthcare organizations, was caused by North Korea, according to Tom Bossert, assistant to the president for homeland security and counterterrorism. Bossert explained in a Wall Street Journal op-ed that North Korea was directly responsible for the cyber attack that “encrypted and rendered useless hundreds of thousands of computers in hospitals, schools, businesses and homes.”
  • 10 largest breaches that HealthData Management covered in 2017 affecting nearly 1.9 million individuals.
  • Hackers halt plant operations in watershed cyber attack Dec 14 (Reuters) - Hackers likely working for a nation-state recently invaded the safety system of a critical infrastructure facility in a watershed attack that halted plant operations, according to cyber investigators and the firm whose software was targeted.

Unwarranted Surveillance

  • The House That Spied on Me By Kashmir Hill and Surya Mattu. This story was produced with support from the Mozilla Foundation as part of its mission to educate individuals about their security and privacy on the internet. "I thought the house would take care of me but instead everything in it now had the power to ask me to do things. Ultimately, I’m not going to warn you against making everything in your home smart because of the privacy risks, although there are quite a few. I’m going to warn you against a smart home because living in it is annoying as hell."
  • Chinese police spot suspects with surveillance sunglassesPolice in China have begun using sunglasses equipped with facial recognition technology to identify suspected criminals. The glasses are connected to an internal database of suspects, meaning officers can quickly scan crowds while looking for fugitives. But critics fear the technology will give even more power to the government. The sunglasses have already helped police capture seven suspects, according to Chinese state media. Police used the new equipment at a busy train station in the central city of Zhengzhou to identify the suspects. The seven people who were apprehended are accused of crimes ranging from hit-and-runs to human trafficking.

Privacy Protective Policy and Technologies

  • Special Report: The policies, processes and technologies to guard the IoT for healthcare By Bill Siwicki HealthcareIT News March 15, 2018. Experts are anticipating the wrath of cybercriminals targeting the hundreds of thousands of IoT devices already deployed in 2018 and beyond. While medical equipment has long presented thorny security problems, Internet of Things devices in hospitals bring entirely new, and often daunting, cyberthreats.

Counter Points

Study Group Members

x Member Name x Member Name x Member Name x Member Name
x Mike Davis - Study Group Lead x Christopher ShawnSecurity Co-chair x Kathleen ConnorSecurity Co-chair . Trish WilliamsSecurity Co-chair
x John MoehrkeSecurity Co-chair x Suzanne Gonzales-Webb x David Staggs x Diana Proud-Madruga
. Mohammed Jafari . Beth Pumo . [1] x [2]
x [3] . [4] x [5] . [6]