"Is Privacy Obsolete" Study Group Page"
Contents
Links
- Work Space
- Gforge Library
- Is Privacy Obsolete? The IPO? Listserve is an open mailing list that all are open to join. One does not need to be a member of HL7 or the Security WG. You can find it on the HL7 Security WG mailing lists page. http://www.hl7.org/Special/committees/secure/listserv.cfm
Study Group Mission and Scope
- Study Group PSS - TBD
Deliverables
Reference Material
ONC Examining Oversight of the Privacy & Security of Health Data Collected by Entities Not Regulated by HIPAA This Report: 1) analyzes the scope of privacy and security protections of an individual’s health information for these new and emerging technology products that are not regulated by HIPAA; 2) identifies key gaps that exist between HIPAA regulated entities and those not regulated by HIPAA; and 3) recommends addressing those gaps in a way that protects consumers while leveling the playing field for innovators inside and outside of HIPAA...This Report focuses on “mHealth technologies” and “health social media.” The former includes entities that collect or deal in personal health records (PHRs)5 and cloud-based or mobile software tools that intend to collect health information6 directly from individuals and enable sharing of such information, such as wearable fitness trackers. The latter includes internet-based social media sites on which individuals create or take advantage of specific opportunities to share their health conditions and experiences. Taken together, these mHealth technologies and health social media that are outside the scope of HIPAA are referred to as “non-covered entities” or NCEs. This Report does not cover products, services, and data sources where health information is derived from other data (such as GPS reporting, where one can infer an individual’s physical activity, 7 or air quality reporting data from which respiratory health might be inferred), or information casually disclosed by individuals, such as a personal Facebook post that one has the flu. Products that may meet the definition of a device under section 201(h) of the Federal Food, Drug, and Cosmetic Act (FD&C Act), such as apps that can control the inflation and deflation of a blood pressure cuff or the delivery of insulin on an insulin pump, also are not discussed here, though these tools also may not be regulated by HIPAA.
FHIR Consumer Centered Data Exchange (CCDE) Connectathon
Library
From Mike Davis, VHA Security Architect
- Breaches References
- Breaches Spreadsheet
- Is Privacy Obsolete? Report out presentation for January 2018 WGM.
- Is Privacy Obsolete White Paper January 2018
India Privacy Law Changes
Thanks to Adrian Gropper for bringing this up
- India Supreme Court rules privacy a 'fundamental right' in landmark case Augues 24, 2017
- Privacy Laws in India and Privacy Rules and Regulations in India
- Privacy is not a right in India: What that means for the industry
ISO Proposed Consumer Protection Standard for Privacy by Design of Consumer Goods and Services
- Outline Description of Consumer Protection Privacy by Design
- Form 4 Consumer Protection Privacy By Design: ISO New Work Item Proposal
- List of potential sections in a consumer protection standard for privacy by design of consumer goods and services
- GDPR Guide referenced by this project
From Chris Shawn, Security Cochair, VA
Another article that may be relevant to the “Is privacy dead?” question:
“In practice, this means that we can no longer expect a meaningful difference between observability and identifiability — if we can be observed, we can be identified.”
https://www.nytimes.com/2017/10/05/opinion/privacy-rights-security-breaches.html?mwrsm=Email
From Diana Proud-Madruga (Electrosoft
- Privacy and Data Security Violations - What's the Harm?
- Privacy and Data Security Violations - What's the Harm?- by Solove - pdf
- Why Law often doesn't recognize Privacy and Data Security Harms
- Why Law often doesn't recognize Privacy and Data Security Harms by Solove - pdf
- Do Privacy Violations and Data Breaches Cause Harm?
- How Should the Law handle Privacy and Security Harms
- Is privacy dead in an online world - BBC News.pdf
- [7] docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/info-accountability-cacm-weitzner.pdf Information Accountability cacm Weitzner, Abelson, Bereners-Lee, Feigenbaum, Jendler, and Sussman]
- Privacy as Business Opportunity - GDPR
- VA Data Breach
Devon Connor Green HL7 Norway, Privacy Attorney
- BIOMETRICS: Balancing Privacy with Innovation
- Why a right to explanation of automated decision-making does not exist in GDPR - Brief: Much was supposedly promised wrt to a consumer having prospective rights to explanation of big data algorithm decision making logic, which might impact, and retrospective rights to know exactly how the algorithm was used to make a decision about a consumer , e.g., credit rating. which has been broadcasted by government and media. Unfortunately, per this pretty detailed analysis, this GDPR safeguard is relatively toothless.
- Why is this company tracking where you are on Thanksgiving?A data collection service called SafeGraph collected 17 trillion location markers for 10 million smartphones during the holiday last year.
- The UK’s ICO Clarifies Myths Around GDPR Consent - Excerpt: Do you need consent to process personal data?
One of the most popular myths about the new European General Data Protection Regulations is that companies must have consent to process people’s personal data. According to the ICO: “Consent under the current data protection law has always required a clear, affirmative action – the GDPR clarifies that pre-ticked opt-in boxes are not indications of valid consent. The GDPR is also explicit that you’ve got to make it easy for people to exercise their right to withdraw consent. The requirement for clear and and plain language when explaining consent is now strongly emphasised. And you’ve got to make sure the consent you’ve already got meets the standards of the GDPR. If not, you’ll have to refresh it.” But how can data only be processed if an organisation has explicit consent to do so? The answer to this is that the rules around consent only apply if you are relying on consent to process personal data, i.e. consent is only one way to comply with GDPR, there are others. For data processing to be lawful in the new General Data Protection Regulations, companies and organisations need to identify a lawful basis before starting. There are five other ways in the main (as well as consent):
- Processing is necessary for the performance of a contract with the data subject or to take steps to enter into a contract
- Processing is necessary for compliance with a legal obligation
- Processing is necessary to protect the vital interests of a data subject or another person
- Processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller
- Necessary for the purposes of legitimate interests pursued by the controller or a third party, except where such interests are overridden by the interests, rights or freedoms of the data subject
This means that consent is not the only basis on which an organization can process personal data under the new European General Data Protection Regulations.
ISTPA
International Security, Trust and Privacy Alliance
- ISTPA Privacy Tools & Technology FAQ January 20, 2003
- ISTPA Privacy Framework FAQ
- Managing Information Privacy Developing a Context for Security and Privacy Standards Convergence(ISTPA Privacy Framework ISO 20886)Robbins & Sabo
- Analysis of Privacy Principles: Making Privacy Operational v.2 2007
- ISTPA Privacy Framework v.1.1 2002
- Managing Privacy and Information by Sabo
- [https://gforge.hl7.org/gf/project/security/docman/Security%20White%20Papers/Is%20Privacy%20Obsolete%20Study%20Group%20Library/ISTPA/OASIS-Sabo-102207.ppt OASIS Data Privacy and�Government-Private Sector Information Sharing Systems for Critical Infrastructure Protection]�
- HHS Kolodner Privacy and Security Framework
Sharing with Protections - a New Paradigm
- Moving beyond Protection from Sharing in the age of Big Data, Learning Health System, and Health IOT
Balancing Clinician Need to Know (N2K) and Patient Privacy Expectations
- Examining Oversight of the Privacy & Security of Health Data Collected by Entities Not Regulated by HIPAA
- Care Teams Consent Attributes and Security Labels
- Care Team Provisioning for LHS.pptx Care Team ABAC Provisioning
- Care Team ABAC Provisioning Table Example
- Healthcare Team Model Glossary
- Cambridge_Health_Alliance_Team-Based_Care_Toolkit
Theresa Årdal Connor Privacy Attorney Norway
Pertinent EU Links
- HIMSS - What Healthcare Organizations need to know about the GDPR
- Dutch referendum: Spy tapping powers 'rejected'
- Data retention legislation in Europe
- German Justice Minister demands Facebook explain data scandal
- Table of EU Data Retention Issues
- EU Data Breaches June 2017
Counter Points
Study Group Members
x | Member Name | x | Member Name | x | Member Name | x | Member Name | |||
---|---|---|---|---|---|---|---|---|---|---|
x | Mike Davis - Study Group Lead | x | Christopher ShawnSecurity Co-chair | x | Kathleen ConnorSecurity Co-chair | . | Trish WilliamsSecurity Co-chair | |||
x | John MoehrkeSecurity Co-chair | x | Suzanne Gonzales-Webb | x | David Staggs | x | Diana Proud-Madruga | |||
. | Mohammed Jafari | . | Beth Pumo | . | [1] | x | [2] | |||
x | [3] | . | [4] | x | [5] | . | [6] |