-
Journal of Nuclear Medicine Technology Dec 2019The Health Insurance Portability and Accountability Act (HIPAA) of 1996 has made an impact on the operation of health-care organizations. HIPAA includes 5 titles, and... (Review)
Review
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 has made an impact on the operation of health-care organizations. HIPAA includes 5 titles, and its regulations are complex. Many are familiar with the HIPAA aspects that address protection of the privacy and security of patients' medical records. There are new rules to HIPAA that address the implementation of electronic medical records. HIPAA provides rules for protected health information (PHI) and what should be protected and secured. The privacy rule regulates the use and disclosure of PHI and sets standards that an entity working with health data must follow to protect patients' private medical information. The HIPAA security rule complements the privacy rule and requires entities to implement physical, technical, and administrative safeguards to protect the privacy of PHI. This article-part 1 of a 2-part series-is a refresher on HIPAA, its history, its rules, its implications, and the role that imaging professionals play.
Topics: Guideline Adherence; Health Information Exchange; Health Insurance Portability and Accountability Act; Privacy; United States
PubMed: 31182664
DOI: 10.2967/jnmt.119.227819 -
Philosophical Transactions. Series A,... Sep 2018This position paper observes how different technical and normative conceptions of privacy have evolved in parallel and describes the practical challenges that these... (Review)
Review
This position paper observes how different technical and normative conceptions of privacy have evolved in parallel and describes the practical challenges that these divergent approaches pose. Notably, past technologies relied on intuitive, heuristic understandings of privacy that have since been shown not to satisfy expectations for privacy protection. With computations ubiquitously integrated in almost every aspect of our lives, it is increasingly important to ensure that privacy technologies provide protection that is in line with relevant social norms and normative expectations. Similarly, it is also important to examine social norms and normative expectations with respect to the evolving scientific study of privacy. To this end, we argue for a rigorous analysis of the mapping from normative to technical concepts of privacy and vice versa. We review the landscape of normative and technical definitions of privacy and discuss specific examples of gaps between definitions that are relevant in the context of privacy in statistical computation. We then identify opportunities for overcoming their differences in the design of new approaches to protecting privacy in accordance with both technical and normative standards.This article is part of a discussion meeting issue 'The growing ubiquity of algorithms in society: implications, impacts and innovations'.
Topics: Attitude; Privacy
PubMed: 30082304
DOI: 10.1098/rsta.2017.0358 -
Nature Reviews. Genetics Jul 2022Recent developments in a variety of sectors, including health care, research and the direct-to-consumer industry, have led to a dramatic increase in the amount of... (Review)
Review
Recent developments in a variety of sectors, including health care, research and the direct-to-consumer industry, have led to a dramatic increase in the amount of genomic data that are collected, used and shared. This state of affairs raises new and challenging concerns for personal privacy, both legally and technically. This Review appraises existing and emerging threats to genomic data privacy and discusses how well current legal frameworks and technical safeguards mitigate these concerns. It concludes with a discussion of remaining and emerging challenges and illustrates possible solutions that can balance protecting privacy and realizing the benefits that result from the sharing of genetic information.
Topics: Genome; Genomics; Privacy
PubMed: 35246669
DOI: 10.1038/s41576-022-00455-y -
Human Molecular Genetics Oct 2021Debates surrounding genetic privacy have taken on different forms over the past 30 years. Taking genetic privacy to mean an interest that individuals, families, or even... (Review)
Review
Debates surrounding genetic privacy have taken on different forms over the past 30 years. Taking genetic privacy to mean an interest that individuals, families, or even communities have with respect to genetic information, we examine the metaphors used in these debates to chronicle the development of genetic privacy. In 1990-2000, we examine claims for ownership and of 'humanity' spurred by the launch of the Human Genome Project and related endeavors. In 2000-2010, we analyze the interface of law and ethics with research infrastructures such as biobanks, for which notions of citizenship and 'public goods' were central. In 2010-2020, we detail the relational turn of genetic privacy in response of large international research consortia and big data. Although each decade had its leading conceptions of genetic privacy, the subject is neither strictly chronological nor static. We conclude with reflections on the nature of genetic privacy and the necessity to bring together the unique and private genetic self with the human other.
Topics: Ethics, Clinical; Genetic Privacy; Human Genome Project; Humanities; Humans; Ownership
PubMed: 34155499
DOI: 10.1093/hmg/ddab164 -
JMIR Nursing May 2024Health monitoring technologies help patients and older adults live better and stay longer in their own homes. However, there are many factors influencing their adoption... (Review)
Review
BACKGROUND
Health monitoring technologies help patients and older adults live better and stay longer in their own homes. However, there are many factors influencing their adoption of these technologies. Privacy is one of them.
OBJECTIVE
The aim of this study was to provide an overview of the privacy barriers in health monitoring from current research, analyze the factors that influence patients to adopt assisted living technologies, provide a social psychological explanation, and propose suggestions for mitigating these barriers in future research.
METHODS
A scoping review was conducted, and web-based literature databases were searched for published studies to explore the available research on privacy barriers in a health monitoring environment.
RESULTS
In total, 65 articles met the inclusion criteria and were selected and analyzed. Contradictory findings and results were found in some of the included articles. We analyzed the contradictory findings and provided possible explanations for current barriers, such as demographic differences, information asymmetry, researchers' conceptual confusion, inducible experiment design and its psychological impacts on participants, researchers' confirmation bias, and a lack of distinction among different user roles. We found that few exploratory studies have been conducted so far to collect privacy-related legal norms in a health monitoring environment. Four research questions related to privacy barriers were raised, and an attempt was made to provide answers.
CONCLUSIONS
This review highlights the problems of some research, summarizes patients' privacy concerns and legal concerns from the studies conducted, and lists the factors that should be considered when gathering and analyzing people's privacy attitudes.
Topics: Humans; Privacy; Monitoring, Physiologic
PubMed: 38723253
DOI: 10.2196/53592 -
Nature Reviews. Genetics May 2001This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical... (Review)
Review
This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.
Topics: Employment; Ethics, Medical; Genetic Testing; Humans; Insurance, Health; Prejudice; Privacy
PubMed: 11331906
DOI: 10.1038/35072029 -
Nature Reviews. Genetics Apr 2022The generation of functional genomics data by next-generation sequencing has increased greatly in the past decade. Broad sharing of these data is essential for research... (Review)
Review
The generation of functional genomics data by next-generation sequencing has increased greatly in the past decade. Broad sharing of these data is essential for research advancement but poses notable privacy challenges, some of which are analogous to those that occur when sharing genetic variant data. However, there are also unique privacy challenges that arise from cryptic information leakage during the processing and summarization of functional genomics data from raw reads to derived quantities, such as gene expression values. Here, we review these challenges and present potential solutions for mitigating privacy risks while allowing broad data dissemination and analysis.
Topics: Genetic Privacy; Genomics; High-Throughput Nucleotide Sequencing; Privacy; Risk Assessment
PubMed: 34759381
DOI: 10.1038/s41576-021-00428-7 -
Drug Discovery Today Dec 2023Data availability, data security, and privacy concerns often hamper optimal performance efficiency of machine learning (ML) techniques. Therefore, novel techniques for... (Review)
Review
Data availability, data security, and privacy concerns often hamper optimal performance efficiency of machine learning (ML) techniques. Therefore, novel techniques for the utilization of private/sensitive data in the field of drug discovery have been proposed for ML model-building tasks. Some examples of the different techniques are secure multiparty computation, distributed deep learning, homomorphic encryption, blockchain-based peer-to-peer networking, differential privacy, and federated learning, as well as combinations of such techniques. In this paper, we present an overview of these techniques for decentralized ML to illustrate its benefits and drawbacks in the field of drug discovery.
Topics: Privacy; Drug Discovery; Machine Learning
PubMed: 37935330
DOI: 10.1016/j.drudis.2023.103820 -
Sensors (Basel, Switzerland) Oct 2022Intelligent transportation systems will play a key role in the smart cities of the future. In particular, railway transportation is gaining attention as a promising... (Review)
Review
Intelligent transportation systems will play a key role in the smart cities of the future. In particular, railway transportation is gaining attention as a promising solution to cope with the mobility challenges in large urban areas. Thanks to the miniaturisation of sensors and the deployment of fast data networks, the railway industry is being augmented with contextual, real-time information that opens the door to novel and personalised services. Despite the benefits of this digitalisation, the high complexity of railway transportation entails a number of challenges, particularly from security and privacy perspectives. Since railway assets are attractive targets for terrorism, coping with strong security and privacy requirements such as cryptography and privacy-preserving methods is of utmost importance. This article provides a thorough systematic literature review on information security and privacy within railway transportation systems, following the well-known methodology proposed by vom Brocke et al. We sketch out the most relevant studies and outline the main focuses, challenges and solutions described in the literature, considering technical, societal, regulatory and ethical approaches. Additionally, we discuss the remaining open issues and suggest several research lines that will gain relevance in the years to come.
Topics: Privacy; Computer Security; Transportation
PubMed: 36298049
DOI: 10.3390/s22207698 -
Science (New York, N.Y.) Jan 2015This Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and... (Review)
Review
This Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and behavioral sciences: people's uncertainty about the consequences of privacy-related behaviors and their own preferences over those consequences; the context-dependence of people's concern, or lack thereof, about privacy; and the degree to which privacy concerns are malleable—manipulable by commercial and governmental interests. Organizing our discussion by these themes, we offer observations concerning the role of public policy in the protection of privacy in the information age.
Topics: Access to Information; Behavior; Humans; Information Dissemination; Internet; Privacy; Public Policy; Social Media; Uncertainty
PubMed: 25635091
DOI: 10.1126/science.aaa1465