Skip to main content
Erschienen in: Health and Technology 3/2012

01.09.2012 | Original Paper

What electronic health records don’t know just yet. A privacy analysis for patient communities and health records interaction

verfasst von: Kim Wuyts, Griet Verhenneman, Riccardo Scandariato, Wouter Joosen, Jos Dumortier

Erschienen in: Health and Technology | Ausgabe 3/2012

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The advent of Web 2.0 has resulted in the emergence of a new generation of user-centric applications. Healthcare too follows this trend and a whole range of health-related applications are being introduced. Electronic health record (EHR) systems are being developed to enable electronic storing and sharing of medical data between health practitioners. Recently, initial steps have been taken to evolve toward cross-border sharing of EHR data. Patients also become more involved in their healthcare and start storing their health data online in personal health record (PHR) systems or look for online support and medical advice from other patients with similar diseases or treatments. The consolidation of these different systems is described as a promising approach to bring healthcare to a higher level. A consequence of this evolution is the rise of new privacy threats to the patient’s medical data, as more data becomes easily accessible to more people. Not only the treating physicians have access to the health data, the patient himself will have direct access to it and even be in control of his data and the access to it. As a first step in the answer to this trend, this paper presents a legally-founded analysis of the privacy issues emerging from the integration of EHR and patient communities. First, a taxonomy of health data types and user roles that have a key role in integrated health record systems is proposed. Second, privacy-preserving access rights are discussed and a set of privacy-aware access levels are suggested. Finally, ethical, legal, and technically challenges are highlighted, and a set of high-level privacy-enhancing technical requirements are presented.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
9
For more information see www.​medischegegevens​.​nl.
 
15
Art 8 Data Protection Directive [24]
 
16
HIPAA [22], 42 U.S.C. §1302d; 45 C.F.R. §146.103.
 
17
Art 2 (a) Data Protection Directive [24]
 
18
Recommendation No. (97) 5 of the Committee of Ministers to Member States on the Protection of Medical data, 13 February 1997.
 
19
European Court of Justice, Judgment of 6 November 2003, Case C-101/01—Bodil Lindqvist.
 
20
Doctor of medicine is the doctoral degree for physicians granted by medical schools (from http://​en.​wikipedia.​org/​wiki/​Doctor_​of_​Medicine)
 
23
article 7,2. (a), (c), (e) and 7,3. Data Protection Directive [24].
 
24
The Health Information Technology for Economic and Clinical Health Act, part of the American Recovery and Reinvestment Act.
 
Literatur
1.
Zurück zum Zitat Sunyaev A, Chornyi D, Mauro C, Kremar H. Evaluation framework for personal health records: Microsoft HealthVault vs. Google Health. In: 43th Hawaii International Conference on System Sciences; 2010. Sunyaev A, Chornyi D, Mauro C, Kremar H. Evaluation framework for personal health records: Microsoft HealthVault vs. Google Health. In: 43th Hawaii International Conference on System Sciences; 2010.
2.
Zurück zum Zitat Cabrnoch M, Hasic B. Electronic Health Book—a unique Czech solution for eHealth. Health and Technology; July 2011. Cabrnoch M, Hasic B. Electronic Health Book—a unique Czech solution for eHealth. Health and Technology; July 2011.
3.
Zurück zum Zitat Eysebach G. Medicine 2.0: Social networking, collaboration, participation, apomediation, and openness. Medicine 2.0 Proceedings, in Journal of Medical Internet Research 10(3);2008. Eysebach G. Medicine 2.0: Social networking, collaboration, participation, apomediation, and openness. Medicine 2.0 Proceedings, in Journal of Medical Internet Research 10(3);2008.
5.
Zurück zum Zitat European Network and Information Security Agency: Security Issues and Recommendations for Online Social Networks; 2007. European Network and Information Security Agency: Security Issues and Recommendations for Online Social Networks; 2007.
6.
Zurück zum Zitat O’Reilly T. What Is Web 2.0: design patterns and business models for the next generation of software. Commun Strateg. 2007;65:17–37. O’Reilly T. What Is Web 2.0: design patterns and business models for the next generation of software. Commun Strateg. 2007;65:17–37.
7.
Zurück zum Zitat Bos L, Marsh A, Carroll D, Gupta S, Rees M. Patient 2.0 empowerment. In: Arabnia H, Marsh A, editors. Proceedings of the 2008 International Conference on Semantic Web & Web Services (SWWS08); 2008. Bos L, Marsh A, Carroll D, Gupta S, Rees M. Patient 2.0 empowerment. In: Arabnia H, Marsh A, editors. Proceedings of the 2008 International Conference on Semantic Web & Web Services (SWWS08); 2008.
8.
Zurück zum Zitat Van De Belt T, Engelen L, Berben S, Schoonhoven L. Definition of Health 2.0 and Medicine 2.0: a systematic review. J Med Internet Res (JMIR). April–June 2010; 12(2). Van De Belt T, Engelen L, Berben S, Schoonhoven L. Definition of Health 2.0 and Medicine 2.0: a systematic review. J Med Internet Res (JMIR). April–June 2010; 12(2).
9.
Zurück zum Zitat Gunter T, Terry N. The Emergence of National Electronic Health Record Architectures in the United States and Australia: models, costs, and questions. J Med Internet Res. 2005. Gunter T, Terry N. The Emergence of National Electronic Health Record Architectures in the United States and Australia: models, costs, and questions. J Med Internet Res. 2005.
10.
Zurück zum Zitat US Department of Health and Human Services: The National Alliance for Health Information Technology Report to the Office of the National Coordinator for Health Information Technology on Defining Key Health Information Technology Terms; 2008. US Department of Health and Human Services: The National Alliance for Health Information Technology Report to the Office of the National Coordinator for Health Information Technology on Defining Key Health Information Technology Terms; 2008.
11.
Zurück zum Zitat Waegemann C. Status Report 2002: Electronic Health Records. 2002. Waegemann C. Status Report 2002: Electronic Health Records. 2002.
12.
Zurück zum Zitat ISO/TR 20514:2005 Health informatics—Electronic health record—Definition, scope and context; 2005. ISO/TR 20514:2005 Health informatics—Electronic health record—Definition, scope and context; 2005.
13.
Zurück zum Zitat Nyssen M, Thomeer K, Buyl R. Generating and transmitting ambulatory electronic medical prescriptions. In: XII Mediterranean Conference on Medical and Biological Engineering and Computing 2010 29. Springer Berlin Heidelberg; 2010. Nyssen M, Thomeer K, Buyl R. Generating and transmitting ambulatory electronic medical prescriptions. In: XII Mediterranean Conference on Medical and Biological Engineering and Computing 2010 29. Springer Berlin Heidelberg; 2010.
14.
Zurück zum Zitat Markle Foundation: Connecting for Health. The personal health working group final report; 2003. Markle Foundation: Connecting for Health. The personal health working group final report; 2003.
19.
Zurück zum Zitat Leimeister JM, Daum M, Krcmar H. Mobile communication and computing in healthcare—designing and implementing mobile virtual communities for cancers patients. In: Tokyo Mobile Business Roundtable, Tokyo; 2002. Leimeister JM, Daum M, Krcmar H. Mobile communication and computing in healthcare—designing and implementing mobile virtual communities for cancers patients. In: Tokyo Mobile Business Roundtable, Tokyo; 2002.
20.
Zurück zum Zitat Narayanan A, Shmatikov V. Myths and fallacies of “personally identifiable information”. Communications of the ACM; 2010. Narayanan A, Shmatikov V. Myths and fallacies of “personally identifiable information”. Communications of the ACM; 2010.
21.
Zurück zum Zitat Kuner C. European Data Protection Law. Oxford University Press; 2007. Kuner C. European Data Protection Law. Oxford University Press; 2007.
22.
Zurück zum Zitat U.S. Department of Health and Human Services: Health Insurance Portability and Accountability Act (HIPAA); 1996. U.S. Department of Health and Human Services: Health Insurance Portability and Accountability Act (HIPAA); 1996.
23.
Zurück zum Zitat Bygrave L. Data Protection Law, Approaching its rationale, logic, and limits. Kluwer Law International; 2002. Bygrave L. Data Protection Law, Approaching its rationale, logic, and limits. Kluwer Law International; 2002.
24.
Zurück zum Zitat European Communities: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data; 1995. European Communities: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data; 1995.
25.
Zurück zum Zitat Wong R. Data Protection online: alternative approaches to sensitive data. J Int Commer Law Technol. 2007;2(1):9–16. Wong R. Data Protection online: alternative approaches to sensitive data. J Int Commer Law Technol. 2007;2(1):9–16.
26.
Zurück zum Zitat Simitis S. Review of the answers to the Questionnaire of the Consultative Committee of the. 1999. Simitis S. Review of the answers to the Questionnaire of the Consultative Committee of the. 1999.
27.
Zurück zum Zitat Gossum K, Verhenneman G. Privacy and digital homecare, allies not enemies. In: Handbook of Digital Homecare, Series in Biomedical Engineering. Berlin: Springer-Verlag; 2009. Gossum K, Verhenneman G. Privacy and digital homecare, allies not enemies. In: Handbook of Digital Homecare, Series in Biomedical Engineering. Berlin: Springer-Verlag; 2009.
28.
Zurück zum Zitat De Hert P. Titel VI Persoonsgevevens en beroepsgeheim. In: Privacy en persoonsgegevens. Antwerpen: Politeia; 2010. p. 114–118. De Hert P. Titel VI Persoonsgevevens en beroepsgeheim. In: Privacy en persoonsgegevens. Antwerpen: Politeia; 2010. p. 114–118.
29.
Zurück zum Zitat Graux H, Dumortier J. Privacywetgeving in de praktijk. Antwerpen: UGA; 2009. Graux H, Dumortier J. Privacywetgeving in de praktijk. Antwerpen: UGA; 2009.
30.
Zurück zum Zitat Jenkins P, Potter S. No more “personal notes”? Data protection policy and practice in Higher Education counselling services in the UK. Br J Guid Counsel. 2007;35(1):131–46.CrossRef Jenkins P, Potter S. No more “personal notes”? Data protection policy and practice in Higher Education counselling services in the UK. Br J Guid Counsel. 2007;35(1):131–46.CrossRef
31.
Zurück zum Zitat Vansweevelt T, Dewallens F. Het patiëntendossier. Antwerpen: Intersentia; 2011. Vansweevelt T, Dewallens F. Het patiëntendossier. Antwerpen: Intersentia; 2011.
34.
Zurück zum Zitat McCarthy C. Paging Dr. Google: personal health records and patient privacy. William and Mary Law Review. 2010;51(6):2243(26) McCarthy C. Paging Dr. Google: personal health records and patient privacy. William and Mary Law Review. 2010;51(6):2243(26)
37.
Zurück zum Zitat Santana S, Lausen B, Bujnowska-Fedak M, Chronaki C, Kummervold P, Rasmussen J, Sorensen T. Online communication between doctors and patients in Europe: status and perspectives. J Med Internet Res. 2010;12(2). Santana S, Lausen B, Bujnowska-Fedak M, Chronaki C, Kummervold P, Rasmussen J, Sorensen T. Online communication between doctors and patients in Europe: status and perspectives. J Med Internet Res. 2010;12(2).
40.
Zurück zum Zitat Office of the National Coordinator for Health Information Technology, U.S. Department of Health and Human Services: Nationwide Privacy and Security Framework For Electronic Exchange of Individually Identifiable Health Information. 2008. Office of the National Coordinator for Health Information Technology, U.S. Department of Health and Human Services: Nationwide Privacy and Security Framework For Electronic Exchange of Individually Identifiable Health Information. 2008.
41.
Zurück zum Zitat Beaver K, Herold R. The practical guide to HIPAA privacy and security compliance. Auerbach Publications; 2004. Beaver K, Herold R. The practical guide to HIPAA privacy and security compliance. Auerbach Publications; 2004.
42.
Zurück zum Zitat Wuyts K, Scandariato R, Verhenneman G, Joosen W. Integrating patient consent in e-Health access control. Int J Secure Softw Eng. 2011;2(2). Wuyts K, Scandariato R, Verhenneman G, Joosen W. Integrating patient consent in e-Health access control. Int J Secure Softw Eng. 2011;2(2).
43.
Zurück zum Zitat Fang L, LeFevre K. Privacy Wizards for Social Networking Sites. In: 19th international conference on World wide web (WWW’10); 2010. Fang L, LeFevre K. Privacy Wizards for Social Networking Sites. In: 19th international conference on World wide web (WWW’10); 2010.
44.
Zurück zum Zitat Pfitzmann B, Waidner M. Federated identity-management protocols. In: Security Protocols, Lecture Notes in Computer Science 3364. Springer Berlin/Heidelberg; 2005. Pfitzmann B, Waidner M. Federated identity-management protocols. In: Security Protocols, Lecture Notes in Computer Science 3364. Springer Berlin/Heidelberg; 2005.
45.
Zurück zum Zitat De Borde D. Two-factor authentication. Siemens Enterprise Communications UK-Security Solutions; 2008. De Borde D. Two-factor authentication. Siemens Enterprise Communications UK-Security Solutions; 2008.
46.
Zurück zum Zitat Neamatullah I. Automated de-identification of free-text medical records. BMC Medical Informatics and Decision Making. 2008;8(1). Neamatullah I. Automated de-identification of free-text medical records. BMC Medical Informatics and Decision Making. 2008;8(1).
47.
Zurück zum Zitat El Emam K. Methods for the de-identification of electronic health records for genomic research. Genome Med. 2011;3(4). El Emam K. Methods for the de-identification of electronic health records for genomic research. Genome Med. 2011;3(4).
48.
Zurück zum Zitat Lederer S, Hong J, Dey A, Landay J. Personal privacy through understanding and action: five pitfalls for designers. Pers Ubiquitous Comput. 2004;8:440–54.CrossRef Lederer S, Hong J, Dey A, Landay J. Personal privacy through understanding and action: five pitfalls for designers. Pers Ubiquitous Comput. 2004;8:440–54.CrossRef
49.
Zurück zum Zitat Liu H, Maes P, Davenport G. Unraveling the taste fabric of social networks. International Journal on Semantic Web and Information Systems (IJSWIS) 2(1). Liu H, Maes P, Davenport G. Unraveling the taste fabric of social networks. International Journal on Semantic Web and Information Systems (IJSWIS) 2(1).
50.
Zurück zum Zitat Nguyen D, Mynatt E. Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems; 2001. Nguyen D, Mynatt E. Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems; 2001.
51.
Zurück zum Zitat Jernigan C, Mistree B. Gaydar: Facebook friendships expose sexual orientation. First Monday. October 2009;14(10). Jernigan C, Mistree B. Gaydar: Facebook friendships expose sexual orientation. First Monday. October 2009;14(10).
52.
Zurück zum Zitat Williams J. Social networking applications in health care: threats to the privacy and security of health information. In: Software Engineering in Health Care (SEHC 2010), Cape Town, South Africa; 2010. Williams J. Social networking applications in health care: threats to the privacy and security of health information. In: Software Engineering in Health Care (SEHC 2010), Cape Town, South Africa; 2010.
53.
Zurück zum Zitat Asim M, Petkovic M, Que M, Wang C. An interoperable security framework for connected healthcare. In: 7th IEEE International Workshop on Digital Rights Management Impact on Consumer Communication (DRM 2011); 2011. Asim M, Petkovic M, Que M, Wang C. An interoperable security framework for connected healthcare. In: 7th IEEE International Workshop on Digital Rights Management Impact on Consumer Communication (DRM 2011); 2011.
Metadaten
Titel
What electronic health records don’t know just yet. A privacy analysis for patient communities and health records interaction
verfasst von
Kim Wuyts
Griet Verhenneman
Riccardo Scandariato
Wouter Joosen
Jos Dumortier
Publikationsdatum
01.09.2012
Verlag
Springer-Verlag
Erschienen in
Health and Technology / Ausgabe 3/2012
Print ISSN: 2190-7188
Elektronische ISSN: 2190-7196
DOI
https://doi.org/10.1007/s12553-012-0026-3

Weitere Artikel der Ausgabe 3/2012

Health and Technology 3/2012 Zur Ausgabe