Client/Patient Privacy Rights

2003 ◽  
Author(s):  
2010 ◽  
Vol 7 (1) ◽  
pp. 23-45 ◽  
Author(s):  
ERIC J. HEIKKILA

Abstract:This paper proposes an information perspective on path dependence. From this perspective, historical paths are important insofar as knowledge about them shapes current decisions, for better or worse. A key consideration is the extent to which relevant information is fully inscribed in the existing configuration of state variables, including organizational structures and institutional norms. Using a chess analogy, path dependency arises whenever a decision maker's ‘move’ depends not only upon existing state variables, but also knowledge of the path by which this configuration came about. This chess analogy is then extended to various institutional contexts such as legal expungement of criminal records, patient privacy rights, and corporate executive succession strategies. A formal notation is introduced to specify this definition more precisely, and to compare it with other perspectives on path dependency, such as lock-in effects, increasing returns to scale, ergodic equilibria, and generalized notions that ‘history matters’.


2000 ◽  
Vol 26 (4) ◽  
pp. 453-474
Author(s):  
Sharon J. Hussong

In 1997, Judi Selig, a secretary for a South Carolina machinery firm, probably did not anticipate her employer's extreme reaction to her medical history. When her employer discovered that Ms. Selig had been exposed to hepatitis several years before, it demanded that she undergo a blood test and sign a medical release form so that the doctors in the employer's health plan could access her records. When Ms. Selig consented to the test but refused to sign the release form, her employer punished her by suspending her for a week without pay. Ms. Selig quit the company mainly because it threatened her privacy.


2007 ◽  
Vol 38 (5) ◽  
pp. 12
Author(s):  
PHILLIP V. GORDON ◽  
Deborah C. Peel
Keyword(s):  

2020 ◽  
Author(s):  
Rina Kagawa ◽  
Yukino Baba ◽  
Hideo Tsurushima

BACKGROUND Sharing progress notes as a common social capital is essential in research and education, but the content of progress notes is sensitive and needs to be kept confidential. Publishing actual progress notes are difficult due to privacy concerns. OBJECTIVE This study aims to generate a large repository of pseudo-progress notes of authentic quality. We focused on two requirements for authentic quality: the validity and consistency of the data, from the perspective of medical practice, and the empirical and semantic characteristics of progress notes, such as shorthand styles used for reporting changes in a patient's physical status, long narrative sentences detailing patient anxiety, and interprofessional communications. METHODS We proposed a practical framework that consists of a simulation of the notes and evaluation of the simulated notes. The framework utilized two human cognitive traits: (1) the ability to use imitation to simulate objects with diverse characteristics without background knowledge and (2) the use of comparison as a strategy for deep thinking. This enabled crowd workers to generate a large number of progress notes. Our framework involved three steps. In step 1, crowd workers imitated actual progress notes decomposed into subject data (S), object data (O), and assessment and plan (A/P). These imitated texts were then shuffled and recomposed in S, O, and A/P in order to create simulated progress notes. In step 2, crowd workers identified the characteristics of actual progress notes based on comparisons between actual and dummy progress notes. These characteristics were clustered based on their similarities. Each cluster exhibited the empirical and semantic characteristics of the actual progress notes. Finally, in step 3, the texts from step 1 that exhibited the identified characteristics from step 2 were evaluated as quality-guaranteed progress notes that met the two requirements. All data were preprocessed to protect patient privacy. RESULTS Step 1: By recomposing the 700 imitated texts, 9,856 simulated progress notes were generated. Step 2: 3,938 differences between actual progress notes and dummy progress notes were identified. After clustering, 166 characteristics were evaluated to be appropriate as empirical and semantic characteristics of the actual progress notes. Step 3: 500 crowd workers demonstrated that 83.0% of the simulated progress notes satisfied at least one of the characteristics obtained in step 2. The crowd workers' artificially-reproduced progress notes were evaluated to determine the most realistic, based on four metrics: disease, morpheme, readability, and reality. CONCLUSIONS Our results demonstrated that crowd workers could generate and evaluate highly professional documents. We have made our large repository of high-quality crowdsourced progress notes publicly available, and we encourage their use in the development of medical education and research.


2020 ◽  
Author(s):  
Alex Akinbi ◽  
Ehizojie Ojie

BACKGROUND Technology using digital contact tracing apps has the potential to slow the spread of COVID-19 outbreaks by recording proximity events between individuals and alerting people who have been exposed. However, there are concerns about the abuse of user privacy rights as such apps can be repurposed to collect private user data by service providers and governments who like to gather their citizens’ private data. OBJECTIVE The objective of our study was to conduct a preliminary analysis of 34 COVID-19 trackers Android apps used in 29 individual countries to track COVID-19 symptoms, cases, and provide public health information. METHODS We identified each app’s AndroidManifest.xml resource file and examined the dangerous permissions requested by each app. RESULTS The results in this study show 70.5% of the apps request access to user location data, 47% request access to phone activities including the phone number, cellular network information, and the status of any ongoing calls. 44% of the apps request access to read from external memory storage and 2.9% request permission to download files without notification. 17.6% of the apps initiate a phone call without giving the user option to confirm the call. CONCLUSIONS The contributions of this study include a description of these dangerous permissions requested by each app and its effects on user privacy. We discuss principles that must be adopted in the development of future tracking and contact tracing apps to preserve the privacy of users and show transparency which in turn will encourage user participation.


Author(s):  
Fred H. Cate ◽  
Beth E. Cate

This chapter covers the US Supreme Court’s position on access to private-sector data in the United States. Indeed, the Supreme Court has written a great deal about “privacy” in a wide variety of contexts. These include what constitutes a “reasonable expectation of privacy” under the Fourth Amendment to the Constitution; privacy rights implicit in, and also in tension with, the First Amendment and freedom of expression; privacy rights the Court has found implied in the Constitution that protect the rights of adults to make decisions about activities such as reproduction, contraception, and the education of their children; and the application of the two privacy exemptions to the Freedom of Information Act (FOIA).


Sign in / Sign up

Export Citation Format

Share Document