A Revival of the Privacy Protection of Health-Related Personal Information?

2011 ◽  
Vol 18 (3) ◽  
pp. 247-254
Author(s):  
Henriette Roscam Abbing
2013 ◽  
Vol 20 (1) ◽  
pp. 63-78
Author(s):  
Maria Inês de Oliveira Martins

Abstract The need of private insurers for information on the candidate’s health risks is recognized by the law, which places pre-contractual duties of disclosure upon the candidates. When the risks are influenced by health factors, e.g. in the case of life- and health insurances, it implies the provision of health information by the candidates, who thus voluntarily limit their right to privacy. This consent, however, often happens in a context of factual coercion to contract. Next to this, from a legal standpoint, the collection of personal information must respond to the principle of proportionality. Against this background, this article assesses the compatibility of questionnaire techniques that rely on open-ended health related questions with the right to privacy, as protected by Portuguese and international law. It then analyses the extent of pre-contractual duties of disclosure as defined by the Portuguese Insurance Act, which requires the candidate to volunteer all the relevant information independently of being asked for it. In doing so, the article also refers to some other European countries. It concludes that the relevant Portuguese legislation is incompatible both with Portuguese constitutional law and with international law.


Author(s):  
Bailing Liu ◽  
Paul A. Pavlou ◽  
Xiufeng Cheng

Companies face a trade-off between creating stronger privacy protection policies for consumers and employing more sophisticated data collection methods. Justice-driven privacy protection outlines a method to manage this trade-off. We built on the theoretical lens of justice theory to integrate justice provision with two key privacy protection features, negotiation and active-recommendation, and proposed an information technology (IT) solution to balance the trade-off between privacy protection and consumer data collection. In the context of mobile banking applications, we prototyped a theory-driven IT solution, referred to as negotiation, active-recommendation privacy policy application, which enables customer service agents to interact with and actively recommend personalized privacy policies to consumers. We benchmarked our solution through a field experiment relative to two conventional applications: an online privacy statement and a privacy policy with only a simple negotiation feature. The results showed that the proposed IT solution improved consumers’ perceived procedural justice, interactive justice, and distributive justice and increased their psychological comfort in using our application design and in turn reduced their privacy concerns, enhanced their privacy awareness, and increased their information disclosure intentions and actual disclosure behavior in practice. Our proposed design can provide consumers better privacy protection while ensuring that consumers voluntarily disclose personal information desirable for companies.


2021 ◽  
Vol 13 (1) ◽  
pp. 20-39
Author(s):  
Ahmed Aloui ◽  
Okba Kazar

In mobile business (m-business), a client sends its exact locations to service providers. This data may involve sensitive and private personal information. As a result, misuse of location information by the third party location servers creating privacy issues for clients. This paper provides an overview of the privacy protection techniques currently applied by location-based mobile business. The authors first identify different system architectures and different protection goals. Second, this article provides an overview of the basic principles and mechanisms that exist to protect these privacy goals. In a third step, the authors provide existing privacy protection measures.


2019 ◽  
Vol 35 (3) ◽  
Author(s):  
Tanja Sobko ◽  
Gavin Brown

Activity trackers (ATs) equipped with biometric sensors may support deep knowledge acquisition of health and active learning. The mechanism may be via personal data being pushed to the students, which deepens the knowledge about their own health and may impact long-term health action processes. To understand health knowledge acquisition, 43 students attending an undergraduate university course were equipped with an AT over a period of five months. Weekly observation on emerging personal data and consequent actions (lifestyle adaptations) were reflected in an individual course-related ePortfolio. Students’ change in health action process was assessed using a short standard eHealth literacy scale at the beginning and end of the course. The usability of ePortfolio tool was tested with two previously validated scales. The combination of personal information from an AT and ePortfolio may have enhanced students’ critical assessment of health-related personal and available digital information. eHealth literacy scores significantly increased by the end of the course (p < .01). The ePortfolio helped with learning, and the usability of the ePortfolio did not really interfere. The combination of AT and ePortfolio constitutes a novel and productive method of using ePortfolios in higher education in regards to eHealth literacy acquisition.


Author(s):  
Oh Ky U-Cheol

The ICT revolution triggered by the emergence of smart devices, typically represented by the iPhone and the iPad, is migrating into the new domain of ‘big data’ after passing the turning point of ‘SNS Life,’ which is represented by Twitter and FaceBook among others. These developments have brought significant changes in all areas of politics, economy and culture. The stock prices of Apple, Samsung Electronics, FaceBook and Google fluctuate depending on who takes the hegemony in the changes. Meanwhile, such a reform of the ICT sector has generated some new undesirable sideeffects, including online disclosure of personal information, malicious comments, Smishing or other forms of financial scams. As we cannot abandon either big data or privacy protection, it is critical to find a compromise. It seems both evident and selfexplanatory that the use of big data, which is attributable to technical innovation, conflicts with privacy protection based on the idea that individuals should be allowed to determine the disclosure or not of their personal information. Yet, the problem here is that the discussion of countermeasures remains at the level of catching the wind with a net. Therefore, this paper intends to present a framework that can objectively verify what impact the enhanced legal regulation concerning privacy protection has on the use of big data as the first step in exploring a compromise between the use of big data and privacy protection.


Author(s):  
Elsa Supiot ◽  
Margo Bernelin

This chapter analyzes the European Union framing of the protection of genetic privacy in the context of the European Commission's 2012 proposal to amend the 95/46/EC Data Protection Directive. This market-driven proposal, fitting a wider European movement with regard to health-related legal framework, takes into account the challenges to privacy protection brought by rapid technological development. Although the proposal is an attempt to clarify the 1995 Data Protection Directive, including the question of genetic data, it also creates some controversial grey areas, especially concerning the extensive regulatory role to be played by the European Commission. With regard to genetic privacy, this chapter takes the opportunity to develop on this paradox, and gives an analysis of the European design on the matter.


Cyber Crime ◽  
2013 ◽  
pp. 814-831
Author(s):  
J. Michael Tarn ◽  
Naoki Hamamoto

This chapter explores the current status and practices of online privacy protection in Japan. Since the concept of privacy in Japan is different from that in western countries, the background of online privacy concepts and control mechanisms are discussed. The chapter then introduces Japan’s Act on the Protection of Personal Information along with the privacy protection system in Japan. Following the discussion of the privacy law, Japan’s privacy protection mechanisms to support and implement the new act are examined. To help companies make smooth adjustments and transitions, a four-stage privacy protection solution model is presented. Further, this chapter discusses two case studies to exemplify the problems and dilemmas encountered by two Japanese enterprises. The cases are analyzed and their implications are discussed. The chapter is concluded with future trends and research directions.


Cyber Crime ◽  
2013 ◽  
pp. 69-82 ◽  
Author(s):  
Anil Gurung ◽  
Anurag Jain

Individuals are generally concerned about their privacy and may withhold from disclosing their personal information while interacting with online vendors. Withholding personal information can prevent online vendors from developing profiles to match needs and wants. Through a literature review of research on online privacy, we develop an integrative framework of online privacy protection.


Author(s):  
Scott Flinn ◽  
Scott Buffett

This chapter discusses privacy from the perspective of the consumer of e-services. It proposes a technique for risk management assessment designed to help consumers evaluate a situation to identify and understand potential privacy concerns. The technique centers around a series of questions based on common principles of privacy protection. The chapter discusses how a consumer can understand exposure risks and how information can be controlled and monitored to mitigate the risks. It also proposes a method for assessing the consumer’s value of personal information, and a mechanism for automated negotiation is presented to facilitate fair, private information exchange. The authors believe that these or similar techniques are essential to give consumers of e-services meaningful control over the personal information they release. This forward-looking chapter provides a foundation for developing methods to empower users with control over their private information.


Sign in / Sign up

Export Citation Format

Share Document