Security, Privacy, and Ownership Issues With the Use of Wearable Health Technologies

2018 ◽  
pp. 1068-1083
Author(s):  
Don Kerr ◽  
Kerryn Butler-Henderson ◽  
Tony Sahama

When considering the use of mobile or wearable health technologies to collect health data, a majority of users state security and privacy of their data is a primary concern. With users being connected 24/7, there is a higher risk today of data theft or the misappropriate use of health data. Furthermore, data ownership is often a misunderstood topic in wearable technology, with many users unaware who owns the data collected by a device, what that data can be used for and who can receive that data. Many countries are reviewing privacy governance in an attempt to clarify data privacy and ownership. But is it too late? This chapter explores the concepts of security and privacy of data from mobile and wearable technology, with specific examples, and the implications for the future.

Author(s):  
Don Kerr ◽  
Kerryn Butler-Henderson ◽  
Tony Sahama

When considering the use of mobile or wearable health technologies to collect health data, a majority of users state security and privacy of their data is a primary concern. With users being connected 24/7, there is a higher risk today of data theft or the misappropriate use of health data. Furthermore, data ownership is often a misunderstood topic in wearable technology, with many users unaware who owns the data collected by a device, what that data can be used for and who can receive that data. Many countries are reviewing privacy governance in an attempt to clarify data privacy and ownership. But is it too late? This chapter explores the concepts of security and privacy of data from mobile and wearable technology, with specific examples, and the implications for the future.


2019 ◽  
pp. 1629-1644 ◽  
Author(s):  
Don Kerr ◽  
Kerryn Butler-Henderson ◽  
Tony Sahama

When considering the use of mobile or wearable health technologies to collect health data, a majority of users state security and privacy of their data is a primary concern. With users being connected 24/7, there is a higher risk today of data theft or the misappropriate use of health data. Furthermore, data ownership is often a misunderstood topic in wearable technology, with many users unaware who owns the data collected by a device, what that data can be used for and who can receive that data. Many countries are reviewing privacy governance in an attempt to clarify data privacy and ownership. But is it too late? This chapter explores the concepts of security and privacy of data from mobile and wearable technology, with specific examples, and the implications for the future.


2020 ◽  
Vol 29 (01) ◽  
pp. 032-043 ◽  
Author(s):  
Hannah K. Galvin ◽  
Paul R. DeMuro

Objectives: To survey international regulatory frameworks that serve to protect privacy of personal data as a human right as well as to review the literature regarding privacy protections and data ownership in mobile health (mHealth) technologies between January 1, 2016 and June 1, 2019 in order to identify common themes. Methods: We performed a review of relevant literature available in English published between January 1, 2016 and June 1, 2019 from databases including PubMed, Google Scholar, and Web of Science, as well as relevant legislative background material. Articles out of scope (as detailed below) were eliminated. We categorized the remaining pool of articles and discrete themes were identified, specifically: concerns around data transmission and storage, including data ownership and the ability to re-identify previously de-identified data; issues with user consent (including the availability of appropriate privacy policies) and access control; and the changing culture and variable global attitudes toward privacy of health data. Results: Recent literature demonstrates that the security of mHealth data storage and transmission remains of wide concern, and aggregated data that were previously considered “de-identified” have now been demonstrated to be re-identifiable. Consumer-informed consent may be lacking with regard to mHealth applications due to the absence of a privacy policy and/or to text that is too complex and lengthy for most users to comprehend. The literature surveyed emphasizes improved access control strategies. This survey also illustrates a wide variety of global user perceptions regarding health data privacy. Conclusion: The international regulatory framework that serves to protect privacy of personal data as a human right is diverse. Given the challenges legislators face to keep up with rapidly advancing technology, we introduce the concept of a “healthcare fiduciary” to serve the best interest of data subjects in the current environment.


Author(s):  
Shariq I. Sherwani ◽  
Benjamin R. Bates

Rapid economic growth, industrialization, mechanization, sedentary lifestyle, high calorie diets, and processed foods have led to increased incidence of obesity in the United States of America. Prominently affected by the obesity epidemic are the most vulnerable such as the rural poor and those who have less access to nutritious and healthy foods due to barriers such as socioeconomic, infrastructural, and organizational. Wearable technology (WT) and health fitness applications (apps) have the potential to address some of the health disparities associated with obesity. Monitoring health parameters through WT and Apps using remote sensing technology generates personal health data which can be captured, analyzed, and shared with healthcare providers and others in social support network. Because captured data include protected health information, and breaches can occur, the concerns about health data privacy, personal ownership, and portability are addressed in this chapter.


2015 ◽  
Vol 24 (3) ◽  
pp. 256-271 ◽  
Author(s):  
BONNIE KAPLAN

Abstract:Two court cases that involve selling prescription data for pharmaceutical marketing affect biomedical informatics, patient and clinician privacy, and regulation. Sorrell v. IMS Health Inc. et al. in the United States and R v. Department of Health, Ex Parte Source Informatics Ltd. in the United Kingdom concern privacy and health data protection, data de-identification and reidentification, drug detailing (marketing), commercial benefit from the required disclosure of personal information, clinician privacy and the duty of confidentiality, beneficial and unsavory uses of health data, regulating health technologies, and considering data as speech. Individuals should, at the very least, be aware of how data about them are collected and used. Taking account of how those data are used is needed so societal norms and law evolve ethically as new technologies affect health data privacy and protection.


Author(s):  
Dhamanpreet Kaur ◽  
Matthew Sobiesk ◽  
Shubham Patil ◽  
Jin Liu ◽  
Puran Bhagat ◽  
...  

Abstract Objective This study seeks to develop a fully automated method of generating synthetic data from a real dataset that could be employed by medical organizations to distribute health data to researchers, reducing the need for access to real data. We hypothesize the application of Bayesian networks will improve upon the predominant existing method, medBGAN, in handling the complexity and dimensionality of healthcare data. Materials and Methods We employed Bayesian networks to learn probabilistic graphical structures and simulated synthetic patient records from the learned structure. We used the University of California Irvine (UCI) heart disease and diabetes datasets as well as the MIMIC-III diagnoses database. We evaluated our method through statistical tests, machine learning tasks, preservation of rare events, disclosure risk, and the ability of a machine learning classifier to discriminate between the real and synthetic data. Results Our Bayesian network model outperformed or equaled medBGAN in all key metrics. Notable improvement was achieved in capturing rare variables and preserving association rules. Discussion Bayesian networks generated data sufficiently similar to the original data with minimal risk of disclosure, while offering additional transparency, computational efficiency, and capacity to handle more data types in comparison to existing methods. We hope this method will allow healthcare organizations to efficiently disseminate synthetic health data to researchers, enabling them to generate hypotheses and develop analytical tools. Conclusion We conclude the application of Bayesian networks is a promising option for generating realistic synthetic health data that preserves the features of the original data without compromising data privacy.


2020 ◽  
pp. 089011712094431
Author(s):  
Jillian K. Kwong ◽  
Ignacio Cruz ◽  
Sheila T. Murphy

Purpose: To determine the relative impact of framing on employee intention to adopt wearable technology (eg, Fitbits) at work. Setting and Design: Posttest only online experiment utilizing a 2 (framing: organizational efficiency vs individual health) × 2 (financial incentive: absent vs present) between-subjects design. Participants: Participants (N = 310) were 18 years or older, currently employed, and residing in the United States. Measures: Unified Theory of Acceptance and Use of Technology (UTAUT) subscale on behavioral intent (modified for wearable technology). Analysis: Chi-square and between-subjects analysis of variance. Results: Participants receiving the organizational efficiency frame ( M = 3.97) expressed significantly lower intention to adopt a wearable compared to the individual health frame ( M = 4.37), F 2,308 = 3.99, P = .047. Financial incentives had a positive effect on adoption intention ( M = 4.39 with incentive, M = 3.95 no incentive), F 2,308 = 4.46, P = .036. The main effects of frame and incentive were additive, with participants in the individual health with incentive condition (n = 78, M = 4.60) expressing the highest intention to adopt and organizational efficiency without incentive expressing the lowest adoption intention (n = 77, M = 3.80; P = .03). Conclusions: Messaging emphasizing individual health benefits plus financial incentives might prove most successful when encouraging adoption of wearables at work.


Author(s):  
Sabine Vogler ◽  
Nina Zimmermann ◽  
Zaheer-Ud-Din Babar ◽  
Reinhard Busse ◽  
Jaime Espin ◽  
...  

AbstractThe 4th PPRI Conference, held in Vienna in October 2019, addressed issues related to equitable and affordable access to medicines. A multi-stakeholder audience from around the globe discussed solutions and best practice models for current challenges such as high-priced medicines, limitations of current pricing and reimbursement policies and tight budgets for health technologies. A multi-faceted approach (so-called balance, evidence, collaboration and transparency/BECT strategy) was also discussed. This includes an improved balance of different interests and policy areas, generation of relevant evidence, collaboration between countries and stakeholders, and transparency, and was considered as the most promising pathway for the future.


2016 ◽  
Vol 8 (3) ◽  
Author(s):  
Neal D Goldstein ◽  
Anand D Sarwate

Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.


2019 ◽  
Vol 1 (2) ◽  
pp. 103-116
Author(s):  
Olyvia Sindiawaty ◽  
Mercy Marvel

Intelligence Policy has often been heard in the realm of law, especially with government agencies held in Indonesia. One of them is the immigration agency, which is under the auspices of the Ministry of Law and Human Rights. The implementation of the policy is still minimal, although in fact it is contained in article 1 of Law No. 6 of 2011 number 30, as well as article 74. There are still many that need to be addressed, both in the applicable legal rules and with implementation in the field. The fact that sometimes the Immigration Officer is sometimes mixed in its own definition of intelligence and oversight. Are they the same or different and how to distinguish the two. Recognizing the fact that immigration is increasingly compacted by traffic activities in and out of foreigners and citizens and their supervision, a qualified intelligence is needed in maintaining the upholding of the country's sovereignty. It is an obligation, especially for immigration to safeguard the country as stated in the immigration function, is part of the affairs of the state government in providing Immigration services, law enforcement, state security, and community welfare development facilitators. Therefore, immigration should take part in enforcing supervision and security of the state in the field of law. Immigration intelligence which is under the auspices of the Directorate of Intelligence and immigration enforcement should need to be developed more thoroughly as a whole. So, it is hoped that in the future the Indonesian state will have total sovereignty over the country and its own people.


Sign in / Sign up

Export Citation Format

Share Document