Ethical Considerations of Privacy and Cyber-Medical information

In 1818, British author Mary Shelley's tale of Dr. Frankenstein's infamous creation startled and captivated a receptive audience. Just as the macabre, but resourceful, doctor created life from non-life that terrorized the local countryside, we have created a "cyberspace monster" that "lives" and knows no boundaries. It may not verily terrorize us, but we are likewise captivated by it. It profoundly influences and impacts our daily activities, but it is also out of control and has spawned many controversial issues bright free speech, censorship, intellectual property, and privacy. The free store and community norm may, in some measure, be capable of regulating these issues and ultimately help allay many of our concerns. A major and controversial concern that requires supplementary consulation is safeguarding the confidentiality of private medical information.

Expectations of Privacy and private medical Information

Law And Order Criminal Intent Episodes

According to attorney and privacy law specialist, Ronald B. Standler, "Privacy is the expectation that confidential personal data disclosed in a private place will not be disclosed to third parties, when that disclosure would cause either embarrassment or emotional distress to a someone of reasonable sensitivities" (Standler, 1997). Another theorist, Ruth Gavison, defines privacy as "the limitation of others' entrance to an individual with three key elements: secrecy, anonymity, and solitude." Secrecy or confidentiality deals with the limits of sharing knowledge of oneself. Anonymity deals with unwanted attention solitude refers to being apart from others (Spinello, 2003). Basically, we want to protect the integrity of who we are, what we do, and where we do it. Regardless of our definition, the right of privacy usually concerns individuals who are in a place reasonably thinkable, to be private. data that is collective record, or voluntarily disclosed in a collective place, is not protected.

Ethical Considerations of Privacy and Cyber-Medical information

The open architecture of the contemporary phenomenon that we call the Internet raises very unique ethical concerns concerning privacy. data is sent effortlessly over this vast global network without boundaries. Personal data may pass through many dissimilar servers on the way to a final destination. There are virtually no online activities or services that warrant absolute privacy. It is quite easy to be lulled into reasoning your activity is private when verily many of these computer systems can capture and store this personal data and verily monitor your online activity (Privacy rights Clearinghouse, 2006). The Net's fundamental architecture is designed to share data and not to conceal or protect it. Even though it is potential to manufacture an sufficient level of security, with an accepted risk level, it is at great cost and considerable time.

Medical records are among the most personal forms of data about an individual and may include medical history, lifestyle details (such as smoking or participation in high-risk sports), test results, medications, allergies, operations and procedures, genetic testing, and participation in study projects.The security of this private medical data falls under the area of medical ethics. The realm of medical ethics is to analyze and rule ethical dilemmas that arise in medical institution and biomedical research. medical ethics is guided by accurate law or standards that address: Autonomy, Beneficence, Nonmaleficence, Fidelity, and Justice (Spinello, 2003). The principle of Autonomy includes a person's right to be fully informed of all pertinent data associated to his/her healthcare. A consulation of medical ethical law and outpatient rights leads us to supplementary discuss legislation designed to articulate and protect these cherished rights.

Access to private medical data and the health assurance Portability and responsibility Act of 1996

Since 400 B.C. And the creation of the Hippocratic Oath, protecting the privacy of outpatient medical data has been an foremost part of the physician' code of conduct. Unfortunately, many organizations and individuals not subject to this accurate code of guide are increasingly requesting this private information.Every time a outpatient sees a doctor, is admitted to a hospital, goes to a pharmacist, or sends a claim to a healthcare plan, a record is made of their confidential health information. In the past, all healthcare providers protected the confidentiality of medical records by locking them away in file cabinets and refusing to recapitulate them to anyone else. Today, we rely on "protected" electronic records and a complex series of laws to articulate our confidential and private medical records.

Congress duly recognized the need for national outpatient record privacy standards in 1996 when they enacted the health assurance Portability and responsibility Act Hipaa). This act was efficient April 14, 2003 (small health plans implementation date was April 14, 2004) and was meant to enhance the efficiency and effectiveness of the nation's healthcare system. For the first time, federal law established standards for outpatient medical record entrance and privacy in all 50 states. The act includes provisions designed to save money for health care businesses by encouraging electronic transactions, but it also required new safeguards to protect the security and confidentiality of that data (Diversified Radiology of Colorado, 2002).

There are three considerable parts to Hipaa: Privacy, Code Sets, and Security. The security section is supplementary subdivided into four parts: administrative Procedures, corporal Safeguards, Technical security Services (covering "data at rest"), and Technical security Mechanisms (covering "data in transmission").

Privacy:

The intent of the Hipaa regulations is to protect patients' privacy and allow patients greater entrance to their medical records. The Act specifically addresses patients' Protected health data (Phi) and provides patients with greater entrance to and modification of their medical records. Prior to providing outpatient services, the Covered Entity must first receive the patient's consent to share Phi with such organizations as the assurance billing company, the billing office, and physicians to which the outpatient may be referred. Individuals must be able to entrance their records, request revision of errors, and they must be informed of how their personal data will be used. Individuals are also entitled to file formal privacy-related complaints to the department of health and Human Services (Hhs) Office for Civil Rights.

Code Sets:

Under Hipaa, codes are standardized to enhance security and security of health information. Agreeing to these new standards, a code set is any set of codes used for encoding data elements, such as tables of terms, medical determination codes, course codes, etc.

Security:

The security section is divided into four major parts:

1. Administrative, which requires documented formal practices, the operation of security measures to protect data, policies and procedures regulating guide of personnel in protecting data, security training, incident procedures, and termination policies.

2. corporal Safeguards recapitulate to the security of corporal computer systems, network safeguards, environmental hazards, and corporal intrusion. One must think computer screen placement, pass code protection, and computer locks to control entrance to medical information.

3. Technical security Services refers to Phi stored on the computer network and how it is securely stored and accessed. Those using the Phi must be logged on and authenticated. An audit trail of authenticated entrance will be maintained for 6 years.

4. Technical security Mechanisms refers to Phi transmitted over a transportation network such as the Internet, frame relay, Vpn, private line, or other network. Phi transmitted over a transportation network must be encrypted.

There are also some noticeable shortcomings to Hipaa. The act did itsybitsy to verily make health assurance more "portable" when an laborer changes employers. Also, the Act did not significantly increase the health insurers' responsibility for wrongdoing with provisions that are often difficult to monitor and enforce. There is also much obscuring for patients, as well as healthcare providers, in regard to the interpretation of the act (Diversified Radiology of Colorado, 2002).

Other Laws, Regulations, and Decisions concerning private medical Information

Besides Hipaa, there are foremost state regulations and laws, and federal laws and legal decisions, concerning the privacy and confidentiality of medical data (Clifford, 1999):

The Privacy Act of 1974 limits governmental agencies from sharing medical data from one department to another. Congress declared hat "the privacy of an individual is directly affected by the collection, maintenance, use and dissemination of personal data ...," and that "the right to privacy is a personal and fundamental right protected by the Constitution of the United States ..." (Parmet, 2002).

The Alcohol and Drug Abuse Act, passed in 1988, establishes confidentiality for records of patients treated for alcohol or drug abuse (only if they are treated in institutions that receive federal funding).

The Americans with Disabilities Act, passed in 1990, prohibits employers from development employment-related decisions based on a real or perceived disability, along with reasoning disabilities. Employers may still have entrance to identifiable health data about employees for reasonable company needs along with determining reasonable accommodations for disabled workers and for addressing workers compensation claims.

Supreme Court decision in Jaffee v. Redmond: On June 13, 1996, the Court ruled that there is a broad federal privilege protecting the confidentiality of transportation in the middle of psychotherapists and their clients. The ruling applies to psychiatrists, psychologists and collective workers.

Freedom and Privacy recovery Act of 1999: Designed to prohibit the creation of government unique medical Id numbers.

Managed Care and Cyber Threats to private medical Information

The introduction of the Internet and the advances in telecommunications technology over the last two decades allows us to entrance vast amounts of medical information, regardless of time, distance, or remoteness, with relative ease. This cyber entrance to medical data has profoundly changed how healthcare providers treat patients and offer advice. No longer are there barriers to the efficient change of health data and considerable life-saving medical information. In increasing to the many benefits of cyber entrance to medical information, there are also serious threats to our personal privacy and our medical information.

The intense interest for the security and privacy of medical data is driven by two major developments. The first is the increase of electronic medical record keeping that has substituted paper records. A record from the National Academy of Sciences states that the healthcare manufactures spent in the middle of and billion on data technology in 1996 (Mehlman, 1999). This was the year that the health assurance Portability and responsibility Act was passed with most of the expenditure attributed to converting hard-copy data to electronic formats.Electronic medical records (Emrs) present a considerable threat to maintaining the privacy of patient-identifiable medical information. This medical data can be retrieved instantaneously by anyone with entrance and passwords. Although hard-copy medical data can be verily copied, electronic records are much more verily copied and transmitted without boundaries.

The second major development that concerns the privacy of outpatient data is the thorough increase of managed care organizations. There is a ask for an unprecedented depth and breath of personal medical data by an increasing estimate of players. In divergence to traditional fee-for-service healthcare, the victualer of care and the insurer can be the same entity. In this situation, any medical data in the rights of the victualer is also known to the insurer. This is common in all forms of managed care, but most obvious in closed-panel Hmos. This sharing of data increases the fear that the insurer may use the data to limit benefits or terminate assurance coverage (Mehlman, 1999).

Some managed care clubs are reporting private medical data to an extreme in requiring providers to record to case managers within twenty-four hours any case that is carefully a high risk potential for the client, a second party, the employer, or the managed care company. Examples include such things as potential danger to self or others, suspected child abuse, potential threats to national security or the client organization, client's request for records, complaint about laborer assistance program services or threat of a lawsuit, and potential involvement in litigation along with confession or knowledge of criminal activity. No mention is made concerning client privacy or rights concerning the issue of this information. Nothing is also said about what will be done with the data that is shared (Clifford, 1999).

Another issue with managed care clubs is the large volume of data processed and the carelessness in handling medical information. A salient example deals with lost records as noted in a 1993 explore sample of San Francisco Bay Area psychologists. In this survey, 59% of reports were mailed or faxed to wrong persons, charts accidentally switched, or proper authorization not obtained (Clifford, 1999).

Maintaining and Protecting Electronic private medical Information

In order to articulate and protect valued private medical information, we must all the time be vigilant and proactive. Basic steps can be taken prior to using electronic data sharing. For example, when signing a "Release of Information" form, read all things carefully. If not clearly understood, ask questions. Also, remember that Hipaa grants you the right to request that your healthcare victualer restrict the use or disclosure of your medical information. Make sure those who ask for data are properly identified and authorized to accumulate this information. Finally, make sure that the someone collecting data uses at least two "identifiers" to ensure proper identification of outpatient (e.g. Name, last four of collective security number, address, telephone, number, birth date etc.

When dealing with electronic and computerized medical information, the situation gets more tenuous and much more complex. accumulate networks and websites, passwords, firewalls, and anti-virus software, are verily the first steps in a plan of protection. Passwords must be complex, using numbers, letters, and cases, yet also verily remembered. To articulate security, experts propose that passwords be changed every 90 days or if they are believed to be compromised. In addition, any private medical data sent on the Net or non-secure networks should be encrypted. Encryption (64 or 128 bit) is translating data into a private code where a key or password is required to read the information.

Further security is provided by using privacy improving P3P frameworks, filtering software (e.g. Mimesweeper), message authentication codes "(Macs), and "digital signatures." The Platform for Privacy Preferences project (P3P) is a technological framework that uses a set of user-defined standards to negotiate with websites concerning how that user's data will be used and disseminated to third parties (Spinello, 2003). This P3P architecture helps define and enhance cyberethics, improves accessibility, improves consistency, and increases the thorough trust in using cyberspace. Macs apply a common key that generates and verifies a message whereas digital signatures ordinarily use two complementary algorithms - one for signing and the other for verification.

There has also some creative technology proposed for maintaining and protecting private medical information. In October 2004, the "VeriChip" was approved by the Fda for implantation into the triceps of patients. The chip is about the size of a grain of rice and is inserted under the skin while a 20-minute procedure. This invisible chip market a code that can scanned to supplementary issue a patient's private medical information. This code is then used to download encrypted medical information. The course cost is about 0-200 (Msnbc, 2004).

Another more ordinarily used medical data tool is the "smart card," a credit card sized expedient with a small-embedded computer chip. This "computer in a card" can be programmed to achieve tasks and store foremost information. while an emergency, paramedics and urgency rooms adequate with smart card readers can rapidly entrance potentially life-saving data about a patient, such as allergies to medication, and lasting medical conditions. There are dissimilar types of smart cards: memory cards, processor cards, electronic purse cards, security cards, and JavaCards. These cards are tamper-resistant, can be Pin protected or read-write protected, can be encrypted, and can be verily updated. These unique features make smart cards advantageous for storing personal medical data and are favorite throughout the world. In Germany and Austria, 80 million people have the capability of using these smart cards when they visit their doctor (Cagliostro, 1999).

There is also a up-to-date proposed government plan to generate a national law of electronic health records (Ehrs). Details include the building of a National health data Network that will electronically associate all patients' medical records to providers, insures, pharmacies, labs, and claim processors. The sharing of vital data could enhance outpatient care, include more accurate and timely substantiation of claims, and be an asset to collective health in emergencies. The goal is to have it operational by 2009. Even with laudatory goals of recovery money, development medical care more efficient, and decreasing drug reactions and interactions, there are still potential dangers to this national plan. There are valid concerns that pharmaceutical clubs may attempt to store a new drug or expedient for your exact medical condition. There are also strong worries of exploitation and abuse of personal data. Who will monitor entrance to the information? There are also concerns that lenders or employers may rely on private medical data to make company decisions. Then there is all the time the ever present fear of hackers and pranksters retrieving your personal information. There are still so many questions unanswered (Consumer Reports.org, 2006).

In conclusion, we are now stuck with a "Cyberspace Monster" and all of its advantages and shortcomings. When we use cyberspace, we can have no expectations of privacy and we must accept a level of risk. Therefore, when transmitting and sharing private medical information, we must be all the time aware to take precautions in safeguarding our privacy as much as potential by using accumulate networks, P3P architecture, passwords, firewalls, encryption, message codes, digital signatures, and devices like smart cards and "VeriChips." medical records are among the most personal forms of data about an individual, but we are challenged to find a balance in the middle of society's interest in protecting medical confidentiality and the legitimate need for timely entrance to considerable medical data especially with fears of influenza pandemics and bioterrorism. When this data is transferred into electronic format, we have heightened concerns about maintaining and protecting this private data. With managed care, there is a ask for an unprecedented depth and breath of personal medical data by an increasing estimate of players. While the Hipaa provisions are a welcomed start in protecting our private medical information, we must remain vigilant of the ever increasing need to protect this extra information.

References:

Cagliostro, C. (1999) Smart card primer.

Clifford, R. (1999) Confidentiality of records and managed care legal and ethical issues.

Consumer Reports.org (2006). The new threat to your medical privacy.

Diversified Radiology of Colorado (2002) History: Hipaa general information.

Mehlman, M. J. (1999) Emerging issues: the privacy of medical records.

Msnbc (2004) Fda approves computer chip for humans.

Parmet, W. E. (2002) collective health security and privacy of medical records.

Privacy rights Clearinghouse (2006) Internet privacy resources.

Spinello, R. A. (2003) CyberEthics: Morality and law in cyberspace. Jones and Bartlett Publishers, Sudbury, Ma

Standler, R. B. (1997) Privacy law in the Usa.

Ethical Considerations of Privacy and Cyber-Medical information

0 comments:

Post a Comment