AI帮你理解科学

AI 生成解读视频

AI抽取解析论文重点内容自动生成视频


pub
生成解读视频

AI 溯源

AI解析本论文相关学术脉络


Master Reading Tree
生成 溯源树

AI 精读

AI抽取本论文的概要总结


微博一下
All that the Roberts court did was set the burden of persuasion; it is firmly allocated to those who would reduce the health care Congress has promised

Protecting Patient Privacy in the Age of Big Data

(2012)

被引用7|浏览9
下载 PDF 全文
引用
微博一下

代码

数据

简介
  • The new Administration will determine the future of privacy protection in the United States.
  • Much the same could have been said of all the administrations of the last five or six decades.
  • Failure to act during the four years will send an almost irrefutable signal to the data collection and aggregation industries that “big data” cannot be stopped or even slowed.
  • “big data” refers to a revolution in data collection and processing that dramatically increases the privacy risks imposed on data subjects
重点内容
  • The new Administration will determine the future of privacy protection in the United States
  • “big data” refers to a revolution in data collection and processing that dramatically increases the privacy risks imposed on data subjects
  • All that the Roberts court did was set the burden of persuasion; it is firmly allocated to those who would reduce the health care Congress has promised
结果
  • Rate of more than 30 percent a year.”[30] Big data is creating a private surveillance model that will exceed law enforcement tracking of individuals using Internet and cell phone data.[31].
结论
  • It is likely that the editors of this Symposium expected the health care contribution to address health reform
  • That it does not, was not a function of Justice Roberts’ taxation “save” of the Affordable Care Act (“ACA”) back in June 2012.168 ACA was always a classic piece of mash-up legislation, a hodgepodge of measures primarily designed to increase access by doubling down on a private insurance model.
  • During the 2012 presidential election campaign, the choice for the incoming president, rhetoric aside,[170] was never about the repeal of, or the doubling down on, the ACA
  • Rather, it was about rearranging ACA’s deckchairs, finding tweaks that can attract the votes.
  • All that the Roberts court did was set the burden of persuasion; it is firmly allocated to those who would reduce the health care Congress has promised
基金
  • Rate of more than 30 percent a year.”[30] Big data is creating a private surveillance model that will exceed law enforcement tracking of individuals using Internet and cell phone data.[31]
研究对象与分析
patients: 23000
Accretive Health, Inc., is a very different case, but not only because it ended in a settlement.66. The case is not particularly important from a traditional privacy perspective, even though the Minnesota Attorney General’s investigation was triggered by the alleged theft of an Accretive laptop containing data from about 23,000 patients.67. Rather, Accretive illustrates some of the possible implications of the big data cocktail, mixing clinical with nonclinical data

patients: 959030
Kaelber et al, Patient Characteristics Associated With Venous Thromboembolic Events: A Cohort Study Using Pooled Electronic Health Record Data, 19(6) JAMIA 965 (2012), available at http://www.amia.org/sites/amia.org/files/JAMIA-2012-Kaelber-amiajnl-2011-000782. pdf (reporting study of de-identified clinical data of 959,030 patients sourced from EHRs in multiple healthcare systems). 148 See ALEX W

引用论文
  • 1 Nicolas P. Terry, Meaningful Adoption: What We Know or Think We Know About the Financing, Effectiveness, Quality, and Safety of Electronic Medical Records, 34 J. LEGAL MED. 7 (2013).
    Google ScholarLocate open access versionFindings
  • 5 One of the more effective groups promoting a somewhat depoliticized approach to promoting HIT and the protection of health information is the Bipartisan Policy Center (“BPC”). See, e.g., Transforming Health Care: The Role of Health IT, BIPARTISAN POL’Y CENTER (Jan. 27, 2012), http://www.bipartisanpolicy.org/news/multimedia/2012/02/transforming-health-care-role-health-it. The BPC is led by Tom Daschle and Bob Bennett, two influential former U.S.senators. See Bernie Monegain, Health IT a Bridge Between Democrat Daschle, Republican Bennett, GOV’T HEALTH IT (Apr.27, 2011), http://www.govhealthit.com/news/health-it-bridge-between-democrat-daschlerepublican-bennett.
    Locate open access versionFindings
  • 6 See generally Mike Miliard, Will Health IT Bipartisanship Survive the Elections?, GOV’T HEALTH IT (Feb. 06, 2012), http://www.govhealthit.com/news/will-health-it-bipartisanship-surviveelections (discussing bipartisan support of health IT).
    Locate open access versionFindings
  • 7 See Nicolas P. Terry & Leslie P. Francis, Ensuring the Privacy and Confidentiality of Electronic Health Records, 2007 U. ILL. L. REV. 681, 708 (2007).
    Google ScholarLocate open access versionFindings
  • 13 See 27 Suspended for Clooney File Peek, CNN (Oct. 10, 2007), http://articles.cnn.com/2007-10-
    Findings
  • 17 Robert Kocher & Bryan Roberts, Meaningful Use of Health IT Stage 2: The Broader Meaning, HEALTH AFF. (Mar. 15th, 2012), http://healthaffairs.org/blog/2012/03/15/meaningful-use-of-healthit-stage-2-the-broader-meaning/.18 Jordan Robertson, The Health-Care Industry Turns to Big Data, BLOOMBERG BUS. WEEK (May
    Locate open access versionFindings
  • 20 Megabytes, Gigabytes, Terabytes... What Are They?, WHAT’S A BYTE?, http://www.whatsabyte.com/ (last visited Jan.30, 2013).
    Findings
  • 22 Natasha Singer, Consumer Data, But Not for Consumers, N.Y. TIMES, July 22, 2012, at BU3.
    Google ScholarFindings
  • 23 Steve Lohr, Amid the Flood, A Catchphrase Is Born, N.Y. TIMES, August 12, 2012, at BU3. See generally Sean Gallagher, Big Brother on a Budget: How Internet Surveillance Got So Cheap, ARS
    Google ScholarLocate open access versionFindings
  • 24 See Nicolas P. Terry, Fear of Facebook: Private Ordering of Social Media Risks Incurred by Healthcare Providers, 90 NEB. L. REV. 703, 703-51 (2012); see also Nicolas P. Terry, Physicians and Patients Who “Friend” Or “Tweet”: Constructing a Legal Framework for Social Networking in a Highly Regulated Domain, 43 IND. L. REV. 285, 285-341 (2010).
    Google ScholarLocate open access versionFindings
  • 25 Jennifer M. Urban, Chris Jay Hoofnagle & Su Li, Mobile Phones and Privacy (Univ. of Cal., Berkeley Pub. Law Research, Working Paper No. 2103405, 2012), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2103405.
    Locate open access versionFindings
  • 26 See MANYIKA ET AL., supra note 15, at 1; WORLD ECON. FORUM, BIG DATA, BIG IMPACT: NEW POSSIBILITIES FOR INTERNATIONAL DEVELOPMENT 2-3 (2012), available at http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf; see also Sarah Perez, Amazon’s Silk Browser Now Tracking User Behavior For New “Trending Now” Section... Wait, What?, TECHCRUNCH (Sept.7, 2012), http://techcrunch.com/2012/09/07/amazons-silk-browser-nowtracking-user-behavior-for-new-trending-now-section-wait-what/.27 See, e.g., THE HUNT FOR RED OCTOBER (Paramount Pictures 1990).
    Locate open access versionFindings
  • 28 Kevin Ashton, That ‘Internet of Things’ Thing, RFID JOURNAL (July 22, 2009), http://www.rfidjournal.com/article/view/4986.“[T]oday’s information technology is so dependent on data originated by people that our computers know more about ideas than things. If we had computers that knew everything there was to know about things—using data they gathered without any help from us—we would be able to track and count everything, and greatly reduce waste, loss and cost.” Id.29 Michael Chui, Markus Löffler & Roger Roberts, The Internet of Things, MCKINSEY Q., Mar.2010, at 70. Excerpt of the article can be found at:http://www.mckinsey.com/insights/mgi/research/technology_and_innovation/the_internet_of_things.
    Locate open access versionFindings
  • 31 See, e.g., The End of Privacy?, N.Y. TIMES, July 14, 2012, at SR10; see also Andy Greenberg, U.S. Government Requests For Google Users’ Private Data Jump 37% In One Year, FORBES
    Google ScholarLocate open access versionFindings
  • 34 Rebecca Greenfield, Facebook Now Knows What You’re Buying at Drug Stores, ATLANTIC WIRE (Sept. 24, 2012), http://www.theatlanticwire.com/technology/2012/09/facebook-tracking-you-drugstore-now-too/57183.
    Findings
  • 43 See Jerome Groopman & Pamela Hartzband, Obama’s $80 Billion Exaggeration, WALL ST. J., Mar. 12, 2009, at A15. “Some have speculated that the patient data collected by the Obama administration in national electronic health records will be mined for research purposes to assess the cost effectiveness of different treatments. This analysis will then be used to dictate which drugs and devices doctors can provide to their patients in federally funded programs like Medicare.” Id. 44 Michelle McNickle, 5 Basics of Big Data, HEALTHCARE IT NEWS (June 13, 2012), http://www.healthcareitnews.com/news/5-basics-big-data.
    Locate open access versionFindings
  • 45 See Terry, supra note 1, at 25-26, 39. 46 42 U.S.C.A. § 17935(c) (West 2010) (corresponds to the HITECH Act, Pub. L. No. 111-5,
    Google ScholarFindings
  • 48 See generally Nicolas P. Terry, Personal Health Records: Directing More Costs and Risks to Consumers?, 1 DREXEL L. REV. 216 (2009) (discussing the growth and use of personalized health records).
    Google ScholarLocate open access versionFindings
  • 55 See, e.g., Amy Dockser Marcus & Christopher Weaver, Heart Gadgets Test Privacy-Law Limits, WALL ST. J. (Nov. 28, 2012, 10:31 PM), http://online.wsj.com/article/SB10001424052970203937
    Findings
  • 56 Consumer Data Products Catalog, ACXIOM, http://www.acxiom.com/site-assets/catalogconsumer-data-products/ (last visited Jan.30, 2013).
    Findings
  • 58 See, e.g., In re Reed Elsevier, Inc. & Seisint, Inc., No. 052-3094, 2008 WL 3150420 (F.T.C. 2008). Case documents can also be found at: In the Matter of Reed Elsevier Inc. and Seisint, Inc., FED. TRADE COMM’N, http://www.ftc.gov/os/caselist/0523094/index.shtm (last visited Jan.30, 2013).
    Locate open access versionFindings
  • 59 See, e.g., In the Matter of Chitika, Inc., FTC File No. 1023087, FED. TRADE COMM’N, available at http://www.ftc.gov/os/caselist/1023087/index.shtm (last visited Jan.30, 2013). See generally
    Findings
  • 60 Sorrell v. IMS Health, Inc., 131 S.Ct. 2653, 2656-58 (2011).
    Google ScholarLocate open access versionFindings
  • 66 Minnesota v. Accretive Health, Inc., No. 12-145 (D. Minn. Aug. 7, 2012); see also Press Release, Office of Attorney General Lori Swanson, Attorney General Swanson Says Accretive Will Cease
    Google ScholarLocate open access versionFindings
  • 68 Complaint at 2, Minnesota v. Accretive Health, Inc., No. 12-145 (D. Minn. Aug. 7, 2012), available at http://www.ag.state.mn.us/PDF/Consumer/SecondAmendedSupplementaComplaint.pdf.
    Locate open access versionFindings
  • 73 United States v. Jones, 132 S. Ct. 945, 949 (2012).
    Google ScholarLocate open access versionFindings
  • 76 David Rosen, Four Ways Your Privacy is Being Invaded, SALON (Sept. 11, 2012, 8:44 AM), http://www.salon.com/2012/09/11/four_ways_your_privacy_is_being_invaded/.77 See generally ALAN F. WESTIN, PRIVACY AND FREEDOM (1970); see also Nicolas P. Terry, What’s
    Locate open access versionFindings
  • 79 See Margaret Jane Radin, Market-Inalienability, 100 HARV. L. REV. 1849, 1853 (1987).
    Google ScholarLocate open access versionFindings
  • 82 See Breach Notification for Unsecured Protected Health Information, 74 Fed. Reg. 42740-01 (Aug. 24, 2009) (codified at 45 C.F.R. pts. 160 & 164).
    Google ScholarFindings
  • 83 Health Information Privacy, U.S. DEP’T OF HEALTH & HUM. SERVS., http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.html (last visited Jan.30, 2013).
    Findings
  • 91 See Medical Identity Theft and Data Mismanagement, PRICEWATERHOUSE COOPERS, http://www.pwc.com/us/en/healthcare/publications/medical-identity-theft-and-data-mismanagement.jhtml (last visited Jan.30, 2013).
    Findings
  • 92 Michael Bruemmer, Vigilance is Still the Best Medicine for Avoiding Medical Identity Theft, EXPERIAN (June 26, 2012), http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-isstill-the-best-medicine-for-avoiding-medical-identity-theft/; see also Jim Avila & Serena Marshall, Your Medical Records May Not Be Private: ABC News Investigation, ABC NEWS (Sept.13, 2012), http://abcnews.go.com/Health/medical-records-private-abc-news-investigation/story?id=17228986
    Locate open access versionFindings
  • 94 See, e.g., News Release, U.S. Dep’t of Health & Human Services, HHS Imposes a $4.3 Million Civil Money Penalty for Violations of the HIPAA Privacy Rule (Feb. 22, 2011), available at http://www.hhs.gov/news/press/2011pres/02/20110222a.html (discussing the first civil money penalty issued by HHS for a HIPAA violation); News Release, U.S. Dep’t of Health & Human Services, HHS Settles HIPAA Case With BCBST for $1.5 Million (Mar.13, 2012), available at http://www.hhs.gov/news/press/2012pres/03/20120313a.html (discussing first enforcement of the Breach Notification Rule); News Release, U.S. Dep’t of Health & Human Services, Massachusetts
    Locate open access versionFindings
  • 101 See generally Dan Goodman, Function Creep: Surveillance in London, THE SAMOVAR (July 17, 2007, 1:42 PM), http://thesamovar.wordpress.com/2007/07/17/function-creep-surveillance-inlondon/ (explaining that function creep is “[w]hen a new technology is introduced to do one thing (one function), and is later used for an entirely different thing....”).
    Locate open access versionFindings
  • 105 Multistakeholder Process to Develop Consumer Data Privacy Codes of Conduct, 77 Fed. Reg. 13098-01 (Mar. 5, 2012).
    Google ScholarLocate open access versionFindings
  • 108 See, e.g., Data Security and Breach Notification Act of 2011, S. 1207, 112th Cong. § 2-3 (2011).
    Google ScholarLocate open access versionFindings
  • 119 See 42 U.S.C.A. § 17932 (West 2010) (corresponds to HITECH § 13402 and the regulation made thereunder, Breach Notification for Unsecured Protected Health Information, 74 Fed. Reg. 42740-01 (Aug. 24, 2009)).
    Google ScholarLocate open access versionFindings
  • 120 See 42 U.S.C.A. § 17937 (corresponds to HITECH § 13407 and FTC regulation made thereunder, Health Breach Notification Rule, 74 Fed. Reg. 42962-01 (Aug. 25, 2009)).
    Google ScholarLocate open access versionFindings
  • 121 See generally OFFICE OF THE NAT’L COORDINATOR FOR HEALTH INFO. TECH., ABOUT THE PHR MODEL PRIVACY NOTICE: BACKGROUND, DEVELOPMENT PROCESS, KEY POINTS (2011), available at http://www.healthit.gov/sites/default/files/phr-model-privacy-notice-backgrounder-final.pdf.
    Findings
  • 122 Privacy & Security Policy, HEALTHIT.GOV, http://www.healthit.gov/policy-researchersimplementers/personal-health-record-phr-model-privacy-notice (last visited Jan.30, 2013).
    Locate open access versionFindings
  • 125 See, e.g., Data Security and Breach Notification Act of 2011, S. 1207, 112th Cong. § 2(a)(3). 126 See FED. TRADE COMM’N, supra note 86, at 16. “[T]he framework is meant to encourage best practices and is not intended to conflict with requirements of existing laws and regulations. To the extent that components of the framework exceed, but do not conflict with existing statutory requirements, entities covered by those statutes should view the framework as best practices to promote consumer privacy.” Id.
    Google ScholarLocate open access versionFindings
  • 130 See Federal Policy for the Protection of Human Subjects (‘Common Rule’), U.S. DEPT. OF HEALTH & HUM. SERVS., http://www.hhs.gov/ohrp/humansubjects/commonrule/index.html (last visited Jan.30, 2013).
    Findings
  • 131 See 45 C.F.R § 164.506 (2013); see also Robertson, supra note 18.
    Google ScholarFindings
  • 138 Roger Foster, Reducing Healthcare Administrative Inefficiencies With Big Data, GOV’T HEALTH IT (May 22, 2012), http://www.govhealthit.com/news/reducing-healthcare-inefficiencies-big-data.
    Findings
  • 139 See id. 140 HEALTH CARE COST INST., HEALTH CARE COST AND UTILIZATION REPORT 1 (2010), available at http://www.healthcostinstitute.org/files/HCCI_HCCUR2010.pdf.
    Findings
  • 142 See Patrick D. Meek, CER: Separating Fact from Fiction, DRUG TOPICS (Aug. 15, 2010), http://drugtopics.modernmedicine.com/drugtopics/article/articleDetail.jsp?id=681894.
    Locate open access versionFindings
  • 144 Erin McCann, Data Analytics Poised for Big Growth, HEALTHCARE IT NEWS (Aug. 16, 2012), http://www.healthcareitnews.com/news/data-analytics-assume-power-health-it. See generally
    Findings
  • 145 The eMERGE Network, EMERGE NETWORK, https://www.mc.vanderbilt.edu/victr/dcc/projects/acc/index.php/Main_Page (last visited Feb.5, 2013).
    Findings
  • 148 See ALEX W. GOODBY, LEIGHANNE OLSEN & MICHAEL MCGINNIS, CLINICAL DATA AS THE BASIC STAPLE OF HEALTH LEARNING: CREATING AND PROTECTING A PUBLIC GOOD (2010).
    Google ScholarFindings
  • 150 Ian Sample, Free Access to British Scientific Research Within Two Years, THE GUARDIAN (July 15, 2012 2:53 PM), http://www.guardian.co.uk/science/2012/jul/15/free-access-british-scientificresearch.
    Findings
  • 153 Ohm, supra note 135, at 1703-04.
    Google ScholarFindings
  • 154 See, e.g., Franklin G. Miller, Research on Medical Records Without Informed Consent, 36 J.L. MED. & ETHICS 560, 560-66 (2008).
    Google ScholarLocate open access versionFindings
  • 169 See Paul Krugman & Robin Wells, Getting Away With It, N.Y. REV. OF BOOKS (July 12, 2012), http://www.nybooks.com/articles/archives/2012/jul/12/getting-away-it/.170 See, e.g., Candidate Mitt Romney:“What the court did not do on its last day in session, I will do on my first day as president of the United States.” Jeff Zeleny, G.O.P. Vowing to Take Battle Into November, N.Y. TIMES, June 29, 2012, at A1. This was tempered some months before the election but after the Republican convention by Governor Romney’s statement that he would keep some provisions of ACA. See Lisa Lerer & Margaret Talev, Romney Says He Would Keep Parts of Obama Health Care Law, BLOOMBERG (Sept.9, 2012, 11:01 PM), http://www.bloomberg.com/news/2012-09-10/romney-says-he-would-keep-parts-of-obama-health-care-law.html.
    Locate open access versionFindings
  • 171 According to then ONC coordinator Dr. David Blumenthal, “The passage of the Patient Protection and Affordable Care Act of 2010 marks a new era in American health care. Yet in many ways, this era began more than a year earlier, with the passage of... [HITECH].” Melinda Beewkes Buntin et al., Health Information Technology: Laying the Infrastructure for National Health Reform, 29(6) HEALTH AFF. 1214 (2010), available at http://www.gohelp.wv.gov/ AdvisoryCouncil/Meetings/Documents/HealthAffairs_June_2010.pdf.
    Locate open access versionFindings
  • 172 See generally Nicolas P. Terry, Certification and Meaningful Use: Reframing Adoption of Electronic Health Records as a Quality Imperative, 8 IND. HEALTH L. REV. 45-68 (2011) (describing key provisions of the HITECH Act and its effect on electronic health records).
    Google ScholarLocate open access versionFindings
  • 173 See Accountable Care Organizations (ACO), CENTERS FOR MEDICARE & MEDICAID SERVS., https://www.cms.gov/Medicare/Medicare-Fee-for-Service-Payment/ACO/index.html?redirect=/ ACO/ (last visited Feb.5, 2013); Ron Klar, ACO 101: The Basics of Accountable Care, HEALTH AFF. BLOG (Aug.29, 2011), http://healthaffairs.org/blog/2011/08/29/aco-101-the-basicsof-accountable-care/.174 See Understanding the Patient-Centered Medical Home, AM. C. OF PHYSICIANS, http://www.
    Locate open access versionFindings
  • 175 See Michael Hickins, Supreme Court Reboots Health IT, CIO JOURNAL (June 28, 2012, 10:14
    Google ScholarLocate open access versionFindings
  • 176 See Moving America Forward, 2012 Democratic National Platform, DEMOCRATS.ORG, at 45, available at http://assets.dstatic.org/dnc-platform/2012-National-Platform.pdf (last visited Feb.5, 2013).
    Locate open access versionFindings
  • 177 We Believe in America, Republican Platform 2012, GOP.COM, at 23-24, http://www.gop.com/wp-content/uploads/2012/08/2012GOPPlatform.pdf (emphasis added) (last visited Feb.5, 2013); see Brendan Sasso, Dem Platform Vows to Defend Internet Freedom, THE HILL (Sept.4, 2012, 1:06 PM), http://thehill.com/blogs/hillicon-valley/technology/247381-democrats-vow-todefend-internet-freedom-in-platform 178 Michael Scherer, Inside the Secret World of the Data Crunchers Who Helped Obama Win, TIME (Nov.07, 2012), http://swampland.time.com/2012/11/07/inside-the-secret-world-of-quantsand-data-crunchers-who-helped-obama-win/#ixzz2KcC0yheE.179 Associate Press, Obama Signs FISA Warrantless Wiretapping Program Extension Into Law, HUFFINGTON POST (Dec.30, 2012, 5:49 PM), http://www.huffingtonpost.com/2012/12/30/obamafisa-warrantless-wiretapping_n_2385690.html.
    Locate open access versionFindings
作者
nicolas terry
nicolas terry
您的评分 :
0

 

标签
评论
数据免责声明
页面数据均来自互联网公开来源、合作出版商和通过AI技术自动分析结果,我们不对页面数据的有效性、准确性、正确性、可靠性、完整性和及时性做出任何承诺和保证。若有疑问,可以通过电子邮件方式联系我们:report@aminer.cn
小科