Privacy Joy

Dec. 27, 2011
Privacy JoyWe have to limit access to certain information     The stakes regarding the dangers of EMR privacy violations are higher than we
Privacy JoyWe have to limit access to certain information
The stakes regarding the dangers of EMR privacy violations are higher than we realized. The threat extends well beyond the individual violated. The information in one patient's medical record could be used by "bad guys" to kill thousands of others (healthy people). That kind of information is freely available, on the Internet, in medical information such as in GenBank (referenced below). With rapidly evolving incorporation of genomic information derived from clinical care data, that risk translates straight into the EMR. The Mumbai attack illustrates that "bad guys" can and do use technology. The sophistication to breech security, violate privacy, and use data for mass destructive purposes is at our door step. Bill Joy's prescription? Re-think and restrict information access beyond current practice, since technologic barriers aren't defendable alone.In a TedTalk in 2006, Bill Joy concluded that "we have to limit access to certain information." The 1982 co-founder of Sun Microsystems, an author of BSD Unix, and other significant accomplishments, Bill was asked to speak a bit about technology and the potential for abuse. In light of the terrorist attacks last week in Mumbai, and the growing discomfort with the challenge of patient privacy, I thought it worthwhile to draw a connection.The terrorist attacks were characterized by unbridled access to power (guns, grenades) and technology (BlackBerry). Bill opened his 2006 talk by sharing that 'offensive uses of technology have an asymmetric advantage' compared to the challenges of defending against them. Bill was living in NYC during 9/11, doing research on the technology and the potential for abuse.
"Civilization is a bargain to not use [destructive] power [in exchange for peaceful co-existence]." Since this obviously cannot be assured, we need to consider the catalytic role of information technology and act accordingly.How dangerous is the bio-information available today? As he described in the NYT article excerpted here, the virus that caused the deadly 1918 flu is considered too deadly to store and transport for scientific research. If you need a copy, "just reconstruct it yourself. [the genetic sequence is freely available on the Internet.]" The scientists who made that statement were not kidding.

Recipe for Destruction

By RAY KURZWEIL and BILL JOY

Published: October 17, 2005

AFTER a decade of painstaking research, federal and university scientists have reconstructed the 1918 influenza virus that killed 50 million people worldwide. Like the flu viruses now raising alarm bells in Asia, the 1918 virus was a bird flu that jumped directly to humans, the scientists reported. To shed light on how the virus evolved, the United States Department of Health and Human Services published the full genome of the 1918 influenza virus on the Internet in the GenBank database.

This is extremely foolish. The genome is essentially the design of a weapon of mass destruction. No responsible scientist would advocate publishing precise designs for an atomic bomb, and in two ways revealing the sequence for the flu virus is even more dangerous.
...
 

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...