Privacy Joy

Dec. 27, 2011
Privacy JoyWe have to limit access to certain information     The stakes regarding the dangers of EMR privacy violations are higher than we
Privacy JoyWe have to limit access to certain information
The stakes regarding the dangers of EMR privacy violations are higher than we realized. The threat extends well beyond the individual violated. The information in one patient's medical record could be used by "bad guys" to kill thousands of others (healthy people). That kind of information is freely available, on the Internet, in medical information such as in GenBank (referenced below). With rapidly evolving incorporation of genomic information derived from clinical care data, that risk translates straight into the EMR. The Mumbai attack illustrates that "bad guys" can and do use technology. The sophistication to breech security, violate privacy, and use data for mass destructive purposes is at our door step. Bill Joy's prescription? Re-think and restrict information access beyond current practice, since technologic barriers aren't defendable alone.In a TedTalk in 2006, Bill Joy concluded that "we have to limit access to certain information." The 1982 co-founder of Sun Microsystems, an author of BSD Unix, and other significant accomplishments, Bill was asked to speak a bit about technology and the potential for abuse. In light of the terrorist attacks last week in Mumbai, and the growing discomfort with the challenge of patient privacy, I thought it worthwhile to draw a connection.The terrorist attacks were characterized by unbridled access to power (guns, grenades) and technology (BlackBerry). Bill opened his 2006 talk by sharing that 'offensive uses of technology have an asymmetric advantage' compared to the challenges of defending against them. Bill was living in NYC during 9/11, doing research on the technology and the potential for abuse.
"Civilization is a bargain to not use [destructive] power [in exchange for peaceful co-existence]." Since this obviously cannot be assured, we need to consider the catalytic role of information technology and act accordingly.How dangerous is the bio-information available today? As he described in the NYT article excerpted here, the virus that caused the deadly 1918 flu is considered too deadly to store and transport for scientific research. If you need a copy, "just reconstruct it yourself. [the genetic sequence is freely available on the Internet.]" The scientists who made that statement were not kidding.

Recipe for Destruction

By RAY KURZWEIL and BILL JOY

Published: October 17, 2005

AFTER a decade of painstaking research, federal and university scientists have reconstructed the 1918 influenza virus that killed 50 million people worldwide. Like the flu viruses now raising alarm bells in Asia, the 1918 virus was a bird flu that jumped directly to humans, the scientists reported. To shed light on how the virus evolved, the United States Department of Health and Human Services published the full genome of the 1918 influenza virus on the Internet in the GenBank database.

This is extremely foolish. The genome is essentially the design of a weapon of mass destruction. No responsible scientist would advocate publishing precise designs for an atomic bomb, and in two ways revealing the sequence for the flu virus is even more dangerous.
...
 

Sponsored Recommendations

Discover how to look beyond the hype to develop a responsible generative AI strategy
Explore how healthcare leaders are shifting from reactive maintenance to proactive facility strategies. Learn how data-driven planning and strategic investment can boost operational...
Navigate healthcare's facility challenges. Get strategies to protect assets and ensure long-term stability.
Join Claroty, Cisco, and Children's Hospital Los Angeles (CHLA) on-demand as they uncover the reasons behind common pitfalls encountered by hospitals in network segmentation efforts...