Privacy Joy

Dec. 27, 2011
Privacy JoyWe have to limit access to certain information     The stakes regarding the dangers of EMR privacy violations are higher than we
Privacy JoyWe have to limit access to certain information
The stakes regarding the dangers of EMR privacy violations are higher than we realized. The threat extends well beyond the individual violated. The information in one patient's medical record could be used by "bad guys" to kill thousands of others (healthy people). That kind of information is freely available, on the Internet, in medical information such as in GenBank (referenced below). With rapidly evolving incorporation of genomic information derived from clinical care data, that risk translates straight into the EMR. The Mumbai attack illustrates that "bad guys" can and do use technology. The sophistication to breech security, violate privacy, and use data for mass destructive purposes is at our door step. Bill Joy's prescription? Re-think and restrict information access beyond current practice, since technologic barriers aren't defendable alone.In a TedTalk in 2006, Bill Joy concluded that "we have to limit access to certain information." The 1982 co-founder of Sun Microsystems, an author of BSD Unix, and other significant accomplishments, Bill was asked to speak a bit about technology and the potential for abuse. In light of the terrorist attacks last week in Mumbai, and the growing discomfort with the challenge of patient privacy, I thought it worthwhile to draw a connection.The terrorist attacks were characterized by unbridled access to power (guns, grenades) and technology (BlackBerry). Bill opened his 2006 talk by sharing that 'offensive uses of technology have an asymmetric advantage' compared to the challenges of defending against them. Bill was living in NYC during 9/11, doing research on the technology and the potential for abuse.

"Civilization is a bargain to not use [destructive] power [in exchange for peaceful co-existence]." Since this obviously cannot be assured, we need to consider the catalytic role of information technology and act accordingly.How dangerous is the bio-information available today? As he described in the NYT article excerpted here, the virus that caused the deadly 1918 flu is considered too deadly to store and transport for scientific research. If you need a copy, "just reconstruct it yourself. [the genetic sequence is freely available on the Internet.]" The scientists who made that statement were not kidding.

Recipe for Destruction

By RAY KURZWEIL and BILL JOY

Published: October 17, 2005

AFTER a decade of painstaking research, federal and university scientists have reconstructed the 1918 influenza virus that killed 50 million people worldwide. Like the flu viruses now raising alarm bells in Asia, the 1918 virus was a bird flu that jumped directly to humans, the scientists reported. To shed light on how the virus evolved, the United States Department of Health and Human Services published the full genome of the 1918 influenza virus on the Internet in the GenBank database.

This is extremely foolish. The genome is essentially the design of a weapon of mass destruction. No responsible scientist would advocate publishing precise designs for an atomic bomb, and in two ways revealing the sequence for the flu virus is even more dangerous.
...
 

Sponsored Recommendations

The Healthcare Provider's Guide to Accelerating Clinician Onboarding

Improve clinician satisfaction and productivity to enhance patient care

ASK THE EXPERT: ServiceNow’s Erin Smithouser on what C-suite healthcare executives need to know about artificial intelligence

Generative artificial intelligence, also known as GenAI, learns from vast amounts of existing data and large language models to help healthcare organizations improve hospital ...

TEST: Ask the Expert: Is Your Patients' Understanding Putting You at Risk?

Effective health literacy in healthcare is essential for ensuring informed consent, reducing medical malpractice risks, and enhancing patient-provider communication. Unfortunately...

From Strategy to Action: The Power of Enterprise Value-Based Care

Ever wonder why your meticulously planned value-based care model hasn't moved beyond the concept stage? You're not alone! Transition from theory to practice with enterprise value...