How Should Health Data Be Used Privacy Secondary Use and Big Data Sales
How Should Health Data Be Used Privacy Secondary Use and Big Data Sales
This section features original work on the ethical, legal, policy, and
social aspects of the use of computing and information technology in
health, biomedical research, and the health professions. For submissions,
contact Kenneth Goodman at [email protected].
BONNIE KAPLAN
Abstract: Electronic health records, data sharing, big data, data mining, and secondary use
are enabling exciting opportunities for improving health and healthcare while also exacer-
bating privacy concerns. Two court cases about selling prescription data, the Sorrell case in
the U.S. and the Source case in the U.K., raise questions of what constitutes “privacy” and
“public interest”; they present an opportunity for ethical analysis of data privacy, com-
modifying data for sale and ownership, combining public and private data, data for research,
and transparency and consent. These interwoven issues involve discussion of big data ben-
efits and harms and touch on common dualities of the individual versus the aggregate or
the public interest, research (or, more broadly, innovation) versus privacy, individual versus
institutional power, identification versus identity and authentication, and virtual versus
real individuals and contextualized information. Transparency, flexibility, and accountability
are needed for assessing appropriate, judicious, and ethical data uses and users, as some
are more compatible with societal norms and values than others.
Keywords: confidentiality; health data privacy; health records; secondary use; big data;
data mining; pharmaceutical marketing; Sorrell v. IMS Health Inc.; R v. Department of Health,
https://doi.org/10.1017/S0963180115000614 Published online by Cambridge University Press
I am grateful for the thoughtful contributions to the panel I organized on the Sorrell case for the 2011
American Medical Informatics Association Annual Symposium and for comments on a very early draft
of some portions of this article by Paul DeMuro, JD, CPA, MBA, MBI, PhD, Broad and Cassel, Fort
Lauderdale, FL; Kenneth W Goodman, PhD, FACMI, University of Miami, Miami, FL; and Carolyn
Petersen, MS, MBI, Mayo Clinic, Rochester, MN. I also am grateful to privacy lawyer Joel S. Winston for
sharing drafts of his reporting with me, and to the editor for helpful suggestions.
data and the growth of health-related for data mining, research, and sale.
databases, data sharing, data aggrega- Throughout, I highlight potential ben-
tion, and biometric identification. efits and harms and argue that trans-
Significant health data protection, pol- parency, flexibility, and accountability
icy, and ethical considerations are inher- is needed. Ethical and policy analysis
ent in these cases. The cases call into should assess data uses and users, as
question just what constitutes “privacy” some are more compatible with societal
and “public interest,” and considerations norms and values than others.
for balancing them. They provide an Considering how health data should
opportunity to weigh privacy against the be used in light of these issues suggests
numerous beneficial uses of data: for policy opportunities concerning patient
individual patient care, public health, data and privacy protection. As the use
research, biosurveillance, and market- of electronic health records, electronic
ing. The cases prompt ethical questions medical devices, mobile and e-health
of commodifying medical information applications, and biometric, social and
and of harmonizing policy across juris- behavioral, and genomic data spreads,
dictional boundaries. They raise con- these considerations are becoming more
cerns of how health data can, and should, relevant worldwide.
be used. Their consequences may affect
biomedical informatics, patient and pro-
What’s Special about Health Data?—
vider privacy, and regulation in ways
International Principles
this article explores, both in the United
States and elsewhere. All countries recognize confidential-
How health data can, and should, ity as a patient’s right2 that is good for
be used is at the intersection of public individual patients and clinicians, and
health, research, care, privacy, and eth- for society as a whole.3 Intimacies are
ics. This article provides an ethical anal- revealed in the interest of good health-
ysis of these interwoven ethical issues care, so clinicians’ professional and
involving appropriate, judicious, and fiduciary duties include a duty of confi-
ethical secondary data use, reflecting dentiality. Therefore, health information
a more general discussion of big data is given special protection internation-
benefits and harms, and touching on ally, though specific ways of achieving
https://doi.org/10.1017/S0963180115000614 Published online by Cambridge University Press
313
Bioethics and Information Technology
314
Bioethics and Information Technology
315
Bioethics and Information Technology
by law. French criminal law makes this knowledge. Patients benefit from hav-
universal spirit apparent by criminaliz- ing their record information available
ing a physician’s breach of confidential- from previous clinical visits, whether
ity even in court testimony, even if the or not those visits were with the same
patient would allow it.31 clinician or in the same facility, because
How people value and respond to clinicians can make better care deci-
concerns about health data privacy is sions in light of fuller understanding
affected by context and common expec- of their patients’ past clinical histo-
tations of privacy.32 Many recognize that ries. Patients also benefit from public
clinicians need highly personal infor- health surveillance and research that
mation in order to care for them, and, depends on combining health infor-
because of the long-standing history mation from individual patients to
of trust in professional confidentiality, improve public health and develop
such patients willingly share sensitive better treatments. Patients may bene-
information with those who treat them. fit from making identifiable informa-
As Deryck Beyleveld and Elise Histed tion concerning adverse drug events
eloquently point out: available to pharmaceutical compa-
nies so that those companies can fol-
Information that patients provide low up with patients and improve drug
for their treatment is about very safety, as Source Informatics argued
personal and sensitive areas of in the U.K. court case discussed sub-
their lives. Indeed, it relates to sequently, and as the International
their very existence, both physi- Pharmaceutical Privacy Consortium
cally and symbolically. As such,
argues more generally.34,35 Data aggre-
it is not information that they may
be presumed to be prepared to
gator IMS Health Canada (IMS Health,
disclose or have used freely. It is Inc., was a plaintiff in one of the court
their vulnerability, constituted by cases) unsurprisingly takes the position
pain and distress, or fears about that analyzing doctors’ prescribing hab-
their health and lives, that leads its contributes to patients becoming
them to disclose this information informed consumers.36
to health professionals. At the Yet patients can be harmed when
same time, people are apt to attach data about them are used to violate
https://doi.org/10.1017/S0963180115000614 Published online by Cambridge University Press
316
Bioethics and Information Technology
data are obtained should be informed tional nature of the ethical issues.
of what will be done with this informa- That case was decided on the grounds
tion and to whom it will be disclosed. that selling anonymized (de-identified)
This allows the individual to consent data did not violate pharmacists’ duty
or object and to withdraw or correct the of confidentiality.
data. Also, according to the directive, The decision in each case runs coun-
the data should be kept only as long as ter to public expectations of health data
necessary for the specified purpose,43 confidentiality. The public is hardly
even though that could compromise later aware that aggregating and selling
retrospective research. prescription and other health data are
Patients’ privacy concerns are exac- an international enterprise. Thus, the
erbated when patients, and even clini- Sorrell and Source cases raise more
cians, have little idea of what becomes general global concerns of privacy
of their data, or just what is protected and data protection, on the one hand,
and what is not.44 Withholding infor- and appropriate use and secondary
mation from one’s clinician is neither in use of data for data mining, marketing,
the public interest nor beneficial to that research, public health, and healthcare,
317
Bioethics and Information Technology
318
Bioethics and Information Technology
ment for de-identification may further tion, therefore, increased health data pro-
impair research. tection and would have made illegal the
However, there also could be harms. NHS mass database of citizens’ health
Patients may withhold sensitive infor- information, which could provide a valu-
mation if they fear it will be used against able resource for improving care.62,63,64
them, even though it may be useful Opposition from the NHS and other
for other purposes. Studies based on research organizations contributed to
analyzing large data sets could be com- changes put forward by the EU justice
promised if individual prescribers or ministers in March 2015 to improve
patients withhold information or their data sharing across healthcare services.
consent for data use.59 They also tabled amendments regard-
Privacy advocates, researchers, and ing how to manage such special forms
public health officials can be at odds of data as health and genetic data, and
over how to achieve benefits while when patient consent is needed.65 The
protecting privacy; their disagreements European Parliament, the Council, and
may stem from different values and the Commission agreed on the new regu-
historical legacies. For example, the lation late in 2015 and it is expected to
319
Bioethics and Information Technology
320
Bioethics and Information Technology
more than credit card numbers (which enforcement, immigration control, and
typically sell for no more than a few U.S. homeland security.98,99
dollars) because it can be monetized Organizations, too, may benefit finan-
by getting treatment paid for via iden- cially while providing social benefit
tity theft or to extort money from hacked through data sales. The American
corporations.88,89 Medical Association and the U.S.
Electronic records also make it possi- Centers for Medicare and Medicaid
ble for computer or software vendors, sell provider data, whereas state
intermediaries, or newly created orga- Health Information Exchanges (HIEs)
nizations to bundle and sell rights and sell secondary data.100,101,102 The U.K.’s
data,90 a practice useful for research, National Health Service, too, sells
policy, marketing, and business. In the data.103 Insurance companies or health
United States, there is an exhaustive list information technology vendors might
of organizations that can use and legally aggregate and sell provider-identified
sell health information,91 some for pur- data on performance and quality mea-
poses patients and clinicians would not sures, the number of procedures per-
anticipate. Data sold by both U.S. state formed, U.S. meaningful use criteria,
and federal agencies can be linked to data security breaches, and other useful
individuals by using publicly available compilations. Cash-strapped commu-
information, even if some of the data nity health organizations, state Regional
are de-identified.92,93 Extension Centers (RECs), county hos-
Some may consider what is done pitals, the U.S. Veterans Administration,
with these data as harmful to some of the Indian Health Service, the Joint
the individuals who have provided Commission, or hospital associations
the data and, at the same time, as ben- also could sell data for similarly benefi-
eficial to other individuals, depending cent purposes. Hospitals routinely sell
on what the data reveal. This combina- birth records.104
tion of benefits and harms is evident in Genetic data are also double-edged.
a variety of examples in which one’s Such data are needed for research, per-
records affect one’s services and costs. sonalized medicine, and biobanking
In the United States, where private but also can make individuals and com-
medical insurance is the norm, private munities vulnerable. For example, in
https://doi.org/10.1017/S0963180115000614 Published online by Cambridge University Press
insurers use prescription and other 2000, Iceland’s parliament sold exclu-
claims data to deny insurance, charge sive rights to all the genetic and genea-
differential premiums, or exclude some logical data from each of its 275,000
conditions.94 Businesses often check citizens to the U.S. company deCODE
the MIB (Medical Information Bureau) Genetics. Soon thereafter, deCODE
for job applicants’ underwriting data.95 signed a $200 million contract with
Aggregators purchase and combine data Hoffman LaRoche to search for several
from the states as well as from pharma- common human genetic diseases.
cies.96 Credit agencies are the most Iceland had an opt-out policy, and the
frequent buyers of multistate health data were encrypted to de-identify
profiles, though IMS Health also pur- individuals. Nevertheless, the Icelandic
chases data from the states.97 Government Supreme Court later ruled that creating
fusion centers, designed to promote the database was unconstitutional because
data sharing among federal agencies and it did not adequately protect personal
state and local governments, combine privacy.105
data from multiple sources—including Clearly, provider or patient informa-
health record information—for law tion is valuable. Hospitals could purchase
321
Bioethics and Information Technology
322
Bioethics and Information Technology
mation strikes still others as anathema be morally offensive if the user is unsa-
to professional values and the special vory or controversial.128 How should
relationship between doctor and patient. distinctions be made so that some data
Privacy is valued because it facilitates uses and users are permissible and some
ideals of personhood involving auton- not? On what grounds? And who is
omy, individuality, respect, dignity, and best placed to make such decisions:
worth as a human being.123 Therefore, the courts or legislators, clinicians
the idea of selling personal health data and researchers who are most familiar
also disturbs those who think the practice with their data needs, companies that
commodifies the self and sullies ideas develop and market new medications,
of personhood.124,125 Compromising of or patients and prescribers, who are
personhood is compounded because most affected by privacy violations and
data in databases necessarily are de- can best weigh the relative importance
contextualized. De-identification is an of various values to themselves.129
attempt to remove any connection with Those most familiar with, closest to,
the person, but even identifiable health and affected by the potential use should
record data typically do not include all have a strong say. They need to know
323
Bioethics and Information Technology
about those uses, though, to express their such as appropriate secondary use of
preferences in an informed, thoughtful data; patient and clinician relationships
way. Many patients do not know what is, in light of the growth of electronic health
or can be, done with data about them, records and health information tech-
but keeping them ignorant is not the way nologies;134,135,136 reliance on increasingly
to address concerns. Lack of account- untenable de-identification; burgeoning
ability and transparency about health electronic data collection, sharing, trans-
data uses feeds the public’s privacy mission, and aggregation; data use for
concerns,130 undermines the possibil- public health, research, and innovation;
ity of informed consent, and impairs and the privacy and security of health
research, care, and public health. data.
Ethical considerations over data use As health information exchanges
will, and should, evolve as the public and health tourism develops; as life-
becomes more aware of the value and time electronic health records that fol-
pitfalls of data sharing, data aggrega- low patients across governmental and
tion, and data mining. Cases like Source institutional boundaries are used more
and Sorrell encourage debate over pro- widely; as databases grow and biobanks
priety and values related to different become digital; as biometric identifica-
kinds of data use. They also lead to tion becomes more common; as radio
examining when it is in the public inter- frequency identification devices (RFIDs)
est for personal health data to be made are embedded in medical devices, smart-
available, just what that “public interest” pills, and patients; as home sensors
is,131,132 and, for that matter, just what and monitors are increasingly used; as
“privacy” comprises and entails as mobile, wearable, and e-health applica-
norms evolve.133 The issues include tions expand; and as health information
considering, in a healthcare context, the exchanges develop,137,138,139,140 informati-
dualities playing out with respect to big cians can add to the conversation among
data in domains other than healthcare: governments, courts, regulatory agen-
the individual versus the aggregate, cies, professional societies, and other
research versus privacy, individual ver- organizations to consider responses
sus institutional power, identification to issues involving health-related data.
versus identity, identification versus Combining legal and ethics scholarship
https://doi.org/10.1017/S0963180115000614 Published online by Cambridge University Press
324
Bioethics and Information Technology
and Bioethics. 2nd ed. Durham, NC: Carolina 13. European Commission, Directorate General
Academic Press; 2007. for Justice and Consumers. Agreement on
3. Institute of Medicine (IOM). Beyond the HIPAA Commission's EU data protection reform will
Privacy Rule: Enhancing Privacy, Improving boost Digital Single Market 2015 Dec 15;
Health Through Research. Washington, DC: available at http://europa.eu/rapid/press-
The National Academies Press; 2009, at 78. release_IP-15-6321_en.htm (last accessed
4. See note 3, IOM 2009, at 79. 5 Jan 2016). See also European Commission,
5. Jones P. Permission-based marketing under Directorate General for Justice and
Canada’s new privacy laws. Franchise Law Consumers. Reform of EU data protection rules;
Journal 2004;24(2):267–303. available at http://ec.europa.eu/justice/
6. Walden I. Anonymising personal data. data-protection/reform/index_en.htm (last
International Journal of Law and Information accessed 5 Jan 2016).
Technology 2002;10(2):224–37. 14. Rossi B. Countdown to the EU General Data
7. Srinivas N, Biswas A. Protecting patient Protection Regulation: 5 steps to prepare.
information in India: Data privacy law and Information Age 2015 Mar 24; available at
its challenges. NUJS Law Review 2012;5(3): http://www.information-age.com/it-
411–24. management/risk-and-compliance/
8. Kaplan B. Selling health data: De-identification, 123459219/countdown-eu-general-data-
privacy, and speech. Cambridge Quarterly of protection-regulation-5-steps-prepare (last
Healthcare Ethics 2015;24(3):256–71. accessed 13 May 2015).
325
Bioethics and Information Technology
15. Solove DJ. A taxonomy of privacy. University 36. See note 5, Jones 2004.
of Pennsylvania Law Review 2006;154(3): 37. Powell J, Fitton R, Fitton C. Sharing electronic
477–560. health records: The patient view. Informatics
16. Ohm P. Broken promises of privacy: in Primary Care 2006;14(1):55–7.
Responding to the surprising failure of 38. Schers H, van den Hoogen H, Grol R,
anonymization. UCLA Law Review 2010;57: van den Bosch W. Continuity of information
1701–77, at 270. in general practice: Patient views on confi-
17. Taylor MJ. Health research, data protection, dentiality. Scandinavian Journal of Primary
and the public interest in notification. Medical Health Care 2003;21(1):21–6.
Law Review 2011;19(2):267–303. 39. See note 23, Beyleveld, Histed 2000.
18. See note 17, Taylor 2011, at 303. 40. See note 32, Malin et al. 2013.
19. Kaplan B. Patient health data privacy. In: 41. See note 34, Dunkel 2001, at 70.
Yanisky-Ravid S, ed. The Challenges of the 42. Choy C, Hudson Z, Pritts J, Goldman J.
Digital Era: Privacy, Information and More. Exposed Online: Why the New Federal Health
New York: Fordham University Press; Privacy Regulation Doesn’t Offer Much
forthcoming. Protection to Internet Users. Health Privacy
20. See note 8, Kaplan 2015. Project, Institute for Healthcare Research and
21. See note 16, Ohm 2010. Policy, Georgetown University: Pew Internet
22. See note 19, Kaplan forthcoming. and American Life Project; 2001, at 4; available
23. Beyleveld D, Histed E. Betrayal of confi- at http://www.pewinternet.org/files/old-
dence in the Court of Appeal. Medical Law media/Files/Reports/2001/PIP_HPP_
International 2000;4:277–311. HealthPriv_report.pdf.pdf (last accessed 11
24. Koontz L. What is privacy? In: Koontz L, ed. May 2015).
Information Privacy in the Evolving Healthcare 43. See note 12, EU 2014.
Environment. Chicago: Healthcare Informa- 44. McGraw D. Building public trust in uses
tion and Management Society (HIMSS); of Health Insurance Portability and
2013:1–20. Accountability Act de-identified data. JAMIA
25. See note 19, Kaplan forthcoming. (Journal of the American Medical Informatics
26. See note 8, Kaplan 2015. Association) 2013;20(1):29–34.
27. World Medical Association. International Code 45. Curfman GD, Morrissey S, Drazen JM.
of Medical Ethics; available at http://www. Prescriptions, privacy, and the First
wma.net/en/30publications/10policies/c8/ Amendment. New England Journal of
index.html (last accessed 2 May 2014). Medicine 2011;364(21):2053–5.
28. World Medical Association. Declaration 46. Tien L. Online behavioral tracking and
of Helsinki—Ethical Principles for Medical the identification of Internet users. Paper
Research Involving Human Subjects; available at presented at: From Mad Men to Mad Bots:
http://www.wma.net/en/30publications/ Advertising in the Digital Age [conference].
10policies/b3/ (last accessed 2 May 2014). The Information Society Project at the Yale
https://doi.org/10.1017/S0963180115000614 Published online by Cambridge University Press
29. World Medical Association. Declaration Law School. New Haven, CT; 2011.
on Ethical Considerations Regarding Health 47. Benitez K, Malin B. Evaluating re-identification
Databases; available at http://www.wma. risks with respect to the HIPAA Privacy
net/en/30publications/10policies/d1/ Rule. JAMIA (Journal of the American Medical
(last accessed 2 May 2014). Informatics Association) 2010;17(2):169–77.
30. See note 29, WMA 2014. 48. See note 16, Ohm 2010.
31. See note 2, Jost 2007. 49. See note 8, Kaplan 2015.
32. Malin BA, El Emam K, O’Keefe CM. 50. Sorrell v. IMS Health, Inc., et al., 131 S. Ct.
Biomedical data privacy: Problems, perspec- 2653 (2011).
tives, and recent advances. JAMIA (Journal of 51. R v. Department of Health, Ex Parte Source
the American Medical Informatics Association) Informatics Ltd. [C.A. 2000] 1 All ER 786.
2013;20(1):2–6. See also R v. Department of Health, Ex Parte
33. See note 23, Beyleveld, Histed 2000, at 296. Source Informatics Ltd. European Law Report
34. Dunkel YF. Medical privacy rights in 2000;4:397–414.
anonymous data: Discussion of rights in the 52. See note 8, Kaplan 2015.
United Kingdom and the United States in 53. See note 7, Srinivas, Biswas 2012.
light of the Source Informatics cases. Loyola of 54. See note 5, Jones 2004.
Los Angeles International and Comparative Law 55. Baxter AD. IMS Health v. Ayotte: A new direc-
Review 2001;23(1):41–80. tion on commercial speech cases. Berkeley
35. See note 7, Srinivas, Biswas 2012. Technology Law Journal 2010;25:649–70.
326
Bioethics and Information Technology
56. Pasquale F. Restoring transparency to auto- 71. See note 70, NHS Choices 2014.
mated authority. Journal on Telecommunications 72. Ramesh R. NHS patient data to be made
and High Technology Law 2011;9:235–54. available for sale to drug and insurance
57. Rodwin MA. Patient data: Property, privacy, firms. The Guardian 2014 Jan 19; available
and the public interest. American Journal of at http://www.theguardian.com/society/
Law and Medicine 2010;36:586–618, at 589. 2014/jan/19/nhs-patient-data-available-
58. Hall MA, Schulman KA. Ownership of med- companies-buy (last accessed 24 July 2014).
ical information. JAMA 2009;301(12):1282–4. 73. Institute of Medicine. Beyond the HIPAA
59. Gooch GR, Rohack JJ, Finley M. The moral Privacy Rule: Enhancing Privacy, Improving
from Sorrell: Educate, don’t legislate. Health Health Through Research. Washington, DC:
Matrix 2013;23(1):237–77. National Academies; 2009; available at
60. NHS European Office. Data Protection; 2015 http://www.iom.edu/ ∼ /media/Files/
Mar 24; available at http://www.nhsconfed. Report%20Files/2009/Beyond-the-HIPAA-
org/regions-and-eu/nhs-european-office/ Privacy-Rule-Enhancing-Privacy-
influencing-eu-policy/data-protection (last Improving-Health-Through-Research/
accessed 15 May 2015). HIPAA%20report%20brief%20FINAL.pdf
61. See note 14, Rossi 2015. (last accessed 22 Jan 2014).
62. O’Donoghue C. EU research group condemns 74. Open Humans Network. Open Humans
EU regulation for restricting growth in life Network wins Knight News Challenge: Health
sciences sector; 2014; available at http:// Award; available at http://openhumans.org/
www.globalregulatoryenforcementlawblog. (last accessed 1 July 2014).
com/2014/02/articles/data-security/ 75. Christakis NA, Fowler JH. Social network
eu-research-group-condemns-eu-regulation- visualization in epidemiology. Norwegian
for-restricting-growth-in-life-sciences-sector/ Journal of Epidemiology 2009;19(1):5–16.
(last accessed 23 Mar 2014). 76. Christakis NA, Fowler JH. Social network
63. Farrar J. Sharing NHS data saves lives; EU sensors for early detection of contagious
obstruction will not. The Telegraph 2014 Jan outbreaks. PLoS ONE 2010;5(9):e12948.
14; available at http://www.telegraph.co.uk/ 77. Velasco E, Agheneza T, Denecke K,
health/nhs/10569467/Sharing-NHS-data- Kirchner G, Eckmanns T. Social media and
saves-lives-EU-obstruction-will-not.html Internet-based data in global systems for
(last accessed 23 Mar 2014). public health surveillance: A systematic
64. European Public Health Alliance. [Update] review. The Milbank Quarterly 2014;93(1):
General Data Protection Regulation; available 7–33.
at http://www.epha.org/5926 (last accessed 78. Andrews L. I Know Who You Are and I Saw What
23 Mar 2014). You Did: Social Networks and the Death of Data
65. NHS Confederation. EU ministers table Privacy. New York: Free Press; 2011, at 1–3.
changes to data privacy; 2015 Mar 13; avail- 79. Angwin J. Dragnet Nation: A Quest for
able at http://nhsconfed.org/news/2015/ Privacy, Security, and Freedom in a World of
https://doi.org/10.1017/S0963180115000614 Published online by Cambridge University Press
327
Bioethics and Information Technology
328
Bioethics and Information Technology
114. Gulcher JR, Stefánsson K. The Icelandic 126. Miller RA, Schaffner KF, Meisel A. Ethical
Healthcare Database and informed consent. and legal issues related to the use of computer
New England Journal of Medicine 2000;342(24): programs in clinical medicine. Annals of
1827–9. Internal Medicine 1985;102:529–36.
115. See note 19, Kaplan forthcoming. 127. Goodman KW. Health information technol-
116. Evans BJ. Much ado about data ownership. ogy: Challenges in ethics, science and uncer-
Harvard Journal of Law & Technology 2011;25(1): tainty. In: Himma K, Tavani H, eds. The
69–130. Handbook of Information and Computer Ethics.
117. For example, GE Data Visualization uses Hoboken, NJ: Wiley; 2008:293–309.
information “based on 7.2 million patient 128. See note 127, Goodman 2008.
records from GE’s proprietary database”; 129. Data mining case tests boundaries of medi-
available at http://visualization.geblogs. cal privacy. CMAJ 2011;183(9):E509–10.
com/visualization/network/ (last accessed 130. See note 44, McGraw 2013.
27 Sept 2013). GE Healthcare’s Healthcare 131. See note 17, Taylor 2011.
IT Solutions—available at http://www3. 132. See note 57, Rodwin 2010, at 617–18.
gehealthcare.com/en/Products/Categories/ 133. See note 15, Solove 2006.
Healthcare_IT?gclid=CIKQ4Z6P7LkCFcE7 134. Goodman KW. Ethics, information tech-
OgodTDIAPQ and http://www3.gehealthcare. nology, and public health: New challenges
com/en/Products/Categories/Healthcare_ for the clinician-patient relationship. Journal
IT/Knowledge_Center (last accessed 27 of Law, Medicine and Ethics 2010 Spring:
Sept 2013)—includes patient records and 58–63.
patient portals. 135. Kaplan B, Litewka S. Ethical challenges
118. Sittig DF, Singh H. Legal, ethical, and finan- of telemedicine and telehealth. Cambridge
cial dilemmas in electronic health record Quarterly of Healthcare Ethics 2008;17(4):
adoption and use. Pediatrics 2011 Apr;127(4): 401–16.
e1042–7. 136. See note 19, Kaplan forthcoming.
119. Moore J, Tholemeier R. Whose data is it any- 137. See note 134, Goodman 2010.
way? The Health Care Blog; 2013 Nov 20; 138. See note 135, Kaplan, Litewka 2008.
available at http://thehealthcareblog.com/ 139. See note 19, Kaplan forthcoming.
blog/2013/11/20/whose-data-is-it-anyway-2/ 140. Roland D. UK to get 200 high-tech factory jobs
(last accessed 3 Feb 2014). making “swallowable sensors.” The Telegraph
120. Goodman KW, Berner E, Dente MA, Kaplan B, 2014 Mar 10; available at http://www.
Koppel R, Rucker D, et al. Challenges in telegraph.co.uk/finance/10687395/UK-to-
ethics, safety, best practices, and oversight get-200-high-tech-factory-jobs-making-
regarding HIT vendors, their customers, and swallowable-sensors.html (last accessed
patients: A report of an AMIA special task 17 July 2014).
force. JAMIA (Journal of the American Medical 141. See note 24, Koontz 2013.
Informatics Association) 2011;18(1):77–81. 142. See note 44, McGraw 2013.
https://doi.org/10.1017/S0963180115000614 Published online by Cambridge University Press
121. Hall MA. Property, privacy, and the pursuit 143. See note 23, Beyleveld, Histed 2000.
of interconnected electronic health records. 144. See note 12, EU 2014.
Iowa Law Review 2010;95:631–63. 145. Rodrigues RJ, Wilson P, Schanz SJ. The
122. See note 57, Rodwin 2010. Regulation of Privacy and Data Protection in
123. See note 3, IOM 2009, at 77. the Use of Electronic Health Information: An
124. See note 58, Hall, Schulman 2009. International Perspective and Reference Source
125. Atherley G. The public-private partnership on Regulatory and Legal Issues Related to Person-
between IMS Health and the Canada Pension Identifiable Health Databases. Washington, DC:
Plan. Fraser Forum 2011:5–7. World Health Organisation (WHO); 2001.
329