Secondary Use of Electronic Health Record: Opportunities and Challenges
- URL: http://arxiv.org/abs/2001.09479v1
- Date: Sun, 26 Jan 2020 16:22:53 GMT
- Title: Secondary Use of Electronic Health Record: Opportunities and Challenges
- Authors: Shahid Munir Shah, Rizwan Ahmed Khan
- Abstract summary: Using EHR data for secondary purposes without consent creates privacy issues for individuals.
Sharing of EHR across multiples agencies makes it vulnerable to cyber attacks.
Data leak can cause financial losses or an individuals may encounter social boycott if their medical condition is exposed in public.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In present technological era, healthcare providers generate huge amount of
clinical data on daily basis. Generated clinical data is stored digitally in
the form of Electronic Health Records (EHR) as a central data repository of
hospitals. Data contained in EHR is not only used for the patients' primary
care but also for various secondary purposes such as clinical research,
automated disease surveillance and clinical audits for quality enhancement.
Using EHR data for secondary purposes without consent or in some cases even
with consent creates privacy issues for individuals. Secondly, EHR data is also
made accessible to various stake holders including different government
agencies at various geographical sites through wired or wireless networks.
Sharing of EHR across multiples agencies makes it vulnerable to cyber attacks
and also makes it difficult to implement strict privacy laws as in some cases
data is shared with organization that is governed by specific regional law.
Privacy of an individual could be severely affected when their sensitive
private information contained in EHR is leaked or exposed to public. Data leak
can cause financial losses or an individuals may encounter social boycott if
their medical condition is exposed in public. To protect patients personal data
from such threats, there exists different privacy regulations such as GDPR,
HIPAA and MHR. However, continually evolving state-of-the-art techniques in
machine learning, data analytics and hacking are making it even more difficult
to completely protect individual's / patient's privacy. In this article, we
have systematically examined various secondary uses of EHR with the aim to
highlight how these secondary uses effect patients' privacy. Secondly, we have
critically analyzed GDPR and highlighted possible areas of improvement,
considering escalating use of technology and different secondary uses of EHR.
Related papers
- Privacy Preserving Machine Learning for Electronic Health Records using Federated Learning and Differential Privacy [0.0]
Patient records contain highly sensitive information, such as social security numbers (SSNs) and residential addresses.
ML algorithms can be used to extract and analyze patient data to improve patient care.
arXiv Detail & Related papers (2024-06-23T00:01:03Z) - S3PHER: Secure and Searchable System for Patient-driven HEalth data shaRing [0.0]
Current systems for sharing health data between patients and caregivers do not fully address the critical security requirements of privacy, confidentiality, and consent management.
We present S3PHER, a novel approach to sharing health data that provides patients with control over who accesses their data, what data is accessed, and when.
arXiv Detail & Related papers (2024-04-17T13:31:50Z) - Preserving The Safety And Confidentiality Of Data Mining Information In Health Care: A literature review [0.0]
PPDM technique enables the extraction of actionable insight from enormous volume of data.
Disclosing sensitive information infringes on patients' privacy.
This paper aims to conduct a review of related work on privacy-preserving mechanisms, data protection regulations, and mitigating tactics.
arXiv Detail & Related papers (2023-10-30T05:32:15Z) - A Unified View of Differentially Private Deep Generative Modeling [60.72161965018005]
Data with privacy concerns comes with stringent regulations that frequently prohibited data access and data sharing.
Overcoming these obstacles is key for technological progress in many real-world application scenarios that involve privacy sensitive data.
Differentially private (DP) data publishing provides a compelling solution, where only a sanitized form of the data is publicly released.
arXiv Detail & Related papers (2023-09-27T14:38:16Z) - The Design and Implementation of a National AI Platform for Public
Healthcare in Italy: Implications for Semantics and Interoperability [62.997667081978825]
The Italian National Health Service is adopting Artificial Intelligence through its technical agencies.
Such a vast programme requires special care in formalising the knowledge domain.
Questions have been raised about the impact that AI could have on patients, practitioners, and health systems.
arXiv Detail & Related papers (2023-04-24T08:00:02Z) - Private, fair and accurate: Training large-scale, privacy-preserving AI models in medical imaging [47.99192239793597]
We evaluated the effect of privacy-preserving training of AI models regarding accuracy and fairness compared to non-private training.
Our study shows that -- under the challenging realistic circumstances of a real-life clinical dataset -- the privacy-preserving training of diagnostic deep learning models is possible with excellent diagnostic accuracy and fairness.
arXiv Detail & Related papers (2023-02-03T09:49:13Z) - When Accuracy Meets Privacy: Two-Stage Federated Transfer Learning
Framework in Classification of Medical Images on Limited Data: A COVID-19
Case Study [77.34726150561087]
COVID-19 pandemic has spread rapidly and caused a shortage of global medical resources.
CNN has been widely utilized and verified in analyzing medical images.
arXiv Detail & Related papers (2022-03-24T02:09:41Z) - A Review of Anonymization for Healthcare Data [0.30586855806896046]
Health data is highly sensitive and subject to regulations such as General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation ( General Data Protection Regulation (
arXiv Detail & Related papers (2021-04-13T21:44:29Z) - Revolutionizing Medical Data Sharing Using Advanced Privacy Enhancing
Technologies: Technical, Legal and Ethical Synthesis [5.6324529994086845]
Homomorphic Encryption and Secure Multiparty Computation (defined together as Multiparty Homomorphic Encryption or MHE)
PETs provide a mathematical guarantee of privacy, with MHE providing performance advantage over separately using HE or SMC.
We explain how MHE can reduce the reliance on customized contractual measures between institutions.
arXiv Detail & Related papers (2020-10-27T17:03:28Z) - COVI White Paper [67.04578448931741]
Contact tracing is an essential tool to change the course of the Covid-19 pandemic.
We present an overview of the rationale, design, ethical considerations and privacy strategy of COVI,' a Covid-19 public peer-to-peer contact tracing and risk awareness mobile application developed in Canada.
arXiv Detail & Related papers (2020-05-18T07:40:49Z) - Give more data, awareness and control to individual citizens, and they
will help COVID-19 containment [74.10257867142049]
Contact-tracing apps are being proposed for large scale adoption by many countries.
A centralized approach raises concerns about citizens' privacy and needlessly strong digital surveillance.
We advocate a decentralized approach, where both contact and location data are collected exclusively in individual citizens' "personal data stores"
arXiv Detail & Related papers (2020-04-10T20:30:37Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.