Skip to main content
Top
Published in: Current Psychiatry Reports 11/2014

01-11-2014 | Psychiatry in the Digital Age (JS Luo, Section Editor)

Privacy in the Digital World: Medical and Health Data Outside of HIPAA Protections

Authors: Tasha Glenn, Scott Monteith

Published in: Current Psychiatry Reports | Issue 11/2014

Login to get access

Abstract

Increasing quantities of medical and health data are being created outside of HIPAA protection, primarily by patients. Data sources are varied, including the use of credit cards for physician visit and medication co-pays, Internet searches, email content, social media, support groups, and mobile health apps. Most medical and health data not covered by HIPAA are controlled by third party data brokers and Internet companies. These companies combine this data with a wide range of personal information about consumer daily activities, transactions, movements, and demographics. The combined data are used for predictive profiling of individual health status, and often sold for advertising and other purposes. The rapid expansion of medical and health data outside of HIPAA protection is encroaching on privacy and the doctor-patient relationship, and is of particular concern for psychiatry. Detailed discussion of the appropriate handling of this medical and health data is needed by individuals with a wide variety of expertise.
Literature
1.
go back to reference Mechanic D, Meyer S. Concepts of trust among patients with serious illness. Soc Sci Med. 2000;51(5):657–68.PubMedCrossRef Mechanic D, Meyer S. Concepts of trust among patients with serious illness. Soc Sci Med. 2000;51(5):657–68.PubMedCrossRef
2.
go back to reference Narayanan A, Shmatikov V. Myths and fallacies of personally identifiable information. Commun ACM. 2010;53(6):24–6.CrossRef Narayanan A, Shmatikov V. Myths and fallacies of personally identifiable information. Commun ACM. 2010;53(6):24–6.CrossRef
3.
go back to reference Ohm P. Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Rev. 2010;57(6). Ohm P. Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Rev. 2010;57(6).
10.
go back to reference Cohen JE. What privacy is for (November 5, 2012). Harv Law Rev. 2013;126. Cohen JE. What privacy is for (November 5, 2012). Harv Law Rev. 2013;126.
11.
go back to reference Norberg PA, Horne DR, Horne DA. The privacy paradox: personal information disclosure intentions versus behaviors. J Consum Aff. 2007;41(1):100–26.CrossRef Norberg PA, Horne DR, Horne DA. The privacy paradox: personal information disclosure intentions versus behaviors. J Consum Aff. 2007;41(1):100–26.CrossRef
12.
go back to reference McDonald AM, Cranor LF. Americans’ attitudes about internet behavioral advertising practices. In: Proceedings of the 9th annual ACM workshop on privacy in the electronic society. ACM; 2010. 63–72. McDonald AM, Cranor LF. Americans’ attitudes about internet behavioral advertising practices. In: Proceedings of the 9th annual ACM workshop on privacy in the electronic society. ACM; 2010. 63–72.
13.
go back to reference Bauer C, Korunovska J, Spiekermann, S. On the value of information–what facebook users are willing to pay. In: 20th European Conference on Information Systems proceedings (ECIS 2012). 2012. Bauer C, Korunovska J, Spiekermann, S. On the value of information–what facebook users are willing to pay. In: 20th European Conference on Information Systems proceedings (ECIS 2012). 2012.
14.
go back to reference Hann IH, Hui KL, Lee SYT, et al. Overcoming online information privacy concerns: an information-processing theory approach. J Manag Inf Syst. 2007;24(2):13–42.CrossRef Hann IH, Hui KL, Lee SYT, et al. Overcoming online information privacy concerns: an information-processing theory approach. J Manag Inf Syst. 2007;24(2):13–42.CrossRef
15.••
go back to reference Abelson H, Leeden K, Lewis H. Blown to bits: your life, liberty, and happiness after the digital explosion. Addison-Wesley Professional; 2008. For those wanting background information, excellent introduction to the digital world. Abelson H, Leeden K, Lewis H. Blown to bits: your life, liberty, and happiness after the digital explosion. Addison-Wesley Professional; 2008. For those wanting background information, excellent introduction to the digital world.
16.
go back to reference Black A, Gen Y. Gen Y: who they are and how they learn. Educ Horiz. 2010;88(2):92–101. Black A, Gen Y. Gen Y: who they are and how they learn. Educ Horiz. 2010;88(2):92–101.
20.
go back to reference Kaye J. The tension between data sharing and the protection of privacy in genomics research. Annu Rev Genomics Hum Genet. 2012;13:415–31.PubMedCrossRef Kaye J. The tension between data sharing and the protection of privacy in genomics research. Annu Rev Genomics Hum Genet. 2012;13:415–31.PubMedCrossRef
21.
go back to reference Lane J, Schur C. Balancing access to health data and privacy: a review of the issues and approaches for the future. Health Serv Res. 2010;45(5 Pt 2):1456–67.PubMedCrossRefPubMedCentral Lane J, Schur C. Balancing access to health data and privacy: a review of the issues and approaches for the future. Health Serv Res. 2010;45(5 Pt 2):1456–67.PubMedCrossRefPubMedCentral
22.
go back to reference Shachak A, Jadad AR. Electronic health records in the age of social networks and global telecommunications. JAMA. 2010;303(5):452–3.PubMedCrossRef Shachak A, Jadad AR. Electronic health records in the age of social networks and global telecommunications. JAMA. 2010;303(5):452–3.PubMedCrossRef
25.
go back to reference Murdoch TB, Detsky AS. The inevitable application of big data to health care. JAMA. 2013;309(13):1351–2.PubMedCrossRef Murdoch TB, Detsky AS. The inevitable application of big data to health care. JAMA. 2013;309(13):1351–2.PubMedCrossRef
26.
go back to reference Swan M. The quantified self: fundamental disruption in big data science and biological discovery. Big Data. 2013;1:85–99.CrossRef Swan M. The quantified self: fundamental disruption in big data science and biological discovery. Big Data. 2013;1:85–99.CrossRef
31.
go back to reference Monteith S, Glenn T, Bauer M. Searching the internet for health information about bipolar disorder: some cautionary issues. Int J Bipolar Disord. 2013;1:22.CrossRef Monteith S, Glenn T, Bauer M. Searching the internet for health information about bipolar disorder: some cautionary issues. Int J Bipolar Disord. 2013;1:22.CrossRef
32.
go back to reference Sheehan KB. In poor health: an assessment of privacy policies at direct-to-consumer web sites. J Public Policy Mark. 2005;24(2):273–83.CrossRef Sheehan KB. In poor health: an assessment of privacy policies at direct-to-consumer web sites. J Public Policy Mark. 2005;24(2):273–83.CrossRef
33.
go back to reference Mackey TK, Yagi N, Liang BA. Prescription drug coupons: evolution and need for regulation in direct-to-consumer advertising. Res Soc Adm Pharm. 2014;10(3):588–94.CrossRef Mackey TK, Yagi N, Liang BA. Prescription drug coupons: evolution and need for regulation in direct-to-consumer advertising. Res Soc Adm Pharm. 2014;10(3):588–94.CrossRef
36.
go back to reference Huesch MD. Privacy threats when seeking online health information. JAMA Intern Med. 2013;173(19):1838–9.PubMedCrossRef Huesch MD. Privacy threats when seeking online health information. JAMA Intern Med. 2013;173(19):1838–9.PubMedCrossRef
41.
go back to reference Tudor ML. Protecting privacy of medical records of employees and job applicants in the digital era under the Americans with Disabilities Act. North Ky Law Rev. 2013;40:635–65. Tudor ML. Protecting privacy of medical records of employees and job applicants in the digital era under the Americans with Disabilities Act. North Ky Law Rev. 2013;40:635–65.
44.•
go back to reference Lowe SA, Ólaighin G. Monitoring human health behaviour in one’s living environment: a technological review. Med Eng Phys. 2014;36(2):147–68. Review of technologies used for behavioral monitoring.PubMedCrossRef Lowe SA, Ólaighin G. Monitoring human health behaviour in one’s living environment: a technological review. Med Eng Phys. 2014;36(2):147–68. Review of technologies used for behavioral monitoring.PubMedCrossRef
51.
go back to reference Fernandez-Luque L, Elahi N, Grajales FJ. An analysis of personal medical information disclosed in youtube videos created by patients with multiple sclerosis. In: Adlassnig K-P, et al. (Eds.) Medical Informatics in a United and Healthy Europe: Proceedings of MIE 2009, the XXII International Congress of the European Federation for Medical Informatics. IOS Press; 2009. 150:292. Fernandez-Luque L, Elahi N, Grajales FJ. An analysis of personal medical information disclosed in youtube videos created by patients with multiple sclerosis. In: Adlassnig K-P, et al. (Eds.) Medical Informatics in a United and Healthy Europe: Proceedings of MIE 2009, the XXII International Congress of the European Federation for Medical Informatics. IOS Press; 2009. 150:292.
54.•
go back to reference Michael K, Clarke R. Location and tracking of mobile devices: Überveillance stalks the streets. Comput Law Secur Rev. 2013;29(3):216–28. A review of how mobile devices are used for location tracking.CrossRef Michael K, Clarke R. Location and tracking of mobile devices: Überveillance stalks the streets. Comput Law Secur Rev. 2013;29(3):216–28. A review of how mobile devices are used for location tracking.CrossRef
66.
go back to reference De Choudhury M, Counts S, Horvitz E. Major life changes and behavioral markers in social media: case of childbirth. In: Proceedings of the 2013 conference on Computer supported cooperative work. ACM; 2013. 1431–42. De Choudhury M, Counts S, Horvitz E. Major life changes and behavioral markers in social media: case of childbirth. In: Proceedings of the 2013 conference on Computer supported cooperative work. ACM; 2013. 1431–42.
67.
go back to reference Golbeck J, Robles C, Turner K. Predicting personality with social media. In: CHI’11 extended abstracts on human factors in computing systems. ACM; 2011. 253–62. Golbeck J, Robles C, Turner K. Predicting personality with social media. In: CHI’11 extended abstracts on human factors in computing systems. ACM; 2011. 253–62.
68.
go back to reference Marcus B, Machilek F, Schütz A. Personality in cyberspace: personal Web sites as media for personality expressions and impressions. J Pers Soc Psychol. 2006;90(6):1014–31.PubMedCrossRef Marcus B, Machilek F, Schütz A. Personality in cyberspace: personal Web sites as media for personality expressions and impressions. J Pers Soc Psychol. 2006;90(6):1014–31.PubMedCrossRef
69.
go back to reference Bachrach Y, Kosinski M, Graepel T, et al. Personality and patterns of Facebook usage. In: Proceedings of the 3rd Annual ACM Web Science Conference. ACM; 2012. 24–32. Bachrach Y, Kosinski M, Graepel T, et al. Personality and patterns of Facebook usage. In: Proceedings of the 3rd Annual ACM Web Science Conference. ACM; 2012. 24–32.
70.
go back to reference Moreno MA, Jelenchick LA, Egan KG, et al. Feeling bad on Facebook: depression disclosures by college students on a social networking site. Depress Anxiety. 2011;28(6):447–55.PubMedCrossRefPubMedCentral Moreno MA, Jelenchick LA, Egan KG, et al. Feeling bad on Facebook: depression disclosures by college students on a social networking site. Depress Anxiety. 2011;28(6):447–55.PubMedCrossRefPubMedCentral
71.••
go back to reference Kosinski M, Stillwell D, Graepel T. Private traits and attributes are predictable from digital records of human behavior. Proc Natl Acad Sci U S A. 2013;110(15):5802–5. Example of how a range of sensitive personal attributes can be predicted from Facebook Likes.PubMedCrossRefPubMedCentral Kosinski M, Stillwell D, Graepel T. Private traits and attributes are predictable from digital records of human behavior. Proc Natl Acad Sci U S A. 2013;110(15):5802–5. Example of how a range of sensitive personal attributes can be predicted from Facebook Likes.PubMedCrossRefPubMedCentral
72.
go back to reference Martin EA, Bailey DH, Cicero DC, et al. Social networking profile correlates of schizotypy. Psychiatry Res. 2012;200(2–3):641–6.PubMedCrossRef Martin EA, Bailey DH, Cicero DC, et al. Social networking profile correlates of schizotypy. Psychiatry Res. 2012;200(2–3):641–6.PubMedCrossRef
77.
79.
go back to reference Weigmann K. Health research 2.0: the use in research of personal fitness or health data shared on social network raises both scientific and ethical concerns. EMBO Rep. 2014;15(3):223–6.PubMedCrossRef Weigmann K. Health research 2.0: the use in research of personal fitness or health data shared on social network raises both scientific and ethical concerns. EMBO Rep. 2014;15(3):223–6.PubMedCrossRef
80.
go back to reference Williams J. Social networking applications in health care: threats to the privacy and security of health information. In: Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care. ACM; 2010. 39–49. Williams J. Social networking applications in health care: threats to the privacy and security of health information. In: Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care. ACM; 2010. 39–49.
81.
go back to reference Ball DE, Tisocki K, Herxheimer A. Advertising and disclosure of funding on patient organisation websites: a cross-sectional survey. BMC Public Health. 2006;6:201.PubMedCrossRefPubMedCentral Ball DE, Tisocki K, Herxheimer A. Advertising and disclosure of funding on patient organisation websites: a cross-sectional survey. BMC Public Health. 2006;6:201.PubMedCrossRefPubMedCentral
83.
go back to reference Tene O, Polonetsky J. Privacy in the age of big data: a time for big decisions. Stanf Law Rev Online. 2012;64:63. Tene O, Polonetsky J. Privacy in the age of big data: a time for big decisions. Stanf Law Rev Online. 2012;64:63.
87.
go back to reference Brandimarte L, Acquisti A, Loewenstein G. Misplaced confidences privacy and the control paradox. Soc Psychol Personal Sci. 2013;4(3):340–7.CrossRef Brandimarte L, Acquisti A, Loewenstein G. Misplaced confidences privacy and the control paradox. Soc Psychol Personal Sci. 2013;4(3):340–7.CrossRef
88.
go back to reference El Emam K, Moher E. Privacy and anonymity challenges when collecting data for public health purposes. J Law Med Ethics. 2013;41 Suppl 1:37–41.PubMed El Emam K, Moher E. Privacy and anonymity challenges when collecting data for public health purposes. J Law Med Ethics. 2013;41 Suppl 1:37–41.PubMed
89.
go back to reference Savla P, Martino LD. Content analysis of privacy policies for health social networks.” IEEE International Symposium on Policies for Distributed Systems and Networks. 2012;94–101. Savla P, Martino LD. Content analysis of privacy policies for health social networks.” IEEE International Symposium on Policies for Distributed Systems and Networks. 2012;94–101.
90.
go back to reference Anton A, Earp JB, Vail M, et al. HIPAA’s effect on web site privacy policies. IEEE Secur Priv. 2007;45–52. Anton A, Earp JB, Vail M, et al. HIPAA’s effect on web site privacy policies. IEEE Secur Priv. 2007;45–52.
91.
go back to reference Milne GR, Culnan MJ, Greene H. A longitudinal assessment of online privacy notice readability. J Public Policy Mark. 2006;25(2 (Fall)):238–49.CrossRef Milne GR, Culnan MJ, Greene H. A longitudinal assessment of online privacy notice readability. J Public Policy Mark. 2006;25(2 (Fall)):238–49.CrossRef
92.
go back to reference Graber MA, D’Alessandro DM, Johnson-West J. Reading level of privacy policies on Internet health Web sites. J Fam Pract. 2002;51(7):642–5.PubMed Graber MA, D’Alessandro DM, Johnson-West J. Reading level of privacy policies on Internet health Web sites. J Fam Pract. 2002;51(7):642–5.PubMed
94.
go back to reference Breese P, Burman W. Readability of notice of privacy forms used by major health care institutions. JAMA. 2005;293(13):1593–4.PubMed Breese P, Burman W. Readability of notice of privacy forms used by major health care institutions. JAMA. 2005;293(13):1593–4.PubMed
95.
go back to reference Gralton E, Sher M, Lopez CD. Information and readability issues for psychiatric patients: e-learning for users. Psychiatr Bull. 2010;34:376–80.CrossRef Gralton E, Sher M, Lopez CD. Information and readability issues for psychiatric patients: e-learning for users. Psychiatr Bull. 2010;34:376–80.CrossRef
96.
go back to reference Goldston DB, Walsh A, Mayfield Arnold E, et al. Reading problems, psychiatric disorders, and functional impairment from mid- to late adolescence. J Am Acad Child Adolesc Psychiatry. 2007;46(1):25–32.PubMedCrossRef Goldston DB, Walsh A, Mayfield Arnold E, et al. Reading problems, psychiatric disorders, and functional impairment from mid- to late adolescence. J Am Acad Child Adolesc Psychiatry. 2007;46(1):25–32.PubMedCrossRef
98.
go back to reference Carrión Señor I, Fernández-Alemán JL, Toval A. Are personal health records safe? A review of free web-accessible personal health record privacy policies. J Med Internet Res. 2012;14(4):e114.PubMedCrossRefPubMedCentral Carrión Señor I, Fernández-Alemán JL, Toval A. Are personal health records safe? A review of free web-accessible personal health record privacy policies. J Med Internet Res. 2012;14(4):e114.PubMedCrossRefPubMedCentral
99.
go back to reference Hargittai E. Digital na(t)ives? variation in internet skills and uses among members of the “Net Generation”. Sociol Inq. 2010;80:92–113.CrossRef Hargittai E. Digital na(t)ives? variation in internet skills and uses among members of the “Net Generation”. Sociol Inq. 2010;80:92–113.CrossRef
100.
go back to reference Park YJ. Digital literacy and privacy behavior online. Commun Res. 2013;40(2):215–36.CrossRef Park YJ. Digital literacy and privacy behavior online. Commun Res. 2013;40(2):215–36.CrossRef
101.
go back to reference Leon P, Ur B, Shay R, et al. Why Johnny can’t opt out: a usability evaluation of tools to limit online behavioral advertising. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM; 2012. 589–98. Leon P, Ur B, Shay R, et al. Why Johnny can’t opt out: a usability evaluation of tools to limit online behavioral advertising. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM; 2012. 589–98.
102.
107.
go back to reference Johnson ME, Willey ND. Will HITECH heal patient data hemorrhages? In: System Sciences (HICSS), 2011 44th Hawaii International Conference on IEEE. 2011. 1–10. Johnson ME, Willey ND. Will HITECH heal patient data hemorrhages? In: System Sciences (HICSS), 2011 44th Hawaii International Conference on IEEE. 2011. 1–10.
108.
go back to reference Figg WC, Kam HJ. Medical information security. Int J Secur (IJS). 2011;5(1):22. Figg WC, Kam HJ. Medical information security. Int J Secur (IJS). 2011;5(1):22.
116.
go back to reference Ancker JS, Silver M, Miller MC, et al. Consumer experience with and attitudes toward health information technology: a nationwide survey. J Am Med Inform Assoc. 2013;20(1):152–6.PubMedCrossRefPubMedCentral Ancker JS, Silver M, Miller MC, et al. Consumer experience with and attitudes toward health information technology: a nationwide survey. J Am Med Inform Assoc. 2013;20(1):152–6.PubMedCrossRefPubMedCentral
122.
go back to reference Agaku IT, Adisa AO, Ayo-Yusuf OA, et al. Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers. J Am Med Inform Assoc. 2014;21(2):374–8.PubMedCrossRef Agaku IT, Adisa AO, Ayo-Yusuf OA, et al. Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers. J Am Med Inform Assoc. 2014;21(2):374–8.PubMedCrossRef
126.
go back to reference Flynn HA, Marcus SM, Kerber K, et al. Patients’ concerns about and perceptions of electronic psychiatric records. Psychiatr Serv. 2003;54(11):1539–41.PubMedCrossRef Flynn HA, Marcus SM, Kerber K, et al. Patients’ concerns about and perceptions of electronic psychiatric records. Psychiatr Serv. 2003;54(11):1539–41.PubMedCrossRef
128.
Metadata
Title
Privacy in the Digital World: Medical and Health Data Outside of HIPAA Protections
Authors
Tasha Glenn
Scott Monteith
Publication date
01-11-2014
Publisher
Springer US
Published in
Current Psychiatry Reports / Issue 11/2014
Print ISSN: 1523-3812
Electronic ISSN: 1535-1645
DOI
https://doi.org/10.1007/s11920-014-0494-4

Other articles of this Issue 11/2014

Current Psychiatry Reports 11/2014 Go to the issue

Psychiatry in the Digital Age (JS Luo, Section Editor)

Online Groups and Patient Forums

Attention-Deficit Disorder (A Rostain, Section Editor)

Use of EEG to Diagnose ADHD

Autism Spectrum Disorders (ES Brodkin, Section Editor)

Etiology of Autism Spectrum Disorder: A Genomics Perspective

Genetic Disorders (W Berrettini, Section Editor)

Genetics of Schizophrenia