You are on page 1of 6

NCM67: BIOETHICS C.

Information relating to any discretionary benefit of a financial


nature such as the granting of a license or permit given by the
government to an individual, including the name of the individual
and the exact nature of the benefit;
WEEK 9: DATA PRIVACY AND TECHNOLOGY
D. Personal information processed for journalistic, artistic, literary,
(7/06/2022) or research purposes;

E. Information necessary in order to carry out the functions of


A. DATA PROTECTION AND SECURITY public authority which include the processing of personal data for
the performance by the independent, central monetary authority
This generation has come a long way with its medium and law enforcement and regulatory agencies of their
and method of data collection and management. From the ancient constitutionally and statutorily mandated functions. Nothing in this
method of using paper to store data, a considerable portion of the Act shall be construed as to have amended or repealed Republic
world is now storing data in computers and a multitude of Act No. 1405, otherwise known as the Secrecy of Bank Deposits
electronic devices. With all the data that has been collected with Act; Republic Act No. 6426, otherwise known as the Foreign
the aid of technology, there are extra measures that must be taken Currency Deposit Act; and Republic Act No. 9510, otherwise
in order to protect that data and maintain its security. known as the Credit Information System Act (CISA);

1. DATA PRIVACY ACT OF 2012 – RA 1073 SERIES OF 2012 F. Information necessary for banks and other financial institutions
under the jurisdiction of the independent, central monetary
The Republic Act No. 10173, also known as the Data Privacy authority or Bangko Sentral ng Pilipinas to comply with Republic
Act of 2012, is one of the leading policies in the Philippines that Act No. 9510, and Republic Act No. 9160, as amended, otherwise
aim to achieve this goal. By definition, it is “an act protecting known as the Anti-Money Laundering Act and other applicable
individual personal information in information and communications laws; and
systems in the government and the private sector, creating for this
purpose a national privacy commission, and for other purposes”. It G. Personal information originally collected from residents of
is important to note that, although the act ensures the privacy of foreign jurisdictions in accordance with the laws of those foreign
the data of the people, it also ensures that information is readily jurisdictions, including any applicable data privacy laws, which are
disseminated as well. This is elaborated in Section 2 which states being processed in the Philippines.
that the Data Privacy Act, “is the policy of the State to protect the
fundamental human right of privacy, of communication while With the policy being enacted, it is then implemented by the
ensuring free flow of information to promote innovation and growth. National Privacy Commission, as declared in Section 7. The
The State recognizes the vital role of information and functions of the National Privacy commission is as follows:
communications technology in nation-building and its inherent
obligation to ensure that personal information in information and A. Ensure compliance of personal information controllers with the
communications systems in the government and in the private provisions of this Act;
sector are secured and protected.” The data that is primarily being
protected through this act is personal information and according to B. Receive complaints, institute investigations, facilitate or enable
Section 3, it “refers to any information whether recorded in a settlement of complaints through the use of alternative dispute
material form or not, from which the identity of an individual is resolution processes, adjudicate, award indemnity on matters
apparent or can be reasonably and directly ascertained by the affecting any personal information, prepare reports on disposition
entity holding the information or when put together with other of complaints and resolution of any investigation it initiates, and, in
information would directly and certainly identify an individual.” cases it deems appropriate, publicize any such report: Provided,
That in resolving any complaint or investigation (except where
The broad definition of this act can be specified by the amicable settlement is reached by the parties), the Commission
scope found in Section 4 which states that “This Act applies to the shall act as a collegial body. For this purpose, the Commission
processing of all types of personal information and to any natural may be given access to personal information that is subject of any
and juridical person involved in personal information processing complaint and to collect the information necessary to perform its
including those personal information controllers and processors functions under this Act; 4
who, although not found or established in the Philippines, use
equipment that is located in the Philippines, or those who maintain C. Issue cease and desist orders, impose a temporary or
an office, branch or agency in the Philippines subject to the permanent ban on the processing of personal information, upon
immediately succeeding paragraph: Provided, That the finding that the processing will be detrimental to national security
requirements of Section 5 are complied with.” It is also determined and public interest;
by the same section that the act does not apply to the following:
D. Compel or petition any entity, government agency or
A. Information about any individual who is or was an officer or instrumentality to abide by its orders or take action on a matter
employee of a government institution that relates to the position or affecting data privacy;
functions of the individual
E. Monitor the compliance of other government agencies or
B. Information about an individual who is or was performing instrumentalities on their security and technical measures and
service under contract for a government institution that relates to recommend the necessary action in order to meet minimum
the services performed, including the terms of the contract, and the standards for protection of personal information pursuant to this
name of the individual given in the course of the performance of Act;
those services;
F. Coordinate with other government agencies and the private
sector on efforts to formulate and implement plans and policies to B. Be furnished the information indicated hereunder before the
strengthen the protection of personal information in the country; entry of his or her personal information into the processing system
of the personal information controller, or at the next practical
G. Publish on a regular basis a guide to all laws relating to data opportunity:
protection; 1. Description of the personal information to be entered
into the system;
H. Publish a compilation of agency system of records and notices, 2. Purposes for which they are being or are to be
including index and other finding aids; processed;
3. Scope and method of the personal information
I. Recommend to the Department of Justice (DOJ) the prosecution processing;
and imposition of penalties specified in Sections 25 to 29 of this 4. The recipients or classes of recipients to whom they
Act; are or may be disclosed;
5. Methods utilized for automated access, if the same is
J. Review, approve, reject or require modification of privacy codes allowed by the data subject, and the extent to which such
voluntarily adhered to by personal information controllers: access is authorized;
Provided, That the privacy codes shall adhere to the underlying 6. The identity and contact details of the personal
data privacy principles embodied in this Act: Provided, further, information controller or its representative;
That such privacy codes may include private dispute resolution 7. The period for which the information will be stored; and
mechanisms for complaints against any participating personal 8. The existence of their rights, i.e., to access, correction,
information controller. For this purpose, the Commission shall as well as the right to lodge a complaint before the
consult with relevant regulatory agencies in the formulation and Commission.
administration of privacy codes applying the standards set out in
this Act, with respect to the persons, entities, business activities C. Reasonable access to, upon demand, the following:
and business sectors that said regulatory bodies are authorized to 1. Contents of his or her personal information that were
principally regulate pursuant to the law: Provided, finally. That the processed;
Commission may review such privacy codes and require changes 2. Sources from which personal information were
thereto for purposes of complying with this Act; obtained;
K. Provide assistance on matters relating to privacy or data 3. Names and addresses of recipients of the personal
protection at the request of a national or local agency, a private information;
entity or any person; 4. Manner by which such data were processed;
5. Reasons for the disclosure of the personal information
L. Comment on the implication on data privacy of proposed to recipients;
national or local statutes, regulations or procedures, issue advisory 6. Information on automated processes where the data
opinions and interpret the provisions of this Act and other data will or likely to be made as the sole basis for any decision
privacy laws; significantly affecting or will affect the data subject;
7. Date when his or her personal information concerning
M. Propose legislation, amendments or modifications to Philippine the data subject were last accessed and modified; and
laws on privacy or data protection as may be necessary; 8. The designation, or name or identity and address of
the personal information controller;
N. Ensure proper and effective coordination with data privacy
regulators in other countries and private accountability agents, D. Dispute the inaccuracy or error in the personal information and
participate in international and regional initiatives for data privacy have the personal information controller correct it immediately and
protection; accordingly, unless the request is vexatious or otherwise
unreasonable. If the personal information have been corrected, the
O. Negotiate and contract with other data privacy authorities of personal information controller shall ensure the accessibility of
other countries for cross-border application and implementation of both the new and the retracted information and the simultaneous
respective privacy laws; receipt of the new and the retracted information by recipients
thereof: Provided, That the third parties who have previously
P. Assist Philippine companies doing business abroad to respond received such processed personal information shall he informed of
to foreign privacy or data protection laws and regulations; and its inaccuracy and its rectification upon reasonable request of the
data subject;
Q. Generally, perform such acts as may be necessary to facilitate E. Suspend, withdraw or order the blocking, removal or destruction
cross-border enforcement of data privacy protection. of his or her personal information from the personal information
controller’s filing system upon discovery and substantial proof that
Alongside privacy, confidentiality is also established by this act. the personal information are incomplete, outdated, false, unlawfully
The difference between the two concepts is that privacy protects obtained, used for unauthorized purposes or are no longer
personal information, while confidentiality protects different types necessary for the purposes for which they were collected. In this
of information from unauthorized persons. Under Section 8 of this case, the personal information controller may notify third parties
act, it states that “the commission shall ensure at all times the who have previously received such processed personal
confidentiality of any personal information that comes to its information; and
knowledge and possession.”
F. Be indemnified for any damages sustained due to such
Chapter IV, section 16 of this act acknowledges and identified the inaccurate, incomplete, outdated, false, unlawfully obtained or
rights of the data subject as follows: unauthorized use of personal information.

A. Be informed whether personal information pertaining to him or


her shall be, are being or have been processed;
In the event where these rights are violated, Chapter VIII of this act h. The eighth violation is unauthorized disclosure. This refers to
determines the nature of the violations and the corresponding the person who discloses confidential information to outsiders
penalties. without the intention of harming the data subject. For personal
information, a person can receive a fine ranging from Php 500,00
a. The first violation is unauthorized processing of personal to Php 1,000,000 and imprisonment ranging from 1 to 3 years.
information and sensitive personal information. This refers to the However, if the information was 8 personal sensitive information,
person who processes confidential data without the consent of the the penalties are a fine ranging from Php 500,00 to Php 2,000,000
individual concerned. Under this act, a person who has committed and imprisonment ranging from 3 to 5 years.
unauthorized processing of personalized information can receive a
fine ranging from Php 500,00 to Php 2,000,000 and imprisonment i. The ninth violation is a combination or series of acts. This refers
ranging from 1 to 3 years. However, if the information was to a person who commits multiple violations under this act. For
personal sensitive information, the penalties are much higher, with this, a person can receive a fine ranging from Php 1,000,00 to Php
a fine ranging from Php 500,00 to Php 4,000,000 and 5,000,000 and imprisonment ranging from 3 to 6 years.
imprisonment ranging from 3 to 6 years.
This act also considers the extent of liability or the person/s
b. The second violation is accessing personal information and responsible for the violations. If the person liable to the violation is
sensitive personal information due to negligence. This refers to the a juridical officer, the court can cancel his rights, status, or
person who enables another person to access 7 confidential data privileges as a juridical officer. If he or she is an alien, they will
due to carelessness or inattention. For accessing personal receive the penalties sanctioned by this act as well as get deported
information, a person can receive a fine ranging from Php 500,00 from the country. If he or she is a public officer, aside from the
to Php 2,000,000 and imprisonment ranging from 1 to 3 years. aforementioned penalties, they are also not allowed to run for
However, if the information was personal sensitive information, the office for double the term the penalty is imposed. Furthermore,
penalties are a fine ranging from Php 500,00 to Php 4,000,000 and when a person has violated the rights of 100 people or more under
imprisonment ranging from 3 to 6 years. this act, it is considered a large-scale offense, and he or she can
receive the maximum penalty for each corresponding violation.
c. The third violation is improper disposal of personal information
and sensitive personal information. This refers to the person who People should be made aware of what data is collected from them
carelessly disposes or abandons confidential data in a place that is and how this data is being used. This is what data privacy ensures
accessible to the public. For improper disposal of personal for the people. As one of the bearers of crucial and personal data,
information, a person can receive a fine ranging from Php 100,00 The Data Privacy Act of 2012 is highly applicable in the medical
to Php 500,000 and imprisonment ranging from 6 months to 2 field. One of the main concerns is consent. Consent is an informed
years. However, if the information was personal sensitive indication of willingness to provide personal data, without any form
information, the penalties are a fine ranging from Php 100,00 to of coercion. In the hospital, it is usually a written form that is signed
Php 1,000,000 and imprisonment ranging from 1 to 3 years. by the patient. Aside from the right to decide whether or not data
can be collected, this act also ensures that the patient also has the
d. The fourth violation is processing of personal information and right to be informed of the data collecting process including; the
sensitive personal information for unauthorized purposes. This purpose for use; methods of access; recipients of information;
refers to the person who uses confidential data for other functions period in which information is stored; and finally, access to the
in which the data subject does not give consent to. For processing results of data collected. In essence data privacy protects data the
personal information, a person can receive a fine ranging from Php same way healthcare workers protect their clients. Privacy is a
500,00 to Php 1,000,000 and imprisonment ranging from 1 year fundamental human right, and as nurses, it is our obligation to
and 6 months to 5 years. However, if the information was personal uphold that right while we provide care to our patients.
sensitive information, the penalties are a fine ranging from Php
500,00 to Php 2,000,000 and imprisonment ranging from 2 to 7 B. BENEFITS AND CHALLENGES OF TECHNOLOGY
years.
Technology is defined as techniques, systems, and equipment
e. The fifth violation is unauthorized access or intentional breach. that are the outcome of scientific knowledge being applied to
This refers to the person who deliberately breaks into a system practical objectives. Technology has had a wide-ranging impact on
that contains confidential data without the proper authorization or society and its surroundings. It has aided the development of more
consent from the data subject. For this violation, a person can modern economies and allowed for the establishment of a leisure
receive a fine ranging from Php 500,00 to Php 2,000,000 and class in many civilizations. However, many technological
imprisonment ranging from 1 to 3 years. processes generate undesirable byproducts, known as pollution,
and deplete natural resources, both of which are harmful to the
f. The sixth violation is concealment of security breaches involving Earth and its ecosystem. Moreover, various technological
sensitive personal information. This refers to the person who does implementations impact a society's values, and new technology
not report to the Privacy Commission about an intentional breach frequently presents new ethical concerns. The revolutionary impact
of another person that has come to his/her knowledge. For this of technology cannot be denied in the healthcare industry. Despite
violation, a person can receive a fine ranging from Php 500,000 to the fact that it is a field that requires highly competent
Php 1,000,000 and imprisonment ranging from 1 year and 6 professionals with many years of study, it is also a very demanding
months to 5 years. one in terms of infrastructure and instruments. The growth in
global life expectancy and population aging provides a very
g. The seventh violation is malicious disclosure. This refers to the demanding environment for healthcare innovation and technology.
person who discloses confidential information to outsiders with the Healthcare is the most significant area to benefit from
intention of harming the data subject. For this violation, a person technological adoption. As a result, it has enhanced the quality of
can receive a fine ranging from Php 500,00 to Php 1,000,000 and life throughout time and saved many lives.
imprisonment ranging from 1 year and 6 months to 5 years.
Benefits of Technology
1. Electronic Medical Records (EMRs) or Electronic Health of electronic device which people can wear and know his/her body
Records (EHRs) EMR’s or EHR’s is a collection of patient and condition. Smartwatches, blood pressure machines and many
population health information electronically stored in a digital more medical gadgets, which can where and it shows the current
format. It encourages plenty of advancements in medical treatment state of the body of the patients. These gadgets have several
and diagnostics. Unlike in the past, when medical data were sensors that may 11 detect the state of the body and display the
handled poorly, EHRs allow for quick information, recording, data to the patients on a screen. As a result, patients may simply
storage, and transmission of medical files, as well as effective care obtain a diagnosis and protect their health.
integration.
6. Greater patient care The use of technology can improve
2. Reduction in Medical Errors Prior to medical technological patient participation by giving information that can be used to
advancements, it was extremely difficult to determine the specific develop hyper-targeted, individualized health and wellness
ailment and condition of the patient. Medical technology regimens. Wearable technologies such as fitness bands and other
developments have reduced inaccuracies in medical reports and wirelessly linked devices such as Fitbits may monitor one's blood
treatments. pressure and Electrocardiograph (ECG), providing patients and
specialists with individualized information. These gadgets may
3. Telemedicine / Telehealth Patients in remote places where display calorie counts, activity checks, appointments, blood
health care services and hospitals are more easily accessible can pressure fluctuations, and other information. Specialists can more
speak with doctors online via their phones and laptops. This way, effectively monitor patients' health, such as adherence to treatment
the medical expenses are a lot more substantial. recommendations, and etc. This is especially important for older
people and those who live alone, as family members or concerned
a. Telemedicine - this refers to the use of electronic healthcare providers will be notified immediately if any irregularity
communication and information technology to deliver medical care is identified. As a result, such technological devices ensure that
to patients in remote places. Telemedicine includes remote patients receive exceptional treatment, therefore improving the
medical evaluations and diagnoses, virtual consultations, and healthcare experience and quality for everybody.
digital transmission of medical 10 images. Lifeline is a
telemedicine platform that is now available in the Philippines. It
offers virtual medical services that connect medical professionals Challenges of Technology
and patients seamlessly using a mobile app that has been
successful in the United States. The new platform will offer a real- 1. Cybersecurity Risks The category of cloud-connected medical
time experience for Lifeline patients, offering everything from free devices was formed and is primarily fueled by data capabilities.
video consultations with doctors, comprehensive patient education, The term "internet of things" refers to the concept of gadgets with
free delivery of prescriptions and medications and free sensors that can communicate with other devices and systems
doctors/nurse home visits in the greater Metro Manila area. In (IoT). With so much data being created and floating around the
addition, Bayanihan E-Konsulta is the telemedicine program internet, there is a possibility that it could be accessed by
launched by OVP headed by former VP Leni Robredo in April 2021 unauthorized persons. There are several instances of patient data
following a spike in cases to help ease the congestion in medical falling into the wrong hands, whether through malevolent actors'
facilities. The Bayanihan E-Konsulta is part of the OVP’s response deliberate hacking or unintentional exposure. And those without
to the COVID-19 pandemic, along with the free antigen testing extensive experience in cybersecurity may be putting the patients
provided by Swab Cab and the assistance to LGU vaccination who use their systems at danger by relying on external cloud
efforts through the Vaccine Express. service providers to maintain their data infrastructure. The risk
linked with cybersecurity doesn't merely refer to the disclosure of
b. Telehealth technology enables remote patient evaluation and personal information or the occasional ransoms associated with
diagnosis, as well as the ability to identify oscillations in patients' data breaches. The dangers associated with manipulated data
medical conditions and adjust specialized therapy and drugs may have detrimental effects. Correct and accurate datasets are
accordingly. Telehealth also facilitates e-prescribe treatments essential for patients and medical professionals that use data to
remotely. In the Philippines, increased access to information and guide treatment decisions. A mistaken diagnosis or treatment plan,
communication technologies over the years have led to the rise of as well as other negative outcomes, may result from the deletion
telehealth. Because of the pandemic, teleconsultations can now be or alteration of data. This draws attention to one of the major
done through COVID-19 hotlines, websites, and mobile apps drawbacks of IoT in healthcare. Without the proper security
launched by several agencies and businesses. Some of the protocols, access to patients linked medical equipment with the
telehealth available in the Philippines are Medifi, KonsultaMD, goal of changing functionality is possible. In the worst instance, a
HealthNow, AIDE, DOCPH, DOH COVID-19 Hotline. major gadget malfunction in critical settings could happen.

4. Improved patient education Patient education is becoming 2. Lack of Empathy in Patient and Doctor Interaction Even
increasingly important in healthcare, and experts are adopting when they are not physically present to one another, technology
technology that might assist better inform and engage patients. can help keep healthcare personnel and patients linked. Instead of
Technology has enabled the delivery of personalized health relying on sporadic consultations, it is conceivable, for instance, to
education information to patients depending on their unique create and update a treatment plan on an ongoing basis by
requirements and situations. The Patient Electronic Portal, for utilizing data and technology. As we proceed through the COVID-
example, is a secure online tool that gives patients access to their 19 pandemic, clinicians are using telehealth more and more as a
personal health information as well as two-way electronic contact critical tool. In these hard times, the use of such instruments has
with their care provider by computer or mobile device. According to maintained the healthcare system and ensured that patients
one study, this application has boosted patients' adherence to receive continuity of treatment. Similar to earlier detection of
preventative medical measures, medical adherence, possible problems, remote patient monitoring can reduce
selfawareness, and illness management. healthcare expenses by preventing future consequences.
Telehealth and remote monitoring also make it possible to solve
5. Wearable Technology Modern technology introduced wearable the scarcity of clinicians in rural places that has plagued many
medical technology tools in the market. These devices are a kind nations, including our own. However, there could be problems as a
result of how technology has evolved to serve as the conduit concerned with the manipulation and abuse of consumer data and
between patients and clinicians. The personal touch of therapy is massive data breaches in relation to the human selfish pursuits of
removed while working with dashboards on connected medical their own goals. Because of this, a person’s dignity and their right
devices and computers, which leads to a loss of empathy for to privacy are being violated. As technology progresses, it also
patient care. Using technology as the interface for care can be becomes more susceptible to hacking. This involves hacking into
frustrating and confusing, especially for elderly and vulnerable medical devices that can result in endangering human life
patients. It may also lead to misunderstandings about treatment undergoing treatment. Implantable cardiac devices such as the
plans or patient noncompliance. pacemakers are among the top most prone to hacking, along with
smart pens, drug infusions, insulin pumps, and wearable vital
3. Frustration with Poor Implementation The proverb monitors. Even though there were no current reports of hackers
"technology is fantastic — when it works" comes to mind as we harming patients, these issues on medical devices should be taken
continue to analyze the advantages and disadvantages of medical seriously since they contain cybersecurity vulnerabilities that
technology. According to research by Asurion, 80% of Americans potentially pose a threat to the patient’s health.
have at least one frustrating experience with technology every day.
Systems need to be precise, simple to use, and ultimately better
than the current patient care practices in order for technology to A. Medical Devices Prone to Hacking:
benefit healthcare. It is crucial for clinicians and medical 1. Pacemakers and heart rate monitors
professionals to make sure that the technology they use is simple 2. MRI devices
to use and comprehend, rather than a burden. Healthcare 3. Hospital networks
practitioners who spend more time battling technology than 4. Wearable health devices
providing patient care are more inclined to ignore its use and new 5. Insulin pumps
developments. However, even for healthcare professionals that 6. Cochlear implants and hearing aids
support the use and implementation of technology, it is essential to
make sure that the results produced by the technology are more B. Reasons for Hacking Medical Devices:
accurate or better at diagnosing. Care must be taken to ensure 1. Targeting Individuals- goal is to kill individual
that healthcare personnel are aware of the limitations of emerging 2. Corrupting Systems- Viruses and malware
technologies like AI and machine learning. For instance, because 3. Stealing personal or medical data- Sensitive-detailed
they are trained on historical data, many machine learning models information of a person
struggle to adjust to changes over time when operational data 4. Finding back doors into larger networks- Break into wider
significantly differs from learned data. Similar to this, practitioners hospital networks
who rely too heavily on AI/ML systems may become complacent
and fail to crosscheck or take other factors into account when I. Possible Solutions for Data Surveillance and Data Privacy:
making predictions. The ongoing use of technology in healthcare is 1. Data Privacy Act of 2012 - Republic Act No. 10173 - One of the
risky if it does not improve care in terms of speed, efficiency, or leading policies aims to protect data and maintain its security. - It is
accuracy. meant to cover both natural and juridical persons involved in
processing personal information.
4. Increased Cost of the Treatment for the Patients. One of the
drawbacks of medical technology is the rising expense of care. 2. Upgrade operating systems, implement patches and ensure
The majority of technologically assisted treatments and network visibility - Keeping software up to date is an essential
procedures, such as robotic surgery and other types of component of maintaining cybersecurity. - Systems must keep
technological machinery surgeries, are quite expensive. ahead of hackers to remain protected against the latest malware
Additionally, the majority of the patients are impoverished and from and other threats.
rural areas. Poor folks are unable to afford pricey operations.
Technology improved healthcare, but it also raised its price which 3. Educate and spread awareness to healthcare providers -
the sufferers are unable to pay. Healthcare providers must be trained in cybersecurity best
practices. - They should have regular training sessions on how
C. CURRENT TECHNOLOGY: ISSUE AND DILEMMA breaches commonly occur, and conduct periodic risk
assessments.
Indeed, technology in the present is undeniably upgrading day by
day. It has achieved tremendous success as it provides our society 4. Adopt multi-layered authentication - Example: Biometrics
with products and services that make everyday life easier.
However, as it continually progresses, many issues and dilemmas Misinformation, Disinformation, and Fake News
concerning technology as well as its effects on the medical field Misinformation, disinformation, and fake news are one of the
emerge. Some of the areas of concern the technology is currently issues encountered as the current technology continues to
facing include digital surveillance and data privacy, misinformation develop. Fake news are news and stories on the internet that are
or fake news, lowquality and counterfeit pharmaceuticals, and not true. It may be in the form of disinformation or misinformation.
effects on physical and mental health. If today’s generation fails to Disinformation is defined as false information that is spread to
provide a holistic solution to these concerns, it will likely cause the deliberately cause harm. Moreover, misinformation is the term that
future to struggle and fail in dealing with the same obstacles. is generally used to refer to misleading information disseminated
without the intent to cause harm. One of the most subtle and
Digital Surveillance and Data Privacy detrimental effects of technology today is how our society views
truth, and how the information overload we face every day causes
With the rampant growth of technology and our dependence on it, all of us to lose touch with reality. Because of the increasing
there is also a growing concern over personal data and the use of amount of information online, it is getting harder to determine
data. According to research by Silvergate, Kosmowski, Horn, and which is based on facts, frauds, or lies. This becomes more
Jarvis (2021), data privacy is among the top concerns or dangerous especially when children and young people will be
dilemmas, as the issue is somewhat critical and needs to be persuaded to do things that they have read or seen on the internet,
addressed over the next few years. The problem is mostly and will eventually cause harm to other people. One perfect
example of this is the spread of false information about COVID and societal norms. Because of the rapid progress within the fields of
COVID vaccines. Because of the fake news and misinformation nanotechnology, biotechnology, information technology and
disseminated in a lot of platforms, a lot of people lose their trust in cognitive science, the evolutionary status of humans has been
the circulating facts about these topics; thus, a lot of people also brought into question.
refuse to get vaccinated and may also result in endangering their
16 health. It is a right of a person to be informed, and spreading Issues on Human enhancement:
false information suppresses this right of a person.
- Mainly revolves around the question of whether there is a
Possible Solutions: common “nature” that all human beings share and which is
1. Research unwarrantedly violated by enhancing a human being’s capabilities
2. Verify Information beyond the normal level defined by this shared “nature”.

Low-Quality and Counterfeit Pharmaceuticals

Medicines are one of the vital components of our health systems


today, and the access to quality-assured medicines is one of a
person’s basic rights to health. Nevertheless, there is a 1. The means by which people achieve their goals in life matter.
widespread manufacturing of poor-quality medical products, - Using a shortcut decreases the accomplishment value.
including medicines, vaccines, and diagnostic devices, due to poor
manufacturing (substandard) or deliberate falsification (falsified 2. Violate the principle of preserving an “open future.”
medicines) using our advancing technology. Detecting low-quality - It may narrow a person’s perspective
and counterfeit drugs used to require access to complex testing - Some enhancements promote possible effects but
equipment, which was often unavailable in developing nations might lead to serious disability later.
where these issues arose. The massive trade in pharmaceutical
intermediaries and active components raises dozens of new Example scenario: The use of drugs that provide short-term gain—
difficulties, ranging from the technical to the ethical and legal such as increasing physical strength or stimulating creativity—but
aspects. This issue can lead to mortality and morbidity, waste which may also come with long-term health risks.
financial resources, and promote drug resistance. Because of this,
it violates two fundamental principles of bioethics, namely, 3. Question of governance
beneficence and nonmaleficence. - Making numerous enhancements available will require
having a range of decision makers charged with
Possible Solutions: developing policies for their use and implies the need for
1. Cooperation between organizations and a concerted effort in social systems ensuring that everyone has affordable
public policy access to them.
2. New and encouraging technologies
– technology is making the fight against fake medications 4. Authentic life
quicker, simpler, and more organized - it is argued that certain uses may be morally
– Use of handheld detection devices undesirable forms of enhancement, as they transform a
– Mass serialization person into somebody else and that this disconnection is
logically undesirable
Physical and Mental Health
5. Morphological freedom
The technology industry can impact both the physical and mental - Favors autonomy
well-being of a person who uses and overuses its products and - It should be a human right to enhance one’s biology,
services, as well as having direct involvement in health care. rather than something that the state should aim to
Although measuring the impact of technology to both is difficult restrict.
and complex, it is still undeniable that the technology industry
helps improve health-related areas through devices like wearables, 6. Naturalness
give better access to providers through telehealth and applications, - A further societal concern is that changing humanity by
improve chronic disease monitoring, and improve diagnoses human enhancement would undermine some essential
through AI and other advanced technologies. However, despite the quality of our human identity that we would wish to
positive impact of the technology on physical and mental health, preserve
negative 17 effects and overuse of technology are evident as well.
This may lead to psychological and physical problems, such as 7. There are other moral concerns that are often folded into this
eyestrain and difficulties concentrating on crucial tasks. They may fear over biotechnological change, notably the view that
also lead to more significant health issues like depression. undertaking such changes is akin to “Playing God”.
Moreover, overuse of technology may have a greater influence on - The argument states that since humans have no
growing children and teenagers. oversight in their own evolutionary trajectory, it would be
foolish to attempt actions that would enhance evolution.
Human Enhancements

Human enhancement (HE) is defined as “any kind of genetic,


biomedical, or pharmaceutical intervention aimed at improving
human dispositions, capacities, or well-being, even if there is no
pathology to be treated”. With the rampant rise of technology,
these types of procedures became a possibility and are already
available for therapeutic purposes. But these same enhancements
are used to magnify the biological function of humans beyond the

You might also like