You are on page 1of 25

Information and Communication Technologies and the Right to

Informational Privacy in Health Care: A Comprehensive Analysis


Nandu Sam Jose
School of Legal Studies, CUSAT
Email: nandusamjose@cusat.ac.in

DOI: http://doi.org/10.21776/ub.blj.2023.010.01.03
Submitted: 2023-03-04 | Revised: 2023-04-26 | Accepted: 2023-04-28 | Published: 2023-04-30
How to Cite : Jose, Nandu Sam. “Information and Communication Technologies and the Right to Informational Privacy in Health Care: A
Comprehensive Analysis.” Brawijaya Law Journal 10, no. 1 (2023): 34-58. http://doi.org/10.21776/ub.blj.2023.010.01.03.
Copyright (c) 2023 Brawijaya Law Journal. All Rights Reserved.

Abstract: The rapid integration of information and communication technologies (ICTs) into the
healthcare field has led to significant advancements, including the development of electronic health
records, telemedicine, big data analytics, and artificial intelligence. These technologies have
revolutionized medical care by improving accessibility, enhancing quality, and facilitating personalized
treatments. However, with these advancements, the issue of health information privacy has become
increasingly prominent. This article examines the interplay between ICTs and the right to informational
privacy in the healthcare field. More specifically, it explores the core principles of informational privacy
by outlining its legal and ethical facets while also underscoring the importance of maintaining the
confidentiality and security of personal health information (PHI). The essay also examines the
challenges threatening informational privacy—including data breaches, inadequate regulatory
frameworks, and ethical dilemmas surrounding big data and AI. Simultaneously, the article identifies
opportunities for enhancing privacy protections, including introducing technological innovations, and
strengthening legal and regulatory frameworks. The piece also offers practical recommendations for
various stakeholders—such as policymakers, healthcare providers, and individuals—for ensuring the
protection of PHI. In conclusion, this article emphasizes the importance of striking a delicate balance
between leveraging the benefits of ICTs and protecting informational privacy, which is a prerequisite
for fostering a resilient, equitable, and patient-centered healthcare system.

Keywords: health care; informational privacy; information and communication technologies;


personal health information; privacy protection.

I. Introduction implications of these advancements on the


right to health informational privacy in health
Information and Communication care. This right is essential in ensuring trust
Technologies (ICTs) have revolutionized between patients and healthcare providers
health care, generating unprecedented and protecting sensitive personal health
opportunities for improving patient care, information (PHI).
efficiency, and access to information. As the
While the benefits of integrating ICTs into
adoption of digital systems continues to
health care are widely recognized, recent
increase, it has become crucial to consider the
[34]
E-ISSN: 2503-0841, P-ISSN: 2356-4512

incidents and debates have highlighted the In elucidating these challenges, the article
urgent need for an in-depth analysis of the also uncovers opportunities for bolstering
tensions between the use of these privacy protections in the face of the ongoing
technologies and the safeguarding of health digital transformation. It culminates by
information privacy.1 For instance, the offering well-founded recommendations for
increased frequency, and sophistication of various stakeholders, including
data breaches raise serious concerns about policymakers, healthcare providers, and
the security and confidentiality of PHI. 2 For individuals. These actionable insights aim to
example, in 2021, data belonging to 230,000 safeguard the right to informational privacy,
patients diagnosed with COVID-19 was ensuring a balanced approach to ICT
illegally accessed and subsequently sold on a implementation that reaps its myriad benefits
dark web forum known as Rapid Forums.3 without compromising the fundamental
Furthermore, the growing use of artificial privacy rights of patients.
intelligence (AI) and big data in health care,
though promising, has exacerbated concerns II. Legal Materials & Method
over privacy.4 Against this backdrop, this
article seeks to provide a comprehensive This study employs doctrinal legal analysis,
analysis of the complex relationship between and a thorough review of relevant literature,
ICTs and the right to informational privacy in including academic articles, research papers,
health care. It explores the multifaceted role reports, and legal documents, was conducted
of ICTs in health care, detailing how different to gain an understanding of the current state
technologies, such as electronic health of ICTs in health care, the concept of
records, telemedicine, big data analytics, and informational privacy, and the challenges,
artificial intelligence (AI), can impact and opportunities associated with privacy
privacy. Furthermore, the article navigates protection. Subsequently, key concepts, and
the legal and ethical frameworks that govern issues related to ICTs and health information
informational privacy, spotlighting their role privacy were identified and organized into a
in the protection of PHI in an increasingly coherent structure. On this basis, the analysis
digital healthcare landscape. was divided into multiple sections to address
different aspects of the topic, including the
role of ICTs, legal frameworks, ethical

1
Sara Quach et al., “Digital Technologies: Tensions and the European Union,” International Journal of
in Privacy and Data,” Journal of the Academy of Human Rights in Healthcare September (2022),
Marketing Science 50, no. 6 (2022): 1299–1323, https://doi.org/10.1108/IJHRH-04-2022-0035.
4
https://doi.org/10.1007/s11747-022-00845-y; Eric Dariusz Czuchaj, Marc Elshof, and Anna
Durnell et al., “Online Privacy Breaches, Offline Szczygiel, “Key Challenges of Artificial
Consequences: Construction and Validation of the Intelligence: AI Privacy Concerns and the GDPR,”
Concerns with the Protection of Informational Business Going Digital, 2021,
Privacy Scale,” International Journal of Human– https://www.businessgoing.digital/key-
Computer Interaction 36, no. 19 (2020): 1834–48, challenges-of-artificial-intelligence-ai-privacy-
https://doi.org/10.1080/10447318.2020.1794626. concerns-and-the-gdpr/; Saharnaz Dilmaghani et
2
Nivedita James, “80+ Healthcare Data Breach al., “Privacy and Security of Big Data in AI
Statistics 2023,” Astra, 2023, Systems: A Research and Standards Perspective,”
https://www.getastra.com/blog/security- in IEEE International Conference on Big Data
audit/healthcare-data-breach-statistics/. (Big Data) (Los Angeles: IEEE, 2019), 5737–43,
3
Dona Budi Kharisma and Alvalerie Diakanza, https://doi.org/10.1109/BigData47090.2019.9006
“Patient Personal Data Protection: Comparing the 283.
Health-Care Regulations in Indonesia, Singapore
[35]
Brawijaya Law Journal 10 Vol 1 (2023): 34-58

considerations, challenges, and patient care, increased access to medical


opportunities. Moreover, each section is services, and accurate, and timely medical
developed through a discussion of relevant data for medical practitioners.5
concepts, issues, and examples from the Some of the critical areas where ICT plays a
literature. This structure facilitates a significant role in health care are as follows:
comprehensive examination of the subject
matter and enables readers to understand the a. Electronic Health Records
different dimensions of health information Electronic health records (EHRs) are digital
privacy. Based on the discussion and versions of a patient’s medical history
analysis, this study develops a set of designed to streamline and improve the
recommendations for policymakers, management of patient information. They
healthcare providers, and individuals that contain comprehensive data on a patient’s
provide guidance on how to effectively demographics, medical conditions,
address privacy challenges and protect health treatments, medications, allergies,
information privacy. The study concludes immunizations, and test results.6
with a summary of key findings and insights, Consequently, EHRs have become
emphasizing the importance of balancing the increasingly prevalent in healthcare settings
benefits of ICT adoption in health care with due to their numerous benefits.
the protection of patients’ privacy rights.
Electronic health records offer several
benefits to health care, including improved
III. Results & Discussion efficiency through quick access to and
exchange of patient information and
The Role of Information and minimized need for paper records and
Communication Technology (ICT) in manual data entry. 7 Additionally, EHRs
Health Care enhance patient care by providing a complete
ICTs have transformed numerous industries, and up-to-date picture of a patient’s medical
including health care. Indeed, ICTs are now history, enabling more informed clinical
an integral part of the healthcare industry, decision-making and preventing medical
revolutionizing healthcare delivery, medical errors. Moreover, EHRs allow for better care
research, and more. In today’s fast-paced coordination, especially for patients with
world, ICTs have become increasingly vital complex medical needs and those seeing
to providing quality healthcare services to multiple specialists. Patients can also become
patients globally. In healthcare settings, ICTs more involved in their own health care
offer various benefits, including improved through EHRs. Using securing online portals,

5
Clemens Scott Kruse and Amanda Beane, “Health https://www.cms.gov/Medicare/E-
Information Technology Continues to Show Health/EHealthRecords.
Positive Effect on Medical Outcomes: Systematic 7
Kruse CS et al., “Impact of Electronic Health
Review,” Journal of Medical Internet Research Records on Long-Term Care Facilities: Systematic
20, no. 2 (2018): 1–9, Review,” JMIR Med Inform, 2017; e35. Accesed
https://doi.org/10.2196/jmir.8793; Michael Rowe, from Soumya Upadhyay and Han-fen Hu, “A
“Information and Communication Technology in Qualitative Analysis of the Impact of Electronic
Health: A Review of the Literature,” Journal of Health Records (Ehr) on Healthcare Quality and
Clinical and Health Sciences 3, no. 1 (2008): 68– Safety: Clinicians’ Lived Experiences,” Health
77. Services Insights 15 (2022),
6
“Electronic Health Records,” CMS.gov, accessed https://doi.org/10.1177/11786329211070722.
November 6, 2021,
[36]
E-ISSN: 2503-0841, P-ISSN: 2356-4512

they can review their records, track health healthcare costs by decreasing the need
data, and communicate with healthcare for in-person visits, saving patients time,
providers. Electronic health records also and money on travel while lowering
support public health initiatives and medical overhead costs for healthcare providers.10
research by providing large-scale, Telemedicine also improves patient
anonymized datasets for identifying trends, outcomes, enabling faster diagnoses, and
tracking disease outbreaks, and evaluating treatment and better continuity of care,
the effectiveness of interventions and particularly for patients with chronic
treatments.8 conditions. By facilitating more frequent
follow-ups and better communication
b. Telemedicine and Remote Patient
between patients and healthcare
Monitoring
providers, telemedicine can improve
Telemedicine and remote patient monitoring patient outcomes and overall quality of
are two key ICT applications that have care.11
significantly expanded the reach and 2) Remote patient monitoring (RPM)
efficiency of healthcare services. They involves the use of digital technologies,
leverage digital communication tools and such as wearable devices, mobile
devices to provide medical care and applications, and home monitoring
monitoring to patients without the need for equipment, to continuously collect, and
in-person visits: transmit patient health data to healthcare
1) Telemedicine involves the use of ICTs, providers12. Remote patient monitoring
such as video conferencing, mobile also allows for early intervention and
applications, and secure messaging, to better disease management by providing
enable healthcare providers to consult, real-time health data to healthcare
diagnose, treat, and monitor patients providers.13 This enables healthcare
remotely.9 Telemedicine offers several practitioners to detect potential issues
benefits, including increased access to early and adjust treatment plans
care for patients living in remote, rural, or accordingly, leading to better disease
underserved areas who may experience management and overall patient
difficulty accessing medical services. outcomes. Additionally, RPM can
Additionally, telemedicine can reduce empower patients to take an active role in
their health care by tracking their health

8
“What Are the Advantages of Electronic Health Neck Surgery 165, no. 2 (2021): 239–43,
Records?,” HealthIT.gov, accessed March 24, https://doi.org/10.1177/0194599820983330.
11
2023, https://www.healthit.gov/faq/what-are- WHO Group Consultation on Health Telematics,
advantages-electronic-health-records. “A Health Telematics Policy in Support of WHO’s
9
Oren J. Mechanic, Yudy Persaud, and Alexa B. Health-For-All Strategy for Global Health
Kimball, Telehealth Systems, StatPearls (Treasure Development: Report of the WHO Group
Island (FL) (StatPearls Publishing, 2021), Consultation on Health Telematics” (Geneva,
http://www.ncbi.nlm.nih.gov/books/NBK459384/ Switzerland, 1997),
. https://apps.who.int/iris/handle/10665/63857.
10
F. Mair, “Systematic Review of Studies of Patient 12
Mechanic, Persaud, and Kimball, Telehealth
Satisfaction with Telemedicine,” BMJ 320, no. Systems.
13
7248 (2000): 1517–20, Frederico Arriaga Criscuoli de Farias et al.,
https://doi.org/10.1136/bmj.320.7248.1517; See “Remote Patient Monitoring: A Systematic
also: Steven D. Losorelli et al., “The Future of Review,” Telemedicine and E-Health 26, no. 5
Telemedicine: Revolutionizing Health Care or (2020): 576,
Flash in the Pan?,” Otolaryngology–Head and https://doi.org/10.1089/tmj.2019.0066.
[37]
Brawijaya Law Journal 10 Vol 1 (2023): 34-58

indicators and adhering to recommended tailored to a patient’s unique characteristics,


care plans14 By closely monitoring enabling personalized treatment plans that
patients’ health and intervening early improve treatment effectiveness and reduce
when necessary, RPM can also help potential side effects18. Artificial intelligence
prevent hospitalizations and reduce the can assist health care by analyzing medical
likelihood of readmissions, leading to images, genetic data, and other clinical
significant cost savings and improved information to detect and diagnose diseases
patient outcomes.15 such as cancer, diabetes, and Alzheimer’s
with a high degree of accuracy.19
c. Big Data Analytics and Artificial
Additionally, AI can streamline the drug
Intelligence
discovery process by analyzing large datasets
Big data analytics and AI have emerged as to identify potential drug candidates, predict
transformative technologies within health their effectiveness, and optimize their
care, leveraging the vast amounts of data chemical structures, reducing the time, and
generated by electronic health records, cost associated with drug development.20
wearables, and other digital tools to drive Finally, AI-powered tools, such as natural
insights and improve patient outcomes. language processing, can automate
These technologies have several healthcare administrative tasks, such as documentation,
applications, including predictive analytics, billing, and appointment scheduling, freeing
personalized medicine, diagnostic support, healthcare providers to focus on patient
drug discovery and development, and care.21
administrative automation.16 Predictive
analytics can identify patterns and trends in
large datasets, predict health outcomes, The Right to Informational Privacy in
identify at-risk populations, and allocate Health Care
resources more effectively. 17 Moreover, AI- The right to health information is a crucial
powered tools, such as machine learning aspect of the relationship between patients
algorithms, can be used to analyze individual and healthcare providers. This right
patient data and recommend treatment plans encompasses the protection of PHI from

14
Ashish Atreja et al., “Remote Patient Monitoring 18
Jamilu Awwalu et al., “Artificial Intelligence in
in IBD: Current State and Future Directions,” Personalized Medicine Application of AI
Current Gastroenterology Reports 20, no. 2 Algorithms in Solving Personalized Medicine
(2018): 6, https://doi.org/10.1007/s11894-018- Problems,” International Journal of Computer
0611-3. Theory and Engineering 7, no. 6 (December
15
Thomas A Ullman and Ashish Atreja, “Building 2015): 439–43,
Evidence for Care beyond the Medical Centre,” https://doi.org/10.7763/IJCTE.2015.V7.999.
19
The Lancet 390, no. 10098 (2017): 919–20, Awwalu et al.
https://doi.org/10.1016/S0140-6736(17)31857-3. 20
H.C. Stephen Chan et al., “Advancing Drug
16
Wullianallur Raghupathi and Viju Raghupathi, Discovery via Artificial Intelligence,” Trends in
“Big Data Analytics in Healthcare: Promise and Pharmacological Sciences 40, no. 8 (August
Potential,” Health Information Science and 2019): 592–604,
Systems 2, no. 1 (February 7, 2014): 3, https://doi.org/10.1016/j.tips.2019.06.004.
21
https://doi.org/10.1186/2047-2501-2-3. Wiljeana Jackson Glover, Zhi Li, and Dessislava
17
Patricia Balthazar et al., “Protecting Your Patients’ Pachamanova, “The AI-Enhanced Future of
Interests in the Era of Big Data, Artificial Health Care Administrative Task Management,”
Intelligence, and Predictive Analytics,” Journal of NEJM Catalyst, March 3, 2022,
the American College of Radiology 15, no. 3 https://catalyst.nejm.org/doi/full/10.1056/CAT.21
(March 2018): 580–86, .0355.
https://doi.org/10.1016/j.jacr.2017.11.035.
[38]
E-ISSN: 2503-0841, P-ISSN: 2356-4512

unauthorized access, disclosure, and The core elements of informational privacy


misuse.22 Additionally, this right is not in health care can be summarized as follows:
merely a practical necessity; rather, it is also 1) Confidentiality refers to the obligation of
supported by international human rights law. healthcare providers and organizations to
For instance, the International Covenant on protect patient information from
Economic, Social, and Cultural Rights
unauthorized disclosure. Confidentiality
(ICESCR) implicitly recognizes this right as ensures that sensitive health information
part of the right to health.23 In 2000, the UN is only shared with those who have a
Committee on Economic, Social, and legitimate need to access it, such as
Cultural Rights, which monitors the healthcare providers directly involved in a
implementation of the ICESCR, adopted patient’s care or entities with legal
General Comment No. 14 on the right to the permission.26
highest attainable standard of health. This
general comment emphasizes that the right to 2) Consent refers to the principle that
health includes the right to health individuals should have control over their
information confidentiality. Hence, PHI, including the right to decide whether,
understanding the different dimensions of when, and with whom their information is
informational privacy is essential to ensure shared. This typically involves obtaining
that individuals can trust the healthcare informed consent from patients before
system and maintain control over their their data is collected, used, or disclosed.27
sensitive health data. 3) Data security refers to the implementation
of technical, administrative, and physical
a. Defining Informational Privacy safeguards to protect the integrity,
Informational privacy refers to the right of availability, and confidentiality of PHI.
individuals to control the collection, use, Data security measures can include
disclosure, and retention of their personal encryption, access controls, secure
information.24In the context of health care, storage, and regular security audits to
informational privacy takes on heightened prevent unauthorized access, data
importance, as PHI includes an individual’s breaches, and other threats.28
medical history, such as diagnoses, 4) Data minimization is the practice of
treatments, and other health-related details.25 collecting, using, and retaining only the
minimum amount of personal information

22
Faria, Paula Lobato De, and João Valente Good of Human Health,” Health Care Analysis 9,
Cordeiro. ‘Health Data Privacy and no. 3 (October 1, 2001): 322,
Confidentiality Rights: Crisis or Redemption?’ https://doi.org/10.1023/A:1012905932744.
26
Revista Portuguesa de Saúde Pública 32, no. 2 Judith Wagner DeCew, In Pursuit of Privacy:
(July 2014): 123–33. Law, Ethics, and the Rise of Technology (Ithaca:
https://doi.org/10.1016/j.rpsp.2014.10.001. Cornell University Press, 1997), 143–44.
23
“CESCR General Comment No. 14: The Right to 27
Tom L. Beauchamp and James F. Childress,
the Highest Attainable Standard of Health (Art. Principles of Biomedical Ethics, 7th ed (New
12)” (Office of the High Commissioner for Human York: Oxford University Press, 2013), 120=24.
28
Rights, August 1, 2000), National Institute of Standards and Technology,
https://www.refworld.org/pdfid/4538838d0.pdf. “Framework for Improving Critical Infrastructure
24
Daniel J. Solove, Understanding Privacy Cybersecurity” (National Institute of Standards
(Cambridge, Mass: Harvard University Press, and Technology, February 12, 2014),
2008), 4. https://www.nist.gov/system/files/documents/cyb
25
Lawrence O. Gostin, “Health Information: erframework/cybersecurity-framework-
Reconciling Personal Privacy with the Public 021214.pdf.
[39]
Brawijaya Law Journal 10 Vol 1 (2023): 34-58

necessary to achieve a specific purpose. Union’s General Data Protection Regulation


This helps to reduce the risk of privacy (GDPR), the Council of Europe’s
breaches that may compromise sensitive Convention 108+, the APEC Privacy
data.29 Framework, and the African Union’s Malabo
5) Transparency and accountability refer to Convention. These agreements and
the responsibility of healthcare providers conventions guarantee an array of rights to
and organizations to be transparent about individuals concerning personal data and
data collection, use, and disclosure establish guidelines for data handling entities
practices, and to comply with privacy to ensure data protection. Lastly, at the
regulations and standards. This can national level, countries like the United
involve providing clear privacy policies, States, Canada, Australia, the United
notifying patients of their rights, and Kingdom, and Indonesia have promulgated
implementing robust privacy management laws and regulations for the protection of
frameworks.30 PHI. However, the effectiveness of these
national frameworks varies depending on the
b. Legal Frameworks Protecting
strength of enforcement mechanisms, the
Informational Privacy
awareness levels of individuals and
The right to informational privacy, especially organizations, and their adaptability to the
within the healthcare sector, is governed by rapidly evolving ICT landscape. The
several legal frameworks at international, succeeding sections will provide a more in-
regional, and national levels. These laws aim depth review of these frameworks, offering
to preserve the sensitive nature of PHI and detailed insights into their operation and
establish an individual’s authority over their efficacy.
personal data.
1) International Frameworks:
Seminal frameworks on the international
The international legal architecture
level include the Universal Declaration of
upholding informational privacy relies
Human Rights (UDHR) and the International
heavily on several seminal frameworks, and
Covenant on Civil and Political Rights
although these frameworks do not explicitly
(ICCPR). Although these frameworks do not
mention privacy, they have significantly
explicitly mention privacy, they have
influenced privacy-related regulations
significantly influenced privacy-related
worldwide. The UDHR, the cornerstone of
regulations around the globe, indirectly
the international human rights framework,
protecting privacy rights, and setting
provides an indirect protection of privacy.
standards for privacy-related laws.31 On the
Article 12 of the UDHR discourages
regional level, data protection norms are
“arbitrary interference” with an individual’s
shaped by frameworks such as the European

29
Office of the Privacy Commissioner of Canada, /media/AHIMA/Files/AHIMA-Revised-Privacy-
“Guidelines for Processing Personal Data across Security-Framework-0118.pdf.
Borders,” 2009, 31
Palm, Willy, Herman Nys, David Townend, David
https://www.priv.gc.ca/en/privacy-topics/airports- Shaw, Timo Clemens, and Helmut Brand.
and-borders/gl_dab_090127/. ‘Patients’ Rights: From Recognition to
30
American Health Information Management Implementation’. In Achieving Person-Centred
Association (AHIMA), “Privacy and Security in Health Systems, by Jonathan North, 347–86. edited
Healthcare: A Fresh Look,” 2018, by Ellen Nolte, Sherry Merkur, and Anders Anell,
https://www.ahima.org/- 1st ed. Cambridge University Press, 2020.
https://doi.org/10.1017/9781108855464.016.
[40]
E-ISSN: 2503-0841, P-ISSN: 2356-4512

privacy, family, home, or correspondence.32 These frameworks, guided by unique


The principles enshrined in the UDHR form regional intricacies, establish standards that
bedrock that has guided the formation of protect personal data and facilitate
subsequent privacy-related laws and information flow. For example, the GDPR in
regulations around the world. Its indirect yet the European Union has established a robust
substantial influence on privacy norms data protection framework that champions an
underlies the expansive interpretation of individual’s right to access, rectify, erase,
human rights. Moreover, the ICCPR, another and restrict the processing of personal data.
crucial international human rights The GDPR also requires organizations to
instrument, offers further protection of adopt suitable technical and organizational
privacy rights. Article 17 of the ICCPR measures to ensure data protection. 34
defends individuals against unlawful or Equally notable is the Council of Europe’s
arbitrary interference in their privacy, Convention 108 and its modernized version,
requiring states to ensure the availability of the Convention 108+. This legal framework
legal recourse for such violations.33 This includes specific provisions for protecting
covenant supports the collective international
sensitive data, including health information.
effort to acknowledge and address privacy It requires that participating national
rights, reflecting a clear rejection of governments implement laws to protect an
unwarranted intrusions into people’s individual’s rights related to data processing
personal lives. while ensuring the security and
35
The interplay between these frameworks and confidentiality of personal data. In the
the various interpretations they provide for Asia-Pacific region, the APEC Privacy
privacy protection offer a rich backdrop for Framework, which is crucially supported by
analyzing how the right to privacy, the CBPR system, promotes the flow of
particularly health information privacy, has information while facilitating privacy and
been addressed on the global stage. This is personal data protection across the APEC
further elaborated upon in the succeeding economies.36 37Lastly, the African Union has
sections, which delve into the nuanced demonstrated its commitment to data
interplay of these international standards protection with the Malabo Convention,
within regional and national legal structures. which, despite its limited adoption, provides
a framework for cybersecurity and personal
2) Regional Frameworks:
Regional frameworks play a pivotal role in
safeguarding informational privacy,
particularly health information privacy.

32
United Nations, “Universal Declaration of Human the-protection-of-individuals-with-
Rights” (1948), https://www.un.org/en/about- regar/16808b36f1.
36
us/universal-declaration-of-human-rights. Asia Pacific Economic Cooperation, ed., APEC
33
United Nations, “International Covenant on Civil Privacy Framework (Singapore: APEC
and Political Rights” (1966). Secretariat, 2017).
34
European Union, “General Data Protection 37
Asia Pacific Economic Cooperation, “APEC
Regulation” (2016). Cross-Border Privacy Rules System,” accessed
35
Council of Europe, “Convention 108 +: April 15, 2023,
Convention for the Protection of Individuals with https://cbprs.blob.core.windows.net/files/CBPR%
Regard to the Processing of Personal Data,” 2018, 20Policies,%20Rules%20and%20Guidelines%20
https://rm.coe.int/convention-108-convention-for- Revised%20For%20Posting%203-16.pdf.
[41]
Brawijaya Law Journal 10 Vol 1 (2023): 34-58

data protection38, including personal health recently enacted Law no 27 of 2022 on


data. Personal Data Protection, which provides
3) National Frameworks: protection for informational privacy in health
care by recognizing health information as
On the national level, there is a high degree “specific personal data.”44
of dissimilarity regarding how different
These legal frameworks play a crucial role in
countries protect the right to informational
upholding the right to informational privacy
privacy, particularly in relation to PHI. For
in health care; however, their effectiveness
example, India currently does not have a
often depends on the strength of their
comprehensive framework for the protection
enforcement mechanisms, the awareness of
of PHI; this may pose a challenge in the
individuals and organizations, and their
context of the digital age of rapid exchange
ability to adapt to the rapidly evolving
of information. The United States is one of
landscape of ICTs.
the few countries that have developed a
comprehensive legal framework specifically c. Ethical Considerations
aimed at protecting PHI. The Health Ethical considerations also play a significant
Insurance Portability and Accountability Act
role in guiding the protection of health
is the primary federal law governing the information privacy, ensuring that the use of
protection of PHI in the United States.39 This
ICTs in health care remains consistent with
law establishes standards for privacy, the fundamental values of medical practice
security, and the electronic transmission of and patient care.
PHI and applies to a broad range of entities,
including healthcare providers, health plans, 1) Patient Autonomy refers to the rights of
as well as healthcare clearinghouses and their the individual to make informed decisions
business associates. about their own health care, including the
collection, use, and disclosure of PHI.
Many countries have enacted federal laws Upholding patient autonomy in the
and regulations to protect health information
context of informational privacy requires
privacy, and they often reflect the specific obtaining informed consent before
legal, cultural, and social contexts of their accessing or sharing PHI, ensuring that
respective jurisdictions. Examples include patients understand their privacy rights,
the Personal Information Protection and and providing them with the means to
Electronic Documents Act in Canada,40 the control their own health data.45
Privacy Act41 and the Healthcare Identifiers 2) Confidentiality is an essential ethical
Act42 in Australia, and the Data Protection principle in health care, mandating that
Act43 in the United Kingdom. Indonesia has healthcare providers maintain the privacy

38
African Union, “African Union Convention on 42
Australia, “Healthcare Identifiers Act” (2010).
Cyber Security and Personal Data Protection” 43
UK, “Data Protection Act” (2018),
(African Union, June 27, 2014), https://www.legislation.gov.uk/ukpga/2018/12/co
https://au.int/en/treaties/african-union- ntents.
convention-cyber-security-and-personal-data- 44
“Law No. 27 of 2022 on Personal Data Protection”
protection. (2022).
39
USA, “Health Insurance Portability and 45
Alfred I. Tauber, Patient Autonomy and the Ethics
Accountability Act” (1996). of Responsibility, Basic Bioethics (Cambridge,
40
Canada, “Personal Information Protection and Mass: MIT Press, 2005), 59–60,
Electronic Documents Act” (2000). https://archive.org/details/patientautonomye0000t
41
Australia, “Privacy Act” (1988). aub.
[42]
E-ISSN: 2503-0841, P-ISSN: 2356-4512

of patient information and share it only 5) Transparency and accountability are


with those who have a legitimate need to ethical principles that require healthcare
know. Protecting confidentiality helps to providers and organizations to be
build trust between patients and healthcare transparent regarding their data collection,
providers, encouraging patients to seek use, and disclosure practices, and ensure
care and volunteer information without that they comply with privacy regulations
fear of unauthorized disclosure.46 and standards.49 This involves providing
3) Non-maleficence and beneficence are clear privacy policies, notifying patients
ethical principles that require healthcare of their rights, and implementing robust
providers to do no harm and act in the best privacy management frameworks to
interest of their patients.47 In the context prevent unauthorized access or breaches.
of informational privacy, these principles By considering these ethical principles,
involve ensuring that the use of ICTs in healthcare providers, policymakers, and
health care does not compromise patient other stakeholders can ensure that the
privacy, cause harm, or disproportionately adoption of ICTs in health care remains
burden certain individuals or groups. This
consistent with the values of the medical
can be achieved by implementing robust profession and regulations governing the
security measures, adhering to data protection of patient privacy. Balancing the
minimization practices, and considering potential benefits of new technologies with
the potential risks and benefits of new the need for privacy is essential to maintain
technologies. trust and uphold the rights of individuals in
4) Equity and Justice principles require that the digital age.
healthcare services and resources be
distributed fairly without discrimination
or bias. Protecting informational privacy Challenges to Informational Privacy in
should not generate disparities in access to Health Care
care or disproportionately affect
48
As the use of ICTs in health care continues to
vulnerable populations. For this
grow, several challenges have emerged that
purpose, healthcare providers must
can potentially compromise informational
consider how privacy protections and the
privacy. Addressing these challenges is
use of ICTs may impact different socio-
crucial to maintaining trust between patients
economic, cultural, and demographic
and healthcare providers and ensuring the
groups, and address potential inequalities
ethical and legal protection of PHI.
through targeted policies and
interventions.

46
K Blightman, SE Griffiths, and C Danbury, Philosophy: A Forum for Bioethics and
“Patient Confidentiality: When Can a Breach Be Philosophy of Medicine 48, no. 1 (February 17,
Justified?,” Continuing Education in Anaesthesia 2023): 98–109,
Critical Care & Pain 14, no. 2 (April 2014): 52– https://doi.org/10.1093/jmp/jhac015.
56, https://doi.org/10.1093/bjaceaccp/mkt032. 49
Ruth R. Faden et al., “An Ethics Framework for a
47
Beauchamp and Childress, Principles of Learning Health Care System: A Departure from
Biomedical Ethics, 150, 202. Traditional Research Ethics and Clinical Ethics,”
48
Fabrice Jotterand et al., “Promoting Equity in Hastings Center Report 43, no. s1 (January 2013):
Health Care through Human Flourishing, Justice, S16–27, https://doi.org/10.1002/hast.134.
and Solidarity,” The Journal of Medicine and
[43]
Brawijaya Law Journal 10 Vol 1 (2023): 34-58

a. Data Breaches and Cybersecurity unencrypted devices, and falling victim to


Threats phishing scams.53
Healthcare organizations, with their vast 3) Third-party risks. Healthcare
organizations often rely on third-party
databases of sensitive PHI, are attractive
vendors for various services, including
targets for hackers and cybercriminals.50
data storage, software development, and
Unauthorized access to or disclosure of PHI
billing. If these third parties do not adhere
can result in a range of adverse repercussions,
to the same privacy standards or have
including identity theft, financial fraud, and
inadequate security measures in place,
reputational damage.51 Addressing these
they may introduce vulnerabilities, or
cybersecurity threats is essential for
risks that could compromise the security
maintaining public trust in the healthcare
of PHI.54
system and protecting the privacy rights of
4) Ransomware attacks. Cybercriminals may
patients. Some common challenges related to
target healthcare organizations with
data breaches and cybersecurity threats
ransomware, a malicious software
include:
program that encrypts data and demands
1) Insufficient security measures. Healthcare payment for its release. Ransomware
organizations may lack adequate attacks can disrupt healthcare services,
technical, administrative, and physical compromise patient privacy, and result in
safeguards to protect PHI from significant financial losses.55
unauthorized access or disclosure. This 5) Insider threats. Unauthorized access or
can include weak encryption, inadequate disclosure of PHI may be facilitated by
access controls, and outdated software malicious insiders, such as disgruntled
that is vulnerable to attacks.52 employees, or individuals with criminal
2) Human error. Data breaches, which can intentions. These insiders may abuse their
result from unintentional actions by legitimate access to health information
healthcare providers, staff, and other systems to steal or misuse sensitive data.56
insiders, can include accidentally sending
PHI to the wrong recipient, losing

50
See Also: Seh, Adil Hussain, Mohammad Zarour, volume 236 (eHealth Conference, Amsterdam;
Mamdouh Alenezi, Amal Krishna Sarkar, Alka Washington, DC: IOS Press, 2017), 295.
Agrawal, Rajeev Kumar, and Raees Ahmad Khan. 53
Kellie Dell’Oro and Jeremy Smith, “Cyber
‘Healthcare Data Breaches: Insights and Security: The Legal View,” AJP: The Australian
Implications’. Healthcare 8, no. 2 (13 May 2020): Journal of Pharmacy 102, no. 1203 (March 2021):
133. https://doi.org/10.3390/healthcare8020133. 72.
51
Shahidul Islam Khan and Abu Sayed Md. Latiful 54
Ilia Sotnikov, “Simplifying Third-Party Risk
Hoque, “Digital Health Data: A Comprehensive Management,” Risk Management 66, no. 7
Review of Privacy and Security Risks and Some (August 2019): 8.
Recommendations,” Computer Science Journal of 55
Nikki Spence et al., “Ransomware in Healthcare
Moldova 24, no. 2 (2016): 274–75. Facilities: A Harbinger of the Future?,”
52
Farahnaz Sadoughi and Leila Erfannia, “Health Perspectives in Health Information Management
Information System in a Cloud Computing Summer 2018 (2018): 1–2.
Context,” in Health Informatics Meets EHealth: 56
Suhair Alshehri, Sumita Mishra, and Rajendra Raj,
Digital Insight--Information-Driven Health & “Insider Threat Mitigation and Access Control in
Care: Proceedings of the 11th EHealth2017 Healthcare Systems,” May 1, 2013,
Conference, ed. Dieter Hayn and Günter Schreier, https://scholarworks.rit.edu/article/1401.
Studies in Health Technology and Informatics,
[44]
E-ISSN: 2503-0841, P-ISSN: 2356-4512

b. Inadequate Regulatory Frameworks 3) Limited enforcement. Even when robust


privacy laws exist, inadequate
Inadequate regulatory frameworks can pose a
significant challenge to the protection of enforcement, and oversight can
undermine their effectiveness. Regulatory
informational privacy in health care. Laws
agencies may lack the resources,
and regulations governing the collection, use,
expertise, or authority to adequately
disclosure, and protection of PHI may be
monitor compliance, investigate
insufficient or outdated and, therefore,
violations, and impose meaningful
unable to keep pace with the rapid evolution
penalties.59
of ICTs. This can result in gaps and
4) Balancing privacy with other concerns.
inconsistencies in privacy protection, leaving
Regulatory frameworks must strike a
patients’ sensitive health information
balance between protecting informational
vulnerable to unauthorized access or
privacy and promoting other important
misuse.57 Some common issues related to
objectives, such as supporting public
inadequate regulatory frameworks include:
health, research, or innovation.60 This can
1) Outdated legislation. Existing privacy be challenging, particularly in the face of
laws may not address the unique evolving technologies and shifting
challenges posed by new technologies and societal expectations.
emerging practices, such as telemedicine,
c. Data Sharing and Third-Party Access
big data analytics, and AI. This can lead to
as Invasions of Privacy
ambiguities and loopholes in privacy
protection, making it difficult for Data sharing and third-party access present a
healthcare providers, organizations, and significant challenge to the protection of
patients to understand their rights and health information privacy. With the
responsibilities. widespread adoption of ICTs and the
2) Inconsistent regulations. Privacy increased reliance on third-party service
regulations can vary significantly between providers, the risks of unauthorized access
countries and jurisdictions, resulting in a and misuse of PHI have grown. Ensuring that
patchwork of legal frameworks that may data sharing and third-party access are
complicate compliance efforts for properly managed and monitored is crucial
healthcare providers and organizations for maintaining patient trust and upholding
operating across borders.58 This can also the right to informational privacy. Data
create challenges for patients attempting sharing and third-party access in health care
to seek care or access health information can lead to several issues, including
in different jurisdictions. inadequate consent mechanisms,
unauthorized access, secondary use of data,

57
Juanita I. Fernando and Linda L. Dawson, “The 59
“Enforcement of Privacy and Data Protection
Health Information System Security Threat Laws,” accessed June 28, 2023,
Lifecycle: An Informatics Theory,” International https://www.unodc.org/e4j/en/cybercrime/module
Journal of Medical Informatics 78, no. 12 -10/key-issues/enforcement-of-privacy-and-data-
(December 2009): 815–26, protection-laws.html.
https://doi.org/10.1016/j.ijmedinf.2009.08.006. 60
Hyesoo Jeon and Changjun Lee, “Internet of
58
C. Kuner et al., “The Challenge of ‘big Data’ for Things Technology: Balancing Privacy Concerns
Data Protection,” International Data Privacy Law with Convenience,” Telematics and Informatics 70
2, no. 2 (May 1, 2012): 47–49, (May 2022): 101816,
https://doi.org/10.1093/idpl/ips003. https://doi.org/10.1016/j.tele.2022.101816.
[45]
Brawijaya Law Journal 10 Vol 1 (2023): 34-58

and data aggregation, and re-identification.61 ethical dilemmas in big data and AI are as
Inadequate consent mechanisms can result in follows:
patients being insufficiently informed or 1) Informed consent and data ownership.
possessing little control over how their PHI Big data and AI often involve the
is shared or accessed by third parties. collection, analysis, and sharing of large
Unauthorized access to PHI can lead to
amounts of PHI, which can defy
privacy invasion, identity theft, and other traditional notions of informed consent
harm. Moreover, third parties may use PHI and data ownership.62 Ensuring that
for purposes beyond the original intent of its patients maintain control over their data
collection, such as marketing, research, or and understand the potential implications
profiling, raising additional privacy of its use for big data and AI applications
concerns. Combining different data sets and can be complex and challenging.
sources, including PHI datasets, can 2) Bias and discrimination. AI algorithms
potentially lead to the re-identification of can inadvertently perpetuate or exacerbate
individuals even when data has been existing biases present in the data they are
anonymized. Addressing these issues
trained on, leading to unfair, or
requires implementing appropriate consent discriminatory outcomes for certain
mechanisms, ensuring adequate security individuals or groups.63 Addressing these
measures, limiting data access, and biases requires careful consideration of
maintaining transparency, and accountability the data used to train AI models and the
in data-sharing practices. development of strategies to mitigate
d. Ethical Dilemmas in Big Data and potential biases in algorithmic decision-
Artificial Intelligence making.
3) Privacy and de-identification. Big data
There are numerous potential benefits to
and AI can enable the aggregation and
using big data and AI in health care,
including improved diagnostics, analysis of vast amounts of PHI, often
from multiple sources. Therefore,
personalized treatment plans, and enhanced
ensuring the privacy of data and
efficiency. However, these technologies also
preventing the re-identification of
raise several ethical dilemmas related to
individuals can be challenging,
informational privacy and more. Addressing
particularly given the rapidly evolving
these dilemmas is essential for ensuring that
nature of techniques and technologies.64
the adoption of big data and AI aligns with
4) Transparency and explainability. AI
the values of the medical profession and
algorithms can be complex and opaque,
respects patients’ rights. Some of the key
making it difficult for patients, healthcare

61
Michelle M. Mello et al., “Legal Barriers to the 63
Nithesh Naik et al., “Legal and Ethical
Growth of Health Information Exchange-Boulders Consideration in Artificial Intelligence in
or Pebbles?: Legal Barriers to the Growth of HIE,” Healthcare: Who Takes Responsibility?,”
The Milbank Quarterly 96, no. 1 (March 2018): Frontiers in Surgery 9 (March 14, 2022),
110–43, https://doi.org/10.1111/1468- https://doi.org/10.3389/fsurg.2022.862322.
0009.12313. 64
Michael Weinhardt, “Big Data: Some Ethical
62
Constance L. Milton, “The Ethics of Big Data and Concerns for the Social Sciences,” Social Sciences
Nursing Science,” Nursing Science Quarterly 30, 10, no. 2 (January 24, 2021),
no. 4 (October 2017): 300–301, https://doi.org/10.3390/socsci10020036.
https://doi.org/10.1177/0894318417724474.
[46]
E-ISSN: 2503-0841, P-ISSN: 2356-4512

providers, and other stakeholders to intertwine and complement each other,


understand how decisions are being made. enabling a comprehensive approach to
Balancing the need for transparency and privacy protection. The subsequent sections
explainability with the technical provide a detailed exploration of the specific
complexities of AI is an ongoing ethical opportunities present in each domain.
challenge.65
a. Technological Innovations for Privacy
5) Accountability and responsibility. Protection
Determining which party is responsible
for the outcomes of AI-driven decisions in Emerging technological innovations offer
health care can be challenging, promising opportunities to enhance privacy
particularly when multiple stakeholders protection in health care. These technologies
are involved, including developers, can help healthcare organizations and
healthcare providers, and third-party providers address privacy challenges, ensure
vendors. Establishing clear lines of the secure handling of PHI, and maintain
accountability and responsibility is patients’ trust.
essential for ensuring ethical practices and There are several notable technological
maintaining trust in AI systems.66 innovations that can be applied to privacy
protection:
Opportunities for Enhancing 1) Privacy-enhancing technologies, such as
Informational Privacy encryption, anonymization, and
Despite these challenges to informational differential privacy, can be employed to
privacy in health care, there are also various protect PHI and minimize the risks
opportunities for enhancing privacy associated with data sharing, storage, and
protections through the application of analysis.67 These technologies can help
innovative technologies, policies, and healthcare organizations ensure that
practices. By leveraging these opportunities, patient data remains secure and
healthcare organizations, and providers can confidential, even in the face of
strengthen privacy safeguards and better cybersecurity threats.
protect patients’ PHI. The vast opportunities 2) Blockchain technology can be used to
for enhancing privacy protections can be create secure, decentralized, and tamper-
broadly categorized into three domains: proof patient records, ensuring the
technological innovations, legal and integrity, and authenticity of PHI. 68 This
regulatory enhancements, and patient technology can also give patients greater
empowerment strategies. These domains control over their own health information,
as cryptographic keys can be used to grant

65
Clemens Scott Kruse et al., “Challenges and Jordan, Clara Fontaine, and Rachele Hendricks-
Opportunities of Big Data in Health Care: A Sturrup, “Selecting Privacy-Enhancing
Systematic Review,” JMIR Medical Informatics 4, Technologies for Managing Health Data Use,”
no. 4 (November 21, 2016), Frontiers in Public Health 10 (March 16, 2022),
https://doi.org/10.2196/medinform.5359. https://doi.org/10.3389/fpubh.2022.814163.
66
Kruse et al. 68
Priti Tagde et al., “Blockchain and Artificial
67
Shi-Cho Cha et al., “Privacy Enhancing Intelligence Technology in E-Health,”
Technologies in the Internet of Things: Environmental Science and Pollution Research
Perspectives and Challenges,” IEEE Internet of 28, no. 38 (October 2021): 52810–31,
Things Journal 6, no. 2 (April 2019): 2159–87, https://doi.org/10.1007/s11356-021-16223-0.
https://doi.org/10.1109/JIOT.2018.2878658; Sara
[47]
Brawijaya Law Journal 10 Vol 1 (2023): 34-58

or revoke access to one’s personal health of patient data, claims, and transactions
data. without disclosing sensitive information.
3) Secure multi-party computation (SMPC) b. Strengthening Legal and Regulatory
is a cryptographic technique that enables Frameworks
multiple parties to jointly compute a
function on their inputs while keeping Strengthening legal and regulatory
those inputs private.69 In health care, frameworks is crucial for protecting health
SMPC can enable privacy-preserving data information privacy, as these frameworks
analysis, allowing organizations to establish rules and guidelines governing the
collaborate on research or analytics collection, use, and disclosure of PHI. A
projects without directly sharing sensitive robust legal and regulatory framework can
patient data. help ensure that the privacy rights of patients
4) Federated learning is a machine learning are respected and that healthcare
approach that enables AI models to be organizations and providers adhere to best
trained on decentralized data sources practices for handling sensitive health
without sharing the underlying raw data.70 information.
This technology can help protect patient There are several approaches that can be
privacy during the development of AI taken to strengthen legal and regulatory
algorithms and their application to health frameworks:
care. 1) Updating existing legislation:
5) Homomorphic encryption refers to a Policymakers should review and update
cryptographic technique that enables existing privacy laws to address the
computations to be performed on unique challenges posed by new
encrypted data without decrypting it.71 technologies in health care, such as
This technology can enable privacy- telemedicine, big data analytics, and AI.
preserving data processing and analytics, This will help ensure that privacy
ensuring that sensitive patient data protection remains relevant and effective
remains encrypted and protected at all in the face of rapid technological changes.
times. 2) Harmonizing regulations across
6) Zero-knowledge proofs are cryptographic jurisdictions: Privacy regulations can vary
methods that enable one party to prove the significantly between countries and
validity of a statement without revealing jurisdictions, resulting in a patchwork of
any additional information.72 In legal frameworks that can complicate
healthcare settings, this technology can be compliance efforts for healthcare
used to verify the authenticity or veracity providers and organizations operating

69
Aycan Aslan et al., “Can Our Health Data Stay 71
Aslan et al., “Can Our Health Data Stay Private? A
Private? A Review and Future Directions for IS Review and Future Directions for IS Research on
Research on Privacy-Preserving AI in Privacy-Preserving AI in Healthcare”; Jordan,
Healthcare,” in Wirtschaftsinformatik 2022 Fontaine, and Hendricks-Sturrup, “Selecting
Proceedings, 2022, Privacy-Enhancing Technologies for Managing
https://aisel.aisnet.org/wi2022/digital_health/digit Health Data Use.”
72
al_health/8/. Jordan, Fontaine, and Hendricks-Sturrup,
70
Aslan et al.; Jordan, Fontaine, and Hendricks- “Selecting Privacy-Enhancing Technologies for
Sturrup, “Selecting Privacy-Enhancing Managing Health Data Use.”
Technologies for Managing Health Data Use.”
[48]
E-ISSN: 2503-0841, P-ISSN: 2356-4512

across borders.73 Policymakers should c. Promoting Transparency and Patient


seek to harmonize privacy regulations to Empowerment
establish consistent standards and Promoting transparency and patient
streamline compliance. empowerment is essential for protecting
3) Strengthening enforcement and oversight: informational privacy in health care.
Regulatory agencies must be equipped
Ensuring that patients are properly informed
with the necessary resources, expertise, regarding how their PHI is being collected,
and authority to effectively monitor used, and shared can help them make better
compliance with privacy laws, investigate decisions about their care and maintain
violations, and impose meaningful control over their data. To achieve this,
penalties. This will help deter potential healthcare organizations, and providers must
privacy breaches and ensure that prioritize clear communication, user-friendly
organizations and providers take privacy tools, and patient education.
protection seriously. There are several key strategies for
4) Engaging stakeholders in the policy- promoting transparency and patient
making process: Involving healthcare
empowerment:
providers, organizations, technology
developers, patients, and other 1) Clear communication. Healthcare
stakeholders in the development and organizations and providers should
review of privacy regulations can help provide patients with clear, concise, and
ensure that existing frameworks are accessible information about their privacy
responsive to the needs and concerns of all practices, including how PHI is collected,
parties involved. This collaborative used, shared, and protected. This can be
approach can also promote an enhanced achieved through privacy notices, consent
understanding of privacy issues and foster forms, and other communication materials
the sharing of best practices. that are easy to understand and readily
5) Implementing privacy impact assessments accessible to patients.
(PIAs): Requiring healthcare 2) User-friendly tools. Developing user-
organizations and providers to conduct friendly tools and platforms that allow
PIAs can help identify and address patients to access, manage, and control
potential privacy risks associated with their PHI can empower them to take an
new technologies, systems, and active role in managing their health
74
practices. Moreover, PIAs can inform information. This may include features
the development of privacy policies, such as secure patient portals, mobile
procedures, and risk mitigation strategies. applications, and EHR systems that enable
patients to view, download, and transmit
their health data.
3) Patient education. Providing patients with
educational resources, support, and

73
Though the discussion in the cited article is with Subjects,” Seton Hall Law Review 52 (2022):
regard to the US, the problem is universally 1157–82.
applicable. Christopher Cozzens, “The Patchwork 74
David Wright, “The State of the Art in Privacy
Privacy Problem: How the United States’ Privacy Impact Assessment,” Computer Law & Security
Regime Fails to Protect Its Businesses and Data Review 28, no. 1 (February 2012): 54–61,
https://doi.org/10.1016/j.clsr.2011.11.007.
[49]
Brawijaya Law Journal 10 Vol 1 (2023): 34-58

guidance regarding their privacy rights challenges in the context of ICTs,


and options can help them make informed policymakers should consider the following
personal healthcare decisions. This may recommendations:
involve creating informational materials, 1) Update existing legislation: Policymakers
hosting workshops or seminars, or should review and update existing privacy
offering one-on-one support to help laws to address the unique challenges
patients navigate privacy issues. posed by new technologies in health care,
4) Engaging patients in decision-making. such as telemedicine, big data analytics,
Involving patients in the development and and AI. Ensure that privacy protection
implementation of privacy policies, remains relevant and effective in the face
practices, and technologies can help of rapid technological changes.
ensure that their needs, concerns, and 2) Harmonize regulations across
preferences are taken into account. This jurisdictions: Policymakers should work
can lead to better privacy outcomes and toward harmonizing privacy regulations
promote a sense of trust and ownership to create consistent standards and
among patients. streamline compliance, especially for
5) Strengthening trust and accountability. healthcare providers, and organizations
Healthcare organizations and providers operating across borders. This can reduce
should demonstrate their commitment to the complexity of navigating different
protecting patient privacy by being legal frameworks and promote a more
transparent about their privacy practices uniform approach to privacy protection.
and holding themselves accountable for 3) Strengthen enforcement and oversight:
any breaches or violations. This may Policymakers must equip regulatory
involve conducting regular privacy audits, agencies with the necessary resources,
publishing privacy performance reports, expertise, and authority to effectively
and being open about any incidents or monitor compliance with privacy laws,
issues that may arise. investigate violations, and impose
meaningful penalties. Enhancing
enforcement capabilities can deter
Recommendations for Policy and Practice
potential privacy breaches and ensure that
To protect health information privacy and organizations and providers take privacy
address the challenges posed by the protection seriously.
increasing use of ICTs, healthcare 4) Engage stakeholders in the policy-making
organizations, providers, and policymakers process: Involve healthcare providers,
should consider the following organizations, technology developers,
recommendations for policy and practice: patients, and other stakeholders in the
a. Recommendations for Policymakers development and review of privacy
regulations to ensure that these
Policymakers play a critical role in protecting
frameworks are responsive to the needs
health information privacy, as they are
and concerns of all parties involved. This
responsible for developing and implementing
collaborative approach can promote a
the legal and regulatory frameworks that
better understanding of privacy issues and
govern the collection, use, and disclosure of
foster the sharing of best practices.
PHI. To effectively address privacy

[50]
E-ISSN: 2503-0841, P-ISSN: 2356-4512

5) Implement PIAs: Require healthcare systems are built with privacy protection
organizations and providers to conduct in mind.
PIAs to identify and address potential 2) Implement robust security measures:
privacy risks associated with new Develop and maintain strong
technologies, systems, and practices. PIAs cybersecurity measures—including
can inform the development of privacy encryption, access controls, and regular
policies, procedures, and risk mitigation security audits—to protect PHI from
strategies. unauthorized access or misuse. Establish a
6) Promoting international cooperation: culture of security awareness among staff
Collaborating with international partners and provide regular training on privacy
and participating in global forums can and security best practices.
help policymakers share experiences, 3) Communicate privacy practices clearly:
learn from best practices, and develop Provide patients with clear, concise, and
consistent privacy protection standards accessible information about privacy
across borders. This can ultimately practices, including how PHI is collected,
strengthen privacy protections across the used, shared, and protected. Use privacy
global healthcare landscape. notices, consent forms, or other
7) Promote patient education and communication materials that are easy to
empowerment: Support initiatives that understand and readily available to
aim to educate patients about their privacy patients.
rights and choices, helping them make 4) Offer user-friendly tools for patient
informed decisions about their health care. empowerment: Develop and implement
This may involve funding informational user-friendly tools and platforms that
materials, workshops, and seminars, or allow patients to access, manage, and
providing resources for one-on-one control their PHI. This may include secure
support to help patients navigate privacy patient portals, mobile applications, or
issues. EHR systems that provide patients with
the ability to view, download, and
b. Recommendations for Healthcare
transmit their health data.
Providers
5) Engage patients in decision-making:
Healthcare providers play a crucial role in Involve patients in the development and
protecting health information privacy, as implementation of privacy policies,
they are the primary collectors, users, and practices, and technologies to ensure that
custodians of PHI. To effectively address their needs, concerns, and preferences are
privacy challenges in the context of ICT and considered. Encourage patient feedback
maintain the trust of patients, healthcare and input, and strive to create a more
providers should consider the following patient-centered approach to privacy
recommendations: protection.
1) Adopt privacy by design: Integrate privacy 6) Perform PIAs to identify and address
considerations into the design and potential privacy risks associated with
development of health information new technologies, systems, or practices.
systems, applications, and services from Use the insights gained from PIAs to
the outset. Ensure that privacy is a develop privacy policies, procedures, and
fundamental aspect of ICT use and that risk mitigation strategies.
[51]
Brawijaya Law Journal 10 Vol 1 (2023): 34-58

7) Collaborate with other stakeholders: 4) Use privacy-enhancing tools: Take


Foster collaboration among healthcare advantage of user-friendly tools and
organizations, technology developers, and platforms that allow you to access,
other stakeholders to promote best manage, and control your PHI, such as
practices and the development of secure patient portals, mobile
innovative privacy-enhancing solutions. applications, and EHR systems. These
Share experiences, learn from others, and tools can empower you to take an active
work together to improve privacy role in managing your health information.
protection in health care. 5) Practice good digital hygiene: Be
cautious about sharing your PHI online,
c. Recommendations for Individuals
especially on social media platforms, and
Individuals also play a significant role in be vigilant about protecting your digital
protecting their own health information identity. Use strong passwords, enable
privacy. Being proactive, well-informed, and two-factor authentication when available,
aware of one’s privacy rights can help and maintain up-to-date antivirus software
individuals make better decisions about their to safeguard your devices and data.
care and maintain control over their PHI. To 6) Participate in patient advocacy: Get
effectively address privacy challenges in the involved in patient advocacy groups or
context of ICT, individuals should consider initiatives that promote health information
the following recommendations: privacy. Share your experiences and
1) Stay informed about privacy rights: contribute to the development of policies
Educate yourself about your privacy rights and practices that better protect privacy
and the legal protections available in your rights for all patients.
jurisdiction. Familiarize yourself with the 7) Seek support and guidance: If you have
privacy policies and practices of concerns about your privacy rights or
healthcare providers and organizations believe that your PHI has been
you engage with to ensure that you compromised, seek support, and guidance
understand how your PHI is collected, from privacy experts, legal professionals,
used, shared, and protected. or patient advocacy organizations.
2) Engage in open communication with
healthcare providers: Communicate your
IV. Conclusions
privacy concerns, preferences, and
expectations to your healthcare providers. In conclusion, the growing integration of
Make sure that you understand their ICTs into health care has revolutionized how
privacy practices and ask questions if you medical services are delivered, resulting in
require clarification. numerous benefits, such as improved access,
3) Make informed decisions about sharing efficiency, and quality of care. However, this
PHI: Be cautious and thoughtful when rapid adoption of ICTs has also raised
sharing your PHI with healthcare significant concerns regarding the right to
providers, organizations, and third parties. health information privacy. Protecting PHI is
Weigh the potential benefits and risks of crucial for maintaining patients’ trust in
sharing your information and ensure that healthcare providers and ensuring the ethical
you provide informed consent when use of sensitive medical data.
required.

[52]
E-ISSN: 2503-0841, P-ISSN: 2356-4512

This comprehensive analysis explored the American Health Information Management


various aspects of informational privacy in Association (AHIMA). “Privacy and
health care, including the roles of ICTs and Security in Healthcare: A Fresh
legal frameworks, relevant ethical Look,” 2018.
considerations, and the challenges to, and https://www.ahima.org/-
opportunities for protecting privacy. To /media/AHIMA/Files/AHIMA-
safeguard the right to informational privacy, Revised-Privacy-Security-
it is essential for all stakeholders—including Framework-0118.pdf.
policymakers, healthcare providers, and Asia Pacific Economic Cooperation. “APEC
individuals—to take proactive measures and Cross-Border Privacy Rules System.”
collaborate in developing effective solutions. Accessed April 15, 2023.
This includes adopting privacy by design, https://cbprs.blob.core.windows.net/f
implementing robust security measures, iles/CBPR%20Policies,%20Rules%2
strengthening legal and regulatory 0and%20Guidelines%20Revised%2
frameworks, promoting transparency and 0For%20Posting%203-16.pdf.
patient empowerment, and fostering ———, ed. APEC Privacy Framework.
international cooperation. Singapore: APEC Secretariat, 2017.
Aslan, Aycan, Maike Greve, Till Ole
By addressing these challenges and
Diesterhöft, and Lutz M. Kolbe. “Can
leveraging the opportunities emerging in this
Our Health Data Stay Private? A
rapidly evolving landscape, stakeholders can
Review and Future Directions for IS
work together to ensure that the benefits of
Research on Privacy-Preserving AI in
ICT adoption in health care are realized
Healthcare.” In
without compromising the privacy rights of
Wirtschaftsinformatik 2022
patients. This delicate balance is vital for
Proceedings, 2022.
creating more resilient, equitable, and
https://aisel.aisnet.org/wi2022/digital
patient-centered healthcare systems that
_health/digital_health/8/.
respect the dignity and autonomy of all
Atreja, Ashish, Emamuzo Otobo, Karthik
individuals.
Ramireddy, and Allyssa Deorocki.
“Remote Patient Monitoring in IBD:
REFERENCES
Current State and Future Directions.”
African Union. “African Union Convention Current Gastroenterology Reports
on Cyber Security and Personal Data 20, no. 2 (February 2018): 6.
Protection.” African Union, June 27, https://doi.org/10.1007/s11894-018-
2014. 0611-3.
https://au.int/en/treaties/african- Australia. Healthcare Identifiers Act (2010).
union-convention-cyber-security- ———. Privacy Act (1988).
and-personal-data-protection. Awwalu, Jamilu, Ali Garba Garba, Anahita
Alshehri, Suhair, Sumita Mishra, and Ghazvini, and Rose Atuah. “Artificial
Rajendra Raj. “Insider Threat Intelligence in Personalized Medicine
Mitigation and Access Control in Application of AI Algorithms in
Healthcare Systems,” May 1, 2013. Solving Personalized Medicine
https://scholarworks.rit.edu/article/1 Problems.” International Journal of
401. Computer Theory and Engineering 7,
[53]
Brawijaya Law Journal 10 Vol 1 (2023): 34-58

no. 6 (December 2015): 439–43. Yuan. “Advancing Drug Discovery


https://doi.org/10.7763/IJCTE.2015. via Artificial Intelligence.” Trends in
V7.999. Pharmacological Sciences 40, no. 8
Balthazar, Patricia, Peter Harri, Adam Prater, (August 2019): 592–604.
and Nabile M. Safdar. “Protecting https://doi.org/10.1016/j.tips.2019.06
Your Patients’ Interests in the Era of .004.
Big Data, Artificial Intelligence, and CMS.gov. “Electronic Health Records.”
Predictive Analytics.” Journal of the Accessed November 6, 2021.
American College of Radiology 15, https://www.cms.gov/Medicare/E-
no. 3 (March 2018): 580–86. Health/EHealthRecords.
https://doi.org/10.1016/j.jacr.2017.1 Council of Europe. “Convention 108 +:
1.035. Convention for the Protection of
Beauchamp, Tom L., and James F. Childress. Individuals with Regard to the
Principles of Biomedical Ethics. 7th Processing of Personal Data,” 2018.
ed. New York: Oxford University https://rm.coe.int/convention-108-
Press, 2013. convention-for-the-protection-of-
Blightman, K, SE Griffiths, and C Danbury. individuals-with-regar/16808b36f1.
“Patient Confidentiality: When Can a Cozzens, Christopher. “The Patchwork
Breach Be Justified?” Continuing Privacy Problem: How the United
Education in Anaesthesia Critical States’ Privacy Regime Fails to
Care & Pain 14, no. 2 (April 2014): Protect Its Businesses and Data
52–56. Subjects.” Seton Hall Law Review 52
https://doi.org/10.1093/bjaceaccp/mk (2022): 1157–82.
t032. Czuchaj, Dariusz, Marc Elshof, and Anna
Canada. Personal Information Protection and Szczygiel. “Key Challenges of
Electronic Documents Act (2000). Artificial Intelligence: AI Privacy
“CESCR General Comment No. 14: The Concerns and the GDPR.” Business
Right to the Highest Attainable Going Digital (blog), April 2021.
Standard of Health (Art. 12).” Office https://www.businessgoing.digital/ke
of the High Commissioner for Human y-challenges-of-artificial-
Rights, August 1, 2000. intelligence-ai-privacy-concerns-
https://www.refworld.org/pdfid/4538 and-the-gdpr/.
838d0.pdf. DeCew, Judith Wagner. In Pursuit of
Cha, Shi-Cho, Tzu-Yang Hsu, Yang Xiang, Privacy: Law, Ethics, and the Rise of
and Kuo-Hui Yeh. “Privacy Technology. Ithaca: Cornell
Enhancing Technologies in the University Press, 1997.
Internet of Things: Perspectives and Dell’Oro, Kellie, and Jeremy Smith. “Cyber
Challenges.” IEEE Internet of Things Security: The Legal View.” AJP: The
Journal 6, no. 2 (April 2019): 2159– Australian Journal of Pharmacy 102,
87. no. 1203 (March 2021): 72–73.
https://doi.org/10.1109/JIOT.2018.2 Dilmaghani, Saharnaz, Matthias R. Brust,
878658. Gregoire Danoy, Natalia Cassagnes,
Chan, H.C. Stephen, Hanbin Shan, Thamani Johnatan Pecero, and Pascal Bouvry.
Dahoun, Horst Vogel, and Shuguang “Privacy and Security of Big Data in
[54]
E-ISSN: 2503-0841, P-ISSN: 2356-4512

AI Systems: A Research and 2020): 576–83.


Standards Perspective.” In 2019 https://doi.org/10.1089/tmj.2019.006
IEEE International Conference on 6.
Big Data (Big Data), 5737–43. Los Faria, Paula Lobato De, and João Valente
Angeles, CA, USA: IEEE, 2019. Cordeiro. “Health Data Privacy and
https://doi.org/10.1109/BigData4709 Confidentiality Rights: Crisis or
0.2019.9006283. Redemption?” Revista Portuguesa de
Durnell, Eric, Karynna Okabe-Miyamoto, Saúde Pública 32, no. 2 (July 2014):
Ryan T. Howell, and Martin Zizi. 123–33.
“Online Privacy Breaches, Offline https://doi.org/10.1016/j.rpsp.2014.1
Consequences: Construction and 0.001.
Validation of the Concerns with the Fernando, Juanita I., and Linda L. Dawson.
Protection of Informational Privacy “The Health Information System
Scale.” International Journal of Security Threat Lifecycle: An
Human–Computer Interaction 36, Informatics Theory.” International
no. 19 (November 25, 2020): 1834– Journal of Medical Informatics 78,
48. no. 12 (December 2009): 815–26.
https://doi.org/10.1080/10447318.20 https://doi.org/10.1016/j.ijmedinf.20
20.1794626. 09.08.006.
“Enforcement of Privacy and Data Protection Glover, Wiljeana Jackson, Zhi Li, and
Laws.” Accessed June 28, 2023. Dessislava Pachamanova. “The AI-
https://www.unodc.org/e4j/en/cyberc Enhanced Future of Health Care
rime/module-10/key- Administrative Task Management.”
issues/enforcement-of-privacy-and- NEJM Catalyst, March 3, 2022.
data-protection-laws.html. https://catalyst.nejm.org/doi/full/10.1
European Union. General Data Protection 056/CAT.21.0355.
Regulation (2016). Gostin, Lawrence O. “Health Information:
Faden, Ruth R., Nancy E. Kass, Steven N. Reconciling Personal Privacy with
Goodman, Peter Pronovost, Sean the Public Good of Human Health.”
Tunis, and Tom L. Beauchamp. “An Health Care Analysis 9, no. 3
Ethics Framework for a Learning (October 1, 2001): 321–35.
Health Care System: A Departure https://doi.org/10.1023/A:101290593
from Traditional Research Ethics and 2744.
Clinical Ethics.” Hastings Center HealthIT.gov. “What Are the Advantages of
Report 43, no. s1 (January 2013): Electronic Health Records?”
S16–27. Accessed March 24, 2023.
https://doi.org/10.1002/hast.134. https://www.healthit.gov/faq/what-
Farias, Frederico Arriaga Criscuoli de, are-advantages-electronic-health-
Carolina Matté Dagostini, Yan de records.
Assunção Bicca, Vincenzo Fin James, Nivedita. “80+ Healthcare Data
Falavigna, and Asdrubal Falavigna. Breach Statistics 2023.” Astra (blog),
“Remote Patient Monitoring: A April 4, 2023.
Systematic Review.” Telemedicine https://www.getastra.com/blog/secur
and E-Health 26, no. 5 (May 1,
[55]
Brawijaya Law Journal 10 Vol 1 (2023): 34-58

ity-audit/healthcare-data-breach- Kruse, Clemens Scott, and Amanda Beane.


statistics/. “Health Information Technology
Jeon, Hyesoo, and Changjun Lee. “Internet Continues to Show Positive Effect on
of Things Technology: Balancing Medical Outcomes: Systematic
Privacy Concerns with Review.” Journal of Medical Internet
Convenience.” Telematics and Research 20, no. 2 (February 5,
Informatics 70 (May 2022): 101816. 2018).
https://doi.org/10.1016/j.tele.2022.10 https://doi.org/10.2196/jmir.8793.
1816. Kruse, Clemens Scott, Rishi Goswamy,
Jordan, Sara, Clara Fontaine, and Rachele Yesha Raval, and Sarah Marawi.
Hendricks-Sturrup. “Selecting “Challenges and Opportunities of Big
Privacy-Enhancing Technologies for Data in Health Care: A Systematic
Managing Health Data Use.” Review.” JMIR Medical Informatics
Frontiers in Public Health 10 (March 4, no. 4 (November 21, 2016).
16, 2022). https://doi.org/10.2196/medinform.5
https://doi.org/10.3389/fpubh.2022.8 359.
14163. Kruse CS, Mileski M, Vijaykumar AG,
Jotterand, Fabrice, Ryan Spellecy, Mary Viswanathan SV, Suskandla U,
Homan, and Arthur R Derse. Chidambaram Y, “Impact of
“Promoting Equity in Health Care electronic health records on long-
through Human Flourishing, Justice, term care facilities: systematic
and Solidarity.” The Journal of review.” JMIR Med Inform, 2017;e35
Medicine and Philosophy: A Forum Kuner, C., F. H. Cate, C. Millard, and D. J.
for Bioethics and Philosophy of B. Svantesson. “The Challenge of
Medicine 48, no. 1 (February 17, ‘big Data’ for Data Protection.”
2023): 98–109. International Data Privacy Law 2,
https://doi.org/10.1093/jmp/jhac015. no. 2 (May 1, 2012): 47–49.
Khan, Shahidul Islam, and Abu Sayed Md. https://doi.org/10.1093/idpl/ips003.
Latiful Hoque. “Digital Health Data: Law No. 27 of 2022 on Personal Data
A Comprehensive Review of Privacy Protection (2022).
and Security Risks and Some Mair, F. “Systematic Review of Studies of
Recommendations.” Computer Patient Satisfaction with
Science Journal of Moldova 24, no. 2 Telemedicine”. BMJ 320, no. 7248 (3
(2016): 273–92. June 2000): 1517–20.
Kharisma, Dona Budi, and Alvalerie https://doi.org/10.1136/bmj.320.724
Diakanza. “Patient Personal Data 8.1517.
Protection: Comparing the Health- Mechanic, Oren J., Yudy Persaud, and Alexa
Care Regulations in Indonesia, B. Kimball. “Telehealth Systems.” In
Singapore and the European Union.” StatPearls. Treasure Island (FL):
International Journal of Human StatPearls Publishing, 2021.
Rights in Healthcare, September 6, http://www.ncbi.nlm.nih.gov/books/
2022. NBK459384/.
https://doi.org/10.1108/IJHRH-04- Mello, Michelle M., Julia Adler-Milstein,
2022-0035. Karen L. Ding, and Lucia Savage.
[56]
E-ISSN: 2503-0841, P-ISSN: 2356-4512

“Legal Barriers to the Growth of Person-Centred Health Systems, by


Health Information Exchange- Jonathan North, 347–86. edited by
Boulders or Pebbles?: Legal Barriers Ellen Nolte, Sherry Merkur, and
to the Growth of HIE.” The Milbank Anders Anell, 1st ed. Cambridge
Quarterly 96, no. 1 (March 2018): University Press, 2020.
110–43. https://doi.org/10.1017/97811088554
https://doi.org/10.1111/1468- 64.016.
0009.12313. Quach, Sara, Park Thaichon, Kelly D.
Milton, Constance L. “The Ethics of Big Martin, Scott Weaven, and Robert W.
Data and Nursing Science.” Nursing Palmatier. “Digital Technologies:
Science Quarterly 30, no. 4 (October Tensions in Privacy and Data.”
2017): 300–302. Journal of the Academy of Marketing
https://doi.org/10.1177/08943184177 Science 50, no. 6 (November 2022):
24474. 1299–1323.
Naik, Nithesh, B. M. Zeeshan Hameed, https://doi.org/10.1007/s11747-022-
Dasharathraj K. Shetty, Dishant 00845-y.
Swain, Milap Shah, Rahul Paul, Raghupathi, Wullianallur, and Viju
Kaivalya Aggarwal, et al. “Legal and Raghupathi. “Big Data Analytics in
Ethical Consideration in Artificial Healthcare: Promise and Potential.”
Intelligence in Healthcare: Who Health Information Science and
Takes Responsibility?” Frontiers in Systems 2, no. 1 (February 7, 2014):
Surgery 9 (March 14, 2022). 3. https://doi.org/10.1186/2047-
https://doi.org/10.3389/fsurg.2022.8 2501-2-3.
62322. Rowe, Michael. “Information and
National Institute of Standards and Communication Technology in
Technology. “Framework for Health: A Review of the Literature.”
Improving Critical Infrastructure Journal of Clinical and Health
Cybersecurity.” National Institute of Sciences 3, no. 1 (2008): 68–77.
Standards and Technology, February Sadoughi, Farahnaz, and Leila Erfannia.
12, 2014. “Health Information System in a
https://www.nist.gov/system/files/do Cloud Computing Context.” In
cuments/cyberframework/cybersecur Health Informatics Meets EHealth:
ity-framework-021214.pdf. Digital Insight--Information-Driven
Office of the Privacy Commissioner of Health & Care: Proceedings of the
Canada. “Guidelines for Processing 11th EHealth2017 Conference,
Personal Data across Borders,” 2009. edited by Dieter Hayn and Günter
https://www.priv.gc.ca/en/privacy- Schreier, 290–97. Studies in Health
topics/airports-and- Technology and Informatics, volume
borders/gl_dab_090127/. 236. Amsterdam ; Washington, DC:
Palm, Willy, Herman Nys, David Townend, IOS Press, 2017.
David Shaw, Timo Clemens, and Seh, Adil Hussain, Mohammad Zarour,
Helmut Brand. ‘Patients’ Rights: Mamdouh Alenezi, Amal Krishna
From Recognition to Sarkar, Alka Agrawal, Rajeev
Implementation’. In Achieving Kumar, and Raees Ahmad Khan.
[57]
Brawijaya Law Journal 10 Vol 1 (2023): 34-58

‘Healthcare Data Breaches: Insights 20. https://doi.org/10.1016/S0140-


and Implications’. Healthcare 8, no. 6736(17)31857-3.
2 (13 May 2020): 133. Upadhyay, Soumya, and Han-fen Hu. ‘A
https://doi.org/10.3390/healthcare80 Qualitative Analysis of the Impact of
20133. Electronic Health Records (Ehr) on
Solove, Daniel J. Understanding Privacy. Healthcare Quality and Safety:
Cambridge, Mass: Harvard Clinicians’ Lived Experiences’.
University Press, 2008. Health Services Insights 15 (January
Sotnikov, Ilia. “Simplifying Third-Party Risk 2022): 117863292110707.
Management.” Risk Management 66, https://doi.org/10.1177/11786329211
no. 7 (August 2019): 8–9. 070722.
Spence, Nikki, Niharika Bhardwaj, David P United Nations. International Covenant on
Paul, and Alberto Coustasse. Civil and Political Rights (1966).
“Ransomware in Healthcare ———. Universal Declaration of Human
Facilities: A Harbinger of the Rights (1948).
Future?” Perspectives in Health https://www.un.org/en/about-
Information Management Summer us/universal-declaration-of-human-
2018 (2018): 1–22. rights.
Tagde, Priti, Sandeep Tagde, Tanima USA. Health Insurance Portability and
Bhattacharya, Pooja Tagde, Hitesh Accountability Act (1996).
Chopra, Rokeya Akter, Deepak Weinhardt, Michael. “Big Data: Some
Kaushik, and Md. Habibur Rahman. Ethical Concerns for the Social
“Blockchain and Artificial Sciences.” Social Sciences 10, no. 2
Intelligence Technology in E- (January 24, 2021).
Health.” Environmental Science and https://doi.org/10.3390/socsci100200
Pollution Research 28, no. 38 36.
(October 2021): 52810–31. WHO Group Consultation on Health
https://doi.org/10.1007/s11356-021- Telematics. “A Health Telematics
16223-0 Policy in Support of WHO’s Health-
Tauber, Alfred I. Patient Autonomy and the For-All Strategy for Global Health
Ethics of Responsibility. Basic Development: Report of the WHO
Bioethics. Cambridge, Mass: MIT Group Consultation on Health
Press, 2005. Telematics.” World Health
https://archive.org/details/patientauto Organization (Geneva, Switzerland),
nomye0000taub. 1997.
UK. Data Protection Act (2018). https://apps.who.int/iris/handle/1066
https://www.legislation.gov.uk/ukpg 5/63857.
a/2018/12/contents. Wright, David. “The State of the Art in
Ullman, Thomas A, and Ashish Atreja. Privacy Impact Assessment.”
“Building Evidence for Care beyond Computer Law & Security Review 28,
the Medical Centre.” The Lancet 390, no. 1 (February 2012): 54–61.
no. 10098 (September 2017): 919– https://doi.org/10.1016/j.clsr.2011.11
.007.

[58]

You might also like