Skip to main content
Erschienen in: Health Care Analysis 2/2015

01.06.2015 | Original Article

Privacy by Design in Personal Health Monitoring

verfasst von: Anders Nordgren

Erschienen in: Health Care Analysis | Ausgabe 2/2015

Einloggen, um Zugang zu erhalten

Abstract

The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted.
Literatur
1.
Zurück zum Zitat Cavoukian, A., Fisher, A., Killen, S., & Hoffman, D. (2010). Remote home health care technologies: How to ensure privacy? Build it in: Privacy by design. Identity in the Information Society, 3(2), 363–378.CrossRef Cavoukian, A., Fisher, A., Killen, S., & Hoffman, D. (2010). Remote home health care technologies: How to ensure privacy? Build it in: Privacy by design. Identity in the Information Society, 3(2), 363–378.CrossRef
2.
Zurück zum Zitat Dix, A. (2010). Built-in privacy–no panacea, but a necessary condition for effective privacy protection. Identity in the Information Society, 3(2), 257–265.CrossRef Dix, A. (2010). Built-in privacy–no panacea, but a necessary condition for effective privacy protection. Identity in the Information Society, 3(2), 257–265.CrossRef
3.
Zurück zum Zitat Essén, A. (2008). The two facets of electronic care surveillance: An exploration of the views of older people who live with monitoring devices. Social Science and Medicine, 67(1), 128–136.CrossRefPubMed Essén, A. (2008). The two facets of electronic care surveillance: An exploration of the views of older people who live with monitoring devices. Social Science and Medicine, 67(1), 128–136.CrossRefPubMed
4.
Zurück zum Zitat European Commission. (2012). Proposal for a regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). Brussels. European Commission. (2012). Proposal for a regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). Brussels.
5.
Zurück zum Zitat Finkelstein, S., Speedie, S., & Potthoff, S. (2006). Home telehealth improves clinical outcomes at lower cost for home healthcare. Telemedicine and e-Health, 12(2), 128–136.CrossRefPubMed Finkelstein, S., Speedie, S., & Potthoff, S. (2006). Home telehealth improves clinical outcomes at lower cost for home healthcare. Telemedicine and e-Health, 12(2), 128–136.CrossRefPubMed
7.
Zurück zum Zitat Moor, J. H. (1997). Towards a theory of privacy in the information age. ACM SIGCAS Computers and Society, 27, 27–32.CrossRef Moor, J. H. (1997). Towards a theory of privacy in the information age. ACM SIGCAS Computers and Society, 27, 27–32.CrossRef
8.
Zurück zum Zitat Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119–158. Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119–158.
9.
Zurück zum Zitat Noel, H. C., Vogel, D. C., Erdos, J. J., Cornwall, D., & Levin, F. (2004). Home telehealth reduces healthcare costs. Telemedicine Journal and e-Health, 10(2), 170–183.CrossRefPubMed Noel, H. C., Vogel, D. C., Erdos, J. J., Cornwall, D., & Levin, F. (2004). Home telehealth reduces healthcare costs. Telemedicine Journal and e-Health, 10(2), 170–183.CrossRefPubMed
10.
Zurück zum Zitat Nordgren, A. (2012). Remote monitoring or close encounters? Ethical considerations in priority setting regarding telecare. Health Care Analysis. (advance publication online). doi:10.1007/s10728-012-0218-z. Nordgren, A. (2012). Remote monitoring or close encounters? Ethical considerations in priority setting regarding telecare. Health Care Analysis. (advance publication online). doi:10.​1007/​s10728-012-0218-z.
12.
Zurück zum Zitat Pagallo, U. (2011). Designing data protection safeguards ethically. Information, 2, 247–265.CrossRef Pagallo, U. (2011). Designing data protection safeguards ethically. Information, 2, 247–265.CrossRef
13.
Zurück zum Zitat Pagallo, U. (2012). On the principle of privacy by design and its limits: Technology, ethics and the rule of law. In S. Gutwirth, R. Leenes, P. De Hert, & Y. Poullet (Eds.), European data protection: In good health? (pp. 331–346). Heidelberg: Springer.CrossRef Pagallo, U. (2012). On the principle of privacy by design and its limits: Technology, ethics and the rule of law. In S. Gutwirth, R. Leenes, P. De Hert, & Y. Poullet (Eds.), European data protection: In good health? (pp. 331–346). Heidelberg: Springer.CrossRef
14.
Zurück zum Zitat Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4, 323–333. Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4, 323–333.
15.
Zurück zum Zitat Rössler, B. (2005). The value of privacy. Cambridge: Polity Press. Rössler, B. (2005). The value of privacy. Cambridge: Polity Press.
16.
Zurück zum Zitat Schaar, P. (2010). Privacy by design. Identity in the Information Society, 3(2), 267–274.CrossRef Schaar, P. (2010). Privacy by design. Identity in the Information Society, 3(2), 267–274.CrossRef
17.
Zurück zum Zitat Solove, D. J. (2002). Conceptualizing privacy. California Law Review, 90, 1087–1155.CrossRef Solove, D. J. (2002). Conceptualizing privacy. California Law Review, 90, 1087–1155.CrossRef
18.
Zurück zum Zitat Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1–22.CrossRef Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1–22.CrossRef
19.
Zurück zum Zitat Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5, 199–210.CrossRef Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5, 199–210.CrossRef
20.
Zurück zum Zitat Yeung, K. (2007). Towards an understanding of regulation by design. In R. Brownsword & K. Yeung (Eds.), Regulating technologies: Legal futures, regulatory frames and technological fixes (pp. 79–108). London: Hart Publishing. Yeung, K. (2007). Towards an understanding of regulation by design. In R. Brownsword & K. Yeung (Eds.), Regulating technologies: Legal futures, regulatory frames and technological fixes (pp. 79–108). London: Hart Publishing.
Metadaten
Titel
Privacy by Design in Personal Health Monitoring
verfasst von
Anders Nordgren
Publikationsdatum
01.06.2015
Verlag
Springer US
Erschienen in
Health Care Analysis / Ausgabe 2/2015
Print ISSN: 1065-3058
Elektronische ISSN: 1573-3394
DOI
https://doi.org/10.1007/s10728-013-0262-3

Weitere Artikel der Ausgabe 2/2015

Health Care Analysis 2/2015 Zur Ausgabe