IEEE Technology and Society Magazine - Summer 2014 - 37
acquired through a sensing device (e.g., pacemaker).
Common experience has shown that sharing perThe data is useful when it exists in a permissible medsonal data over networks, for instance when we search
ical context, such as in a feedback loop to control and
a website, apply for credit, or make purchases, often
maintain stasis (e.g., glucose levels), or to diagnose
leads to commercial and government intrusion. Govwhen a medical event occurs (e.g., fibrillation). Mediernment listens in, ostensibly for security reasons, and
cal data at the patient level also includes transmission
businesses find ways to commoditize our information
protocols, such as device addresses, packet control
for advertising and product solicitation. In other cases,
data, hash codes, and encryption keys. Medical data
personal identity information is hacked for amassing
will be accumulated in knowledge bases and used
non-publically available information, creating fake
by inference engines to form the basis
IDs, passports, and fraudulently accessof medical information, which is typiing bank accounts.
"Electronic
cally embodied in a patient record. The
The Medical Device Security Cenmedicine" will ter, a partnership among several highly
data and information may be parsed, so it
exists in various places, usually as paperrespected institutions, has as its mission the
raise privacy
based or electronic charts, so that doctors
balancing of security, privacy, safety, and
and security
can have access. Charts authored by doceffectiveness for next-generation medical
issues that will healthcare devices. In one study they easily
tors are considered medico-legal records,
make present
and in the u.S., through convention and
purchased a used transmit/receiver online,
law, are typically "owned" by the doctor.
and gained access to a heart defibrillator/
day concerns
The difference between medical data and
pacemaker, following which they accessed
for medical
medical information is more than semanmedical telemetry data: patient name, diagrecords
tic. Although valid arguments might be
nosis, and successfully reprogramed, shut
privacy seem
made as to the right of a patient to own
down, depleted its battery, and delivered
his or her medical record, our attention
potentially fatal jolts of electricity. In 2011
benign by
is drawn to medical data, because it fura researcher told a Black Hat 2011 audicomparison.
ther differentiates itself on the basis of 1)
ence that vulnerabilities with implanted
the potential for non-medical uses, 2) the
insulin pumps worn by diabetics allowed
seriousness of harm that may occur in its misuse, and
hackers to remotely control dosage rates. As in-the-body
3) the lack of present day protection for its privacy
devices proliferate matters can only worsen. unlike
and security.
hacking financial or medical records, where the losses
Two primary concepts in medical ethics relate
are ultimately economic or privacy, these crimes conto autonomy and non-maleficence. Autonomy
stitute an assault, not merely affecting a specific victim,
deals with the natural rights of individuals to selfbut an entire class within a population.
determination and by extension the ability to make
Little doubt exists that the future practice of mediinformed decisions. The concept of non-maleficence
cine for cure, palliation and human enhancement will
is rooted in the dictum, "first, do no harm." These
be moved by computers integrally connected to the
principles serve in part as the predicate for the jurbody. The only way to protect our well-being is absoisprudential right to privacy and to one's liberty
lute, patient owned medical data.
interest (i.e., to be free from harm, to be let alone.)
Personal ownership, which is complete interest and
Author Information
title to medical data and the power to enforce those
Joe Carvalko is Adjunct Professor of Law at Quinnirights, better assures that the data will be used for
piac university, School of Law, Hamden, CT. Email:
its intended purpose.
carvalko@sbcglobal.net.
IEEE TECHNOLOGY AND SOCIETY MAGAZINE
|
SuMMEr 2014
|
37
Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - Summer 2014
IEEE Technology and Society Magazine - Summer 2014 - Cover1
IEEE Technology and Society Magazine - Summer 2014 - Cover2
IEEE Technology and Society Magazine - Summer 2014 - 1
IEEE Technology and Society Magazine - Summer 2014 - 2
IEEE Technology and Society Magazine - Summer 2014 - 3
IEEE Technology and Society Magazine - Summer 2014 - 4
IEEE Technology and Society Magazine - Summer 2014 - 5
IEEE Technology and Society Magazine - Summer 2014 - 6
IEEE Technology and Society Magazine - Summer 2014 - 7
IEEE Technology and Society Magazine - Summer 2014 - 8
IEEE Technology and Society Magazine - Summer 2014 - 9
IEEE Technology and Society Magazine - Summer 2014 - 10
IEEE Technology and Society Magazine - Summer 2014 - 11
IEEE Technology and Society Magazine - Summer 2014 - 12
IEEE Technology and Society Magazine - Summer 2014 - 13
IEEE Technology and Society Magazine - Summer 2014 - 14
IEEE Technology and Society Magazine - Summer 2014 - 15
IEEE Technology and Society Magazine - Summer 2014 - 16
IEEE Technology and Society Magazine - Summer 2014 - 17
IEEE Technology and Society Magazine - Summer 2014 - 18
IEEE Technology and Society Magazine - Summer 2014 - 19
IEEE Technology and Society Magazine - Summer 2014 - 20
IEEE Technology and Society Magazine - Summer 2014 - 21
IEEE Technology and Society Magazine - Summer 2014 - 22
IEEE Technology and Society Magazine - Summer 2014 - 23
IEEE Technology and Society Magazine - Summer 2014 - 24
IEEE Technology and Society Magazine - Summer 2014 - 25
IEEE Technology and Society Magazine - Summer 2014 - 26
IEEE Technology and Society Magazine - Summer 2014 - 27
IEEE Technology and Society Magazine - Summer 2014 - 28
IEEE Technology and Society Magazine - Summer 2014 - 29
IEEE Technology and Society Magazine - Summer 2014 - 30
IEEE Technology and Society Magazine - Summer 2014 - 31
IEEE Technology and Society Magazine - Summer 2014 - 32
IEEE Technology and Society Magazine - Summer 2014 - 33
IEEE Technology and Society Magazine - Summer 2014 - 34
IEEE Technology and Society Magazine - Summer 2014 - 35
IEEE Technology and Society Magazine - Summer 2014 - 36
IEEE Technology and Society Magazine - Summer 2014 - 37
IEEE Technology and Society Magazine - Summer 2014 - 38
IEEE Technology and Society Magazine - Summer 2014 - 39
IEEE Technology and Society Magazine - Summer 2014 - 40
IEEE Technology and Society Magazine - Summer 2014 - 41
IEEE Technology and Society Magazine - Summer 2014 - 42
IEEE Technology and Society Magazine - Summer 2014 - 43
IEEE Technology and Society Magazine - Summer 2014 - 44
IEEE Technology and Society Magazine - Summer 2014 - 45
IEEE Technology and Society Magazine - Summer 2014 - 46
IEEE Technology and Society Magazine - Summer 2014 - 47
IEEE Technology and Society Magazine - Summer 2014 - 48
IEEE Technology and Society Magazine - Summer 2014 - 49
IEEE Technology and Society Magazine - Summer 2014 - 50
IEEE Technology and Society Magazine - Summer 2014 - 51
IEEE Technology and Society Magazine - Summer 2014 - 52
IEEE Technology and Society Magazine - Summer 2014 - 53
IEEE Technology and Society Magazine - Summer 2014 - 54
IEEE Technology and Society Magazine - Summer 2014 - 55
IEEE Technology and Society Magazine - Summer 2014 - 56
IEEE Technology and Society Magazine - Summer 2014 - 57
IEEE Technology and Society Magazine - Summer 2014 - 58
IEEE Technology and Society Magazine - Summer 2014 - 59
IEEE Technology and Society Magazine - Summer 2014 - 60
IEEE Technology and Society Magazine - Summer 2014 - 61
IEEE Technology and Society Magazine - Summer 2014 - 62
IEEE Technology and Society Magazine - Summer 2014 - 63
IEEE Technology and Society Magazine - Summer 2014 - 64
IEEE Technology and Society Magazine - Summer 2014 - 65
IEEE Technology and Society Magazine - Summer 2014 - 66
IEEE Technology and Society Magazine - Summer 2014 - 67
IEEE Technology and Society Magazine - Summer 2014 - 68
IEEE Technology and Society Magazine - Summer 2014 - 69
IEEE Technology and Society Magazine - Summer 2014 - 70
IEEE Technology and Society Magazine - Summer 2014 - 71
IEEE Technology and Society Magazine - Summer 2014 - 72
IEEE Technology and Society Magazine - Summer 2014 - 73
IEEE Technology and Society Magazine - Summer 2014 - 74
IEEE Technology and Society Magazine - Summer 2014 - 75
IEEE Technology and Society Magazine - Summer 2014 - 76
IEEE Technology and Society Magazine - Summer 2014 - 77
IEEE Technology and Society Magazine - Summer 2014 - 78
IEEE Technology and Society Magazine - Summer 2014 - 79
IEEE Technology and Society Magazine - Summer 2014 - 80
IEEE Technology and Society Magazine - Summer 2014 - Cover3
IEEE Technology and Society Magazine - Summer 2014 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com