| Literature DB >> 25100084 |
Antto Seppälä1, Pirkko Nykänen, Pekka Ruotsalainen.
Abstract
BACKGROUND: Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing.Entities:
Keywords: context information; policy; privacy; trust; ubiquitous health
Year: 2014 PMID: 25100084 PMCID: PMC4114417 DOI: 10.2196/mhealth.3123
Source DB: PubMed Journal: JMIR Mhealth Uhealth ISSN: 2291-5222 Impact factor: 4.773
Figure 1Data continuum and context information.
An example analysis of a user story in chronic disease scenario. User story 2.1: Peter receives a medical device with sensors to manage and care for his disease and automatically measure and monitor his condition. Devices can also automatically inform his doctor about the results and major changes.
| Role | Individual and information controller with rights for privacy, to control processing and secondary use of information. Peter can decide who can access data created by the device. Peter needs privacy policies to control his own personal health system (PHS) use and the information it contains. |
| Activities | Data is created in the sensors and transferred to PHS. |
| Environment | Anywhere. No health care–specific regulations concerning the environment. Information sharing is based on Peter’s known consent and privacy policies. All information created by the certified device is trusted. The device is regulated by specific legislation (eg, the European Union directive on medical devices). In case of a major change in measurement information, regulated health care service will participate and then the environment will be strictly regulated by health care–specific regulations. |
| Information systems | Medical device, Peter’s own PHS and possibly electronic health record system. Sensor and measurement data is stored in PHS and Peter’s health records are in regulated electronic health record system. Peter has total control over his PHS. |
| Stakeholders | Peter, medical device, PHS, and licensed medical professional (doctor) with responsibilities concerning care and patients privacy |
| Services | Certified medical device measuring blood sugar levels |
| Information content | Measurement and monitoring data from sensors and medical device |
| Original context of the information | Information is created by a certified medical device controlled by Peter. The environment does not have any specific domain regulations. Information is in Peter's control and he has full rights for it. Peter's personal context-aware privacy policies are the main source for limitations and constraints on information processing. |
| Requirements for context properties | Peter’s PHS is a trusted information system in his control so it has full processing rights and can activate other services if needed following Peter’s privacy policies. Peter has defined in his policies that different measurement and sensor data is very sensitive and sets limitation for what purpose information can be used. In other cases, PHS cannot grant access to information without Peter’s authorization. Other than regulated health care, services have to share their principles for information processing, security and privacy policies, and for what purpose they want to process the information. |
An example analysis of an activity: data is created in the sensors and transferred to the PHS.
| Privacy challenges and threats [ | Peter’s policies | Required context information for policy 1 |
| Lack of awareness | 1. Peter thinks that this kind of data is highly personal and can only be accessed automatically by a health care professional participating in Peter’s care service. | Situation: activity, processing type, actor, target, information sensitivity, and purpose for processing |
| It is difficult to know how data is used in the future | 2. To use the data, transparency of processing is needed; therefore, the provider has to publish detailed privacy and security policies and allow third-party auditing. | Environment: general privacy and security regulations, location, and society |
| Relationships between systems may be unknown | 3. To prevent secondary use, copying data is not allowed. If copying is required, Peter has to be notified and his known consent is required. | Service: type, role, provider, location, and objective |
| Potential secondary use of information | 4. Health care professionals are not allowed to disclose data without Peter’s known consent. | Individual: role, rights to control information, relation to the activity, confidentiality requirements |
| Users want to control how systems use personal health information | Stakeholder: identity, type, role, purpose, and justification for processing | |
| How to guarantee that data is processed following the legal constraints and according to the individual’s policies | IT system: identity, type, controller |
Figure 2Privacy-related context information components and their properties for ubiquitous health.
Figure 3The use of privacy-related context information in ubiquitous health.