| Literature DB >> 36011136 |
Abstract
Heath code apps, along with robust testing, isolation, and the care of cases, are a vital strategy for containing the spread of the COVID-19 outbreak in China. They have remained stable and consistent, allowing China to extensively restore its social and economic development. However, the ethical and legal boundaries of deploying health code apps for disease surveillance and control purposes are unclear, and a rapidly evolving debate has emerged around the promises and risks of their fast promotion. The article outlines the legal challenges by applying the core values of the Personal Information Protection Law (PIPL), the fundamental law for personal information protection in China, into the context of the nationwide use of health code apps. It elaborates on the balance between the demands for upholding individuals' rights to the security of their personal information and those for public access to such information to prevent the spread of infectious diseases. It identifies the current gaps in addressing personal information harms during the use of the apps, particularly with regard to user consent, transparency, necessity, storage duration, and security safeguards.Entities:
Keywords: COVID-19; contact tracing; data protection; ethics; health code apps; personal information; personal information protection law; privacy
Year: 2022 PMID: 36011136 PMCID: PMC9408613 DOI: 10.3390/healthcare10081479
Source DB: PubMed Journal: Healthcare (Basel) ISSN: 2227-9032
Figure 1The number of provincial governments adopting health code apps.
Data that might be collected for generating a personal health code.
| No. | Data Type | Illustrations |
|---|---|---|
| 1 | data of confirmed and suspected cases | name, age, and body temperature |
| 2 | data of close contacts | name, place of residence, and travel history |
| 3 | medical testing data | nucleic acid test results and antibody test results |
| 4 | data from fever clinic | name, body temperature, and time of fever onset |
| 5 | location tracking data | location information archived by the telecom operators |
| 6 | transportation information | train/flight/bus number, transfer time, and boarding and alighting time |
| 7 | information on immigration | arrival time, port of entry, and flight information |
| 8 | customs inspection data | item name, entry time, and test results |
| 9 | community data | place name, community name, and risk level |
| 10 | information recorded by the community | residence information, family member information, and residents’ travel information recorded by the community council |
| 11 | personal information collected in the public places | body temperature information and access records reported by each public place |
| 12 | information filled in by the users themselves | user-reported personal health data and brief medical history |
| 13 | other data | other data related to the epidemic prevention |
Figure 2Categories of information required for generating a personal health code.
Figure 3Hangzhou Health Code operation system.
Figure 4Public evaluation of health code apps (5-point scale).
Key principles and illustrations of the PIPL.
| Principle | Illustrations |
|---|---|
| Lawfulness | Personal information must be processed per the principles of lawfulness, legitimacy, necessity, and good faith, and not in any manner that is misleading, fraudulent, or coercive. |
| Purpose specification | Personal information must be processed for a clear and reasonable purpose that is directly related to the processing purpose and in a manner that has the most negligible impact on persons’ rights and interests. |
| Data minimization | Scope limitation: the collection of personal information shall be limited to the minimum scope necessary for the processing purpose and shall not be excessive. |
| Transparency | Personal information shall be processed under the principles of openness and transparency, with the rules of processing of personal information disclosed and the purposes, methods, and scope of processing expressly stated. |
| Accuracy | The quality of personal information shall be guaranteed in processing the personal information to avoid adverse impacts on the rights and interests of individuals due to inaccuracy or incompleteness of the personal information. |
| Accountability | Personal information processors must be accountable for their personal information processing operations |
| Data security | Personal information processors must take necessary measures (such as encryption and de-identification) to ensure the security of the personal information processed. |