medical

Why Trust Versus Security and Privacy, Is Holding Back Innovation with Medical Data

Innovation and Medical Data

As healthcare organizations continue to sift through attempt to maximize the potential of the massive collections of health data, trust has become the polarizing topic. Understanding how professionals in the supply chain (doctors, hospitals, insurers) collect, use and disclose health data on an everyday basis, and the potential opportunities to revolutionize healthcare are among the first steps to making the large data sets usable and fostering trust.

Often security and privacy are cited as barriers to using data, but really what regulators and end users are worried about is misuse and abuse of data. It's not to say security and privacy are not important, but there is an overarching issue of trust that is not adequately addressed. Thought about differently, you can have security and privacy, but these don't mean as much without building a trusted ecosystem.

How do you build and maintain trust in the world of digital healthcare? And how do you do this in a world where conducting data analysis on large sets of data is crucial to not only revolutionizing healthcare but saving lives? For example, the ability to analyze datasets of pacemakers will have lifesaving capabilities if we can better understand how and why they might malfunction.

What instills trust in humans is not always easy to define. I see trust as the intersection of three components: (1) transparency in provider practices, (2) meaningful engagement with customers, and (3) ethics, that is, focusing on doing the right thing. As it relates to the first component, many organizations are starting to maintain a trust section of their website where they seek to offer greater transparency to customers about their practices. Often visitors will find explanations of how the organization uses data, they share it with, and a code of principles that guide their uses of data on the trust section of the organization's website which ties into the second component. Trust forms the foundation for effective communication and customer retention and is maintained by small actions over time. It is not so much a matter of technique as it is a reflection of character. Organizations that seek to do business in a truthful, straightforward and authentic way, as opposed to a slick website and expertly-crafted communications that are deceptive, will win over customer trust which is really the essence of the third component of trust.

Further complicating matters in the realm of healthcare, trust has been significantly undermined by imperfect security and privacy measures. Most consumers have lived through a major healthcare data breach and, moreover, many are used to being asked to sign privacy notices often at the time of requiring medical treatment. Not only are patients often incapable of identifying when these notices may mislead them on the uses of their data, they are in no position to dispute the terms of such a notice when it is a pre-condition of receiving medical care. Consumer confidence in the healthcare is at a low given the failure of most healthcare organizations to maintain a semblance of basic trust as it relates to the three pillars described above.

However, the opportunity remains for the industry to galvanize and bring about a new code of trust. A code that, beyond regulatory measures, provides a consistent set of provider practices on how medical data can be used and what anonymization techniques should be applied. Such a code should be built with consumer-digestible explanations and be accompanied by a code of ethics that should span all parts of the supply chain ranging from insurers to hospitals to those that seek to build new services based on medical data. Trust is the cornerstone, the foundation, for everything that an organization or an industry wants to become in the future. My advice to the healthcare industry: take time to lay the groundwork well!

By Evelyn de Souza

Evelyn de Souza

Evelyn de Souza focuses on developing industry blueprints that accelerate secure cloud adoption for business as well as everyday living. She currently serves as the Chair of the newly formed Cloud Security Alliance (CSA) data governance and privacy working group. Evelyn was named to CloudNOW's Top 10 Women in Cloud Computing for 2014 and SVBJ’s 100 Women of Influence for 2015. Evelyn is the co-creator of Cloud Data Protection Cert, the industry's first blueprint for making data protection "business-consumable” and is currently working on a data protection heatmap that attempts to streamline the data privacy landscape.

CONTRIBUTORS

Five Ways CPQ Is Revolutionizing Selling Today

Five Ways CPQ Is Revolutionizing Selling Today

CPQ Is Revolutionizing Selling Configure-Price-Quote (CPQ) continues to be one of the hottest enterprise apps today, fueled by the relentless ...
Part 1 - How Cloud Apps Are Making Businesses More (and Less) Secure

Part 1 – How Cloud Apps Are Making Businesses More (and Less) Secure

Cloud Apps Security Today, more than ever before, employees are working while on-the-go. The ease with which a worker can ...
The Security of Cloud-Based Software and Client Communication

The Security of Cloud-Based Software and Client Communication

Cloud-Based Software Security The fear of not having a secure cloud-based software should far outweigh the fear of switching to a ...
The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a ...
Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Multi-Instance vs. Multi-Tenant Architecture  The cloud is part of everything we do. It’s always there backing up our data, pictures, ...
How Blockchain has Unexpectedly Improved Big Data Integrity

How Blockchain has Unexpectedly Improved Big Data Integrity

Big Data Integrity Blockchain technology was developed to improve the integrity of bitcoin. However, as bitcoin became more popular, its ...
WordPress Security 101 – Protecting Against Insider Threats

WordPress Security 101 – Protecting Against Insider Threats

Protecting Against Insider Threats Continued from part 1 of our 5 part Wordpress security series. A recent Breach Level Index report by ...
The Drone Explosion

The Drone Explosion Continues To Provide Unique Options

The Drone Explosion One of the things I have posted about often here on CloudTweaks is the ever growing world ...
Learning to Code is as Useful as Learning Ancient Greek

Learning to Code is as Useful as Learning Ancient Greek

Your children will be left behind if they don’t learn to code. Really? What if coding as we know it ...
How to Build a Top Level Data Science Team

How to Build a Top Level Data Science Team

Data Science Team Businesses today need to do more than merely acknowledge big data. They need to embrace data and ...

NEWS

Red Hat global survey finds field services operations bullish on emerging technologies

Red Hat global survey finds field services operations bullish on emerging technologies

Bullish Emerging Technologies For many industries, from transportation to utilities, manufacturing and more, field workers are pivotal to the success ...
IBM shares rise after Barclays double upgrade

IBM shares rise after Barclays double upgrade

(Reuters) - Shares in International Business Machines rose nearly 2 percent on Wednesday, helped by a double-notch upgrade for the ...
Cogeco Peer 1 Adds Managed Microsoft Azure Services to Cloud Portfolio

Cogeco Peer 1 Adds Managed Microsoft Azure Services to Cloud Portfolio

Cogeco Peer 1 Adds Managed Microsoft Azure Services Flexible services optimize customer's Azure investments, handle the day-to-day management of the ...