Why Trust Versus Security and Privacy, Is Holding Back Innovation with Medical Data

Innovation and Medical Data

As healthcare organizations continue to sift through attempt to maximize the potential of the massive collections of health data, trust has become the polarizing topic. Understanding how professionals in the supply chain (doctors, hospitals, insurers) collect, use and disclose health data on an everyday basis, and the potential opportunities to revolutionize healthcare are among the first steps to making the large data sets usable and fostering trust.

Often security and privacy are cited as barriers to using data, but really what regulators and end users are worried about is misuse and abuse of data. It’s not to say security and privacy are not important, but there is an overarching issue of trust that is not adequately addressed. Thought about differently, you can have security and privacy, but these don’t mean as much without building a trusted ecosystem.

How do you build and maintain trust in the world of digital healthcare? And how do you do this in a world where conducting data analysis on large sets of data is crucial to not only revolutionizing healthcare but saving lives? For example, the ability to analyze datasets of pacemakers will have lifesaving capabilities if we can better understand how and why they might malfunction.

What instills trust in humans is not always easy to define. I see trust as the intersection of three components: (1) transparency in provider practices, (2) meaningful engagement with customers, and (3) ethics, that is, focusing on doing the right thing. As it relates to the first component, many organizations are starting to maintain a trust section of their website where they seek to offer greater transparency to customers about their practices. Often visitors will find explanations of how the organization uses data, they share it with, and a code of principles that guide their uses of data on the trust section of the organization’s website which ties into the second component. Trust forms the foundation for effective communication and customer retention and is maintained by small actions over time. It is not so much a matter of technique as it is a reflection of character. Organizations that seek to do business in a truthful, straightforward and authentic way, as opposed to a slick website and expertly-crafted communications that are deceptive, will win over customer trust which is really the essence of the third component of trust.

Further complicating matters in the realm of healthcare, trust has been significantly undermined by imperfect security and privacy measures. Most consumers have lived through a major healthcare data breach and, moreover, many are used to being asked to sign privacy notices often at the time of requiring medical treatment. Not only are patients often incapable of identifying when these notices may mislead them on the uses of their data, they are in no position to dispute the terms of such a notice when it is a pre-condition of receiving medical care. Consumer confidence in the healthcare is at a low given the failure of most healthcare organizations to maintain a semblance of basic trust as it relates to the three pillars described above.

However, the opportunity remains for the industry to galvanize and bring about a new code of trust. A code that, beyond regulatory measures, provides a consistent set of provider practices on how medical data can be used and what anonymization techniques should be applied. Such a code should be built with consumer-digestible explanations and be accompanied by a code of ethics that should span all parts of the supply chain ranging from insurers to hospitals to those that seek to build new services based on medical data. Trust is the cornerstone, the foundation, for everything that an organization or an industry wants to become in the future. My advice to the healthcare industry: take time to lay the groundwork well!

By Evelyn de Souza

Get Smarter
Higher Education A big challenge for professionals of all ages is time. Balancing the responsibilities of work and life leave little time for self-improvement in the form of education. But ongoing education is more than ...
Security Breach 10 Useful Cloud Security Tools
Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense of security. Cloud computing has become a business solution for ...
Martin Mendelsohn
The Colonial Pipeline Dilemma The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with ...
Mark Greenlaw
Free Cloud Migrations are Expensive The cloud is becoming the primary place where work gets done. By 2025, Gartner estimates that enterprise spending on public cloud computing will overtake traditional IT hardware. Why? One reason ...
Mark Ardito
OPEX is the new battleground I recently wrote in CloudTweaks about how cloud is forcing CIOs to work more closely with their C-suite colleagues to sell the benefits and its role as a business driver ...
Louis
More CISOs will have to deliver revenue growth to protect their budgets and grow their careers in 2023 and beyond, and a core part of that will be getting multicloud security right. It’s the most common infrastructure strategy for ...
Anita Raj
Coronavirus and Telemedicine Technology COVID-19 has brought the world to a near standstill. From NBA to Met Ball and Coachella, all major events and festivals are canceled. Disneyland is shut and movies are postponed. Flights ...
John Peluso
Save Your Organization on Cloud Costs Organizations of all sizes are currently navigating their plans to avoid the recent surge in cyber-attacks and data breaches and preparing for unforeseen setbacks. Building a sensible backup and ...
It’s Magic
Holiday Access.png
Data Fallout.png
Disaster Plan.png

PLURALSITE

Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization. 

(ISC)²

(ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees.

CYBRARY

CYBRARY Open source Cyber Security learning. The world's largest cyber security community. Cybrary provides free IT training certificates. Courses for beginners, intermediates, and advanced users are available.