Desafios à privacidade dos dados na área da saúde - a interoperabilidade no domínio da segurança

Secundino Lopes, Rui Quaresma

Resumo


As iniciativas de colaboração interorganizacionais promoveram a partilha de dados, quer através de processos de integração, quer de interoperabilidade entre sistemas. Sistemas que inicialmente foram construídos para funcionarem de forma isolada, por diversos fatores evoluem para uma situação em que a sua sobrevivência depende do fator interoperabilidade com outros sistemas, mesmo que tecnologicamente heterogéneos. A área da saúde é um destes exemplos. Quando está em causa a partilha de dados pessoais, a privacidade destes dados é uma questão central, na maioria das vezes desconsiderada face à sua complexidade. Neste sentido, e através de uma investigação qualitativa e interpretativa baseada em estudo de casos, pretendeu-se estudar para o ambiente alargado de partilha de dados na área da saúde, além dos fatores técnicos, que outros fatores têm influência sobre a privacidade dos dados e são interoperáveis. Neste artigo é apresentado o resultado da investigação apenas para um destes fatores - a segurança. 


Texto Completo:

PDF

Referências


AR. “Lei n.o 67/98 de 26 de Outubro. Lei da Protecção de Dados Pessoais (transpõe para a ordem jurídica portuguesa a Directiva n.o 95/46/CE, do Parlamento Europeu e do Conselho, de 24 de Outubro de 1995)”p. 5536–55461998

Art. 29 WP. “The Future of Privacy. Joint contribution to the Consultation of the European Commission on the legal framework for the fundamental right to protection of personal data. Adopted on 01 December 2009”p. 1–28. [s.l: s.n.]. http://ec.europa.eu/justice/policies/privacy/docs/ .2009

Baird, S. A. “Government Role in Developing an Interoperability Ecosystem.” ICEGOV2007, December 10-13, 2007, Macao, ed., p. 65–68, 2007.

CE. “DIRECTIVA 95/46/CE DO PARLAMENTO EUROPEU E DO CONSELHO de 24 de Outubro de 1995 relativa à protecção das pessoas singulares no que diz respeito ao tratamento de dados pessoais e à livre circulação desses dados.”Jornal Oficial das Comunidades Europeias No L 281/31, http://ec.europa.eu/justice_home/fsj/privacy/law/index_en.htm 1995

Clarke, R. “What’s ‘Privacy’?”http://www.rogerclarke.com/DV/Privacy.html. 2006

CNPD. “Parecer 18/2012.” [s.l: s.n.]. http://www.cnpd.pt .2012

Dutch, M. “A Data Protection Taxonomy”International immunologyv. 25. San Francisco, California: [s.n.]. http://snia.org/sites/default/files/A_Data_Protection_Taxonomy_V51.pdf .2010

ENISA. “Privacy , Accountability and Trust – Challenges and Opportunities.” [s.l: s.n.]. http://www.enisa.europa.eu/activities/identity-and-trust/privacy-and-trust/library/deliverables/pat- study .2011

ENISA. “Study on data collection and storage in the EU.” [s.l: s.n.]. http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/data-collection .2012

Ernst & Young. “Privacy trends 2012. The case for growing accountability.” [s.l: s.n.]. http://www.ey.com/ .2012

Fewell, S. et al. “Evaluation of Organisational Interoperability in a Network Centric Warfare Environment”9th International Command and Control Research and Technology Symposium. Coalition Transformation: An Evolution of People, Processes and Technology to Enhance Interoperability. Topic: Coalition Interoperability. [s.l: s.n.]. 2004

Fugini, M. Mezzanzanica, M. “Development of a Security Methodology for Cooperative Information Systems: the CooPSIS Project.” [s.l: s.n.]. http://is2.lse.ac.uk/asp/aspecis/20030054.pdf .2003

Gottschalk, P. “E-Government Interoperability: Frameworks for Aligned Development.” In: GLOBAL, I. (Ed.). E-Government Interoperability. ed. Norwegian School of Management, Norway: IGI Global, 2009a. p. 23–33.

Gottschalk, P. “Maturity levels for interoperability in digital government.” Government Information Quarterly, ed., p. 75–81v. 26, http://linkinghub.elsevier.com/retrieve/pii/S0740624X08000683 , 2009b.

ICO. “Privacy by design”Meta. Information Commissioner’s Office Wycliffe House, Water Lane Wilmslow, Cheshire SK9 5AF: [s.n.]. http://www.ico.gov.uk/ .2008

Introna, L. D. “Privacy and the computer: why we need privacy in the information society.” Metaphilosophy, ed., p. 259–275v. 28, 1997.

IPC. “The New Federated Privacy Impact Assessment (F-PIA), Building Privacy and Trust-enabled.” [s.l: s.n.]. http://www.ipc.on.ca .2009

ISO/IEC. “ISO/IEC 27000:2009(E) Information technology — Security techniques — Information security management systems — Overview and vocabulary”v. 2009ISO (International Organization for Standardization) and IEC (International Electrotechnical Commission), http://www.iso.org 2009

Jericho Forum. “Principles for Managing Data Privacy:” Position Paper. [s.l: s.n.]. http://www.opengroup.org/getinvolved/forums/jericho .2007

Jóri, A. “Data Protection.” http://www.dataprotection.eu/. 2007

Liberty Alliance. “Privacy and Security Best Practices”p. 0–31 http://www.projectliberty.org/specs/final_privacy_security_best_practices.pdf 2003

Moen, P. et al. “Safeguarding against new privacy threats in inter-enterprise collaboration environments. Technical report, Series of Publications C, Report C-2010-56.” [s.l: s.n.]. http://www.cs.helsinki.fi/group/cinco/publications/public_pdfs/moen10safeguarding.pdf .2010

NETHA. “NEHTA’s Approach to Privacy Version 1.0”v. 77. [s.l: s.n.]. www.nehta.gov.au .2006

NETHA. “HI Service Security and Access Framework Version 1.0 – 13/11/09.” [s.l: s.n.]. www.nehta.gov.au .2009

Otjacques, B. Hitzelberger, P. Feltz, F. “Interoperability of E-Government Information Systems: Issues of Identification and Data Sharing.” Journal of Management Information Systems, ed., p. 29–51v. 23, http://mesharpe.metapress.com/openurl.asp?genre=article&id=doi:10.2753/MIS0742-1222230403 , 2007.

Schneier, B. “Architecture of Privacy.” Security & Privacy, IEEE, ed., p. 88v. 7, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4768664&isnumber=4768640 , 2009.

Soares, D. “Interoperabilidade entre Sistemas de Informação na Administração Pública.” [s.l.] Universidade do Minho, 2009.2009

Solove, D. “Understanding Privacy. The George Washington University Law School; Public Law And Legal Theory Working Paper No. 420; Legal Studies Research Paper No. 420:” LEGAL STUDIES RESEARCH PAPER NO. 420. [s.l: s.n.]. 2008

Tavani, H. T. “Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy.” Metaphilosophy, ed., p. 1–22v. 38, http://doi.wiley.com/10.1111/j.1467-9973.2006.00474.x , 2007.

Vernadat, F. B. “Technical, semantic and organizational issues of enterprise interoperability and networking.” Annual Reviews in Control, ed., p. 139–144v. 34, http://linkinghub.elsevier.com/retrieve/pii/S1367578810000155 , 2010.

Waldo, J. Lin, H. S. Millett, L. I. “Engaging Privacy and Information Technology in a Digital Age: Executive Summary.” Journal of Privacy and Confidentiality, ed., p. 5–18v. 2, http://repository.cmu.edu/jpc/vol2/iss1/ , 2007.

Winters, L. S. Gorman, M. M. Tolk, A. “Next Generation Data Interoperability: It ’ s all About the Metadata.” Fall Simulation Interoperability Workshop. 2006

Wuyts, K. et al. “Linking Privacy Solutions to Developer Goals.” 2009 International Conference on Availability, Reliability and Security, ed., p. 847–852, http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5066575 , 2009.




DOI: http://dx.doi.org/10.18803/capsi.v14.107-121

Apontamentos

  • Não há apontamentos.