Desafios à privacidade dos dados na área da saúde - a interoperabilidade no domínio da segurança
Resumo
As iniciativas de colaboração interorganizacionais promoveram a partilha de dados, quer através de processos de integração, quer de interoperabilidade entre sistemas. Sistemas que inicialmente foram construídos para funcionarem de forma isolada, por diversos fatores evoluem para uma situação em que a sua sobrevivência depende do fator interoperabilidade com outros sistemas, mesmo que tecnologicamente heterogéneos. A área da saúde é um destes exemplos. Quando está em causa a partilha de dados pessoais, a privacidade destes dados é uma questão central, na maioria das vezes desconsiderada face à sua complexidade. Neste sentido, e através de uma investigação qualitativa e interpretativa baseada em estudo de casos, pretendeu-se estudar para o ambiente alargado de partilha de dados na área da saúde, além dos fatores técnicos, que outros fatores têm influência sobre a privacidade dos dados e são interoperáveis. Neste artigo é apresentado o resultado da investigação apenas para um destes fatores - a segurança.
Texto Completo:
PDFReferências
AR. “Lei n.o 67/98 de 26 de Outubro. Lei da Protecção de Dados Pessoais (transpõe para a ordem jurídica portuguesa a Directiva n.o 95/46/CE, do Parlamento Europeu e do Conselho, de 24 de Outubro de 1995)”p. 5536–55461998
Art. 29 WP. “The Future of Privacy. Joint contribution to the Consultation of the European Commission on the legal framework for the fundamental right to protection of personal data. Adopted on 01 December 2009”p. 1–28. [s.l: s.n.]. http://ec.europa.eu/justice/policies/privacy/docs/ .2009
Baird, S. A. “Government Role in Developing an Interoperability Ecosystem.” ICEGOV2007, December 10-13, 2007, Macao, ed., p. 65–68, 2007.
CE. “DIRECTIVA 95/46/CE DO PARLAMENTO EUROPEU E DO CONSELHO de 24 de Outubro de 1995 relativa à protecção das pessoas singulares no que diz respeito ao tratamento de dados pessoais e à livre circulação desses dados.”Jornal Oficial das Comunidades Europeias No L 281/31, http://ec.europa.eu/justice_home/fsj/privacy/law/index_en.htm 1995
Clarke, R. “What’s ‘Privacy’?”http://www.rogerclarke.com/DV/Privacy.html. 2006
CNPD. “Parecer 18/2012.” [s.l: s.n.]. http://www.cnpd.pt .2012
Dutch, M. “A Data Protection Taxonomy”International immunologyv. 25. San Francisco, California: [s.n.]. http://snia.org/sites/default/files/A_Data_Protection_Taxonomy_V51.pdf .2010
ENISA. “Privacy , Accountability and Trust – Challenges and Opportunities.” [s.l: s.n.]. http://www.enisa.europa.eu/activities/identity-and-trust/privacy-and-trust/library/deliverables/pat- study .2011
ENISA. “Study on data collection and storage in the EU.” [s.l: s.n.]. http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/data-collection .2012
Ernst & Young. “Privacy trends 2012. The case for growing accountability.” [s.l: s.n.]. http://www.ey.com/ .2012
Fewell, S. et al. “Evaluation of Organisational Interoperability in a Network Centric Warfare Environment”9th International Command and Control Research and Technology Symposium. Coalition Transformation: An Evolution of People, Processes and Technology to Enhance Interoperability. Topic: Coalition Interoperability. [s.l: s.n.]. 2004
Fugini, M. Mezzanzanica, M. “Development of a Security Methodology for Cooperative Information Systems: the CooPSIS Project.” [s.l: s.n.]. http://is2.lse.ac.uk/asp/aspecis/20030054.pdf .2003
Gottschalk, P. “E-Government Interoperability: Frameworks for Aligned Development.” In: GLOBAL, I. (Ed.). E-Government Interoperability. ed. Norwegian School of Management, Norway: IGI Global, 2009a. p. 23–33.
Gottschalk, P. “Maturity levels for interoperability in digital government.” Government Information Quarterly, ed., p. 75–81v. 26, http://linkinghub.elsevier.com/retrieve/pii/S0740624X08000683 , 2009b.
ICO. “Privacy by design”Meta. Information Commissioner’s Office Wycliffe House, Water Lane Wilmslow, Cheshire SK9 5AF: [s.n.]. http://www.ico.gov.uk/ .2008
Introna, L. D. “Privacy and the computer: why we need privacy in the information society.” Metaphilosophy, ed., p. 259–275v. 28, 1997.
IPC. “The New Federated Privacy Impact Assessment (F-PIA), Building Privacy and Trust-enabled.” [s.l: s.n.]. http://www.ipc.on.ca .2009
ISO/IEC. “ISO/IEC 27000:2009(E) Information technology — Security techniques — Information security management systems — Overview and vocabulary”v. 2009ISO (International Organization for Standardization) and IEC (International Electrotechnical Commission), http://www.iso.org 2009
Jericho Forum. “Principles for Managing Data Privacy:” Position Paper. [s.l: s.n.]. http://www.opengroup.org/getinvolved/forums/jericho .2007
Jóri, A. “Data Protection.” http://www.dataprotection.eu/. 2007
Liberty Alliance. “Privacy and Security Best Practices”p. 0–31 http://www.projectliberty.org/specs/final_privacy_security_best_practices.pdf 2003
Moen, P. et al. “Safeguarding against new privacy threats in inter-enterprise collaboration environments. Technical report, Series of Publications C, Report C-2010-56.” [s.l: s.n.]. http://www.cs.helsinki.fi/group/cinco/publications/public_pdfs/moen10safeguarding.pdf .2010
NETHA. “NEHTA’s Approach to Privacy Version 1.0”v. 77. [s.l: s.n.]. www.nehta.gov.au .2006
NETHA. “HI Service Security and Access Framework Version 1.0 – 13/11/09.” [s.l: s.n.]. www.nehta.gov.au .2009
Otjacques, B. Hitzelberger, P. Feltz, F. “Interoperability of E-Government Information Systems: Issues of Identification and Data Sharing.” Journal of Management Information Systems, ed., p. 29–51v. 23, http://mesharpe.metapress.com/openurl.asp?genre=article&id=doi:10.2753/MIS0742-1222230403 , 2007.
Schneier, B. “Architecture of Privacy.” Security & Privacy, IEEE, ed., p. 88v. 7, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4768664&isnumber=4768640 , 2009.
Soares, D. “Interoperabilidade entre Sistemas de Informação na Administração Pública.” [s.l.] Universidade do Minho, 2009.2009
Solove, D. “Understanding Privacy. The George Washington University Law School; Public Law And Legal Theory Working Paper No. 420; Legal Studies Research Paper No. 420:” LEGAL STUDIES RESEARCH PAPER NO. 420. [s.l: s.n.]. 2008
Tavani, H. T. “Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy.” Metaphilosophy, ed., p. 1–22v. 38, http://doi.wiley.com/10.1111/j.1467-9973.2006.00474.x , 2007.
Vernadat, F. B. “Technical, semantic and organizational issues of enterprise interoperability and networking.” Annual Reviews in Control, ed., p. 139–144v. 34, http://linkinghub.elsevier.com/retrieve/pii/S1367578810000155 , 2010.
Waldo, J. Lin, H. S. Millett, L. I. “Engaging Privacy and Information Technology in a Digital Age: Executive Summary.” Journal of Privacy and Confidentiality, ed., p. 5–18v. 2, http://repository.cmu.edu/jpc/vol2/iss1/ , 2007.
Winters, L. S. Gorman, M. M. Tolk, A. “Next Generation Data Interoperability: It ’ s all About the Metadata.” Fall Simulation Interoperability Workshop. 2006
Wuyts, K. et al. “Linking Privacy Solutions to Developer Goals.” 2009 International Conference on Availability, Reliability and Security, ed., p. 847–852, http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5066575 , 2009.
DOI: http://dx.doi.org/10.18803/capsi.v14.107-121
Apontamentos
- Não há apontamentos.