Barbara Simons, Ph.D.
Chair, U.S. Public Policy Committee of ACM (USACM) 666 Pennsylvania Ave.
Suite 302-B
Washington, DC 20003
202:298-0842
202:547-5482 (fax)
I appreciate the opportunity to appear before you today to discuss the important issue of medical privacy.
INTRODUCTION
I speak today on behalf of the USACM, the U.S. Public Policy Committee of the Association for Computing (ACM). ACM, founded in 1947, is an international non-profit educational and scientific society dedicated to the development and use of information technology, and to addressing the impact information technology has on our lives. ACM's activities include the publication of scholarly journals, the sponsorship of special interest groups (SIGS) in numerous disciplines, and activities that address social issues.
60,000 ACM members reside in the U.S. They are academic, professional scientific, and other developers users of information technology. Many of them have a strong interest in the development of secure and private methods for obtaining, storing, and using medical information. USACM,
which I chair, is particularly concerned with U.S. policy and social issues, including privacy and security. The USACM was created by ACM to promote dialogue on technology policy issues with U.S. policy makers and the general public. We provide a World-Wide-Web site located at http://www.acm.org/usacm/. At the site we make available government documents, reports, policy statements, and links to other science policy resources.
We hope you will consult with independent computer scientists who are respected and knowledgeable researchers in the areas of security, medical databases, and cryptology. USACM would be very pleased to provide the committee with names of suitable experts.
THE NEED FOR IMPROVED PRIVACY AND SECURITY OF MEDICAL DATABASES
Expanded scientific knowledge, especially in fields such as genetics and microbiology, combined with the development of the net and widespread use of computers have increased the need for strong privacy protection for medical records.
We have all heard stories of harassment that has resulted because of the lack of adequate privacy protection of medical records. But the problem can even result in abstention from recommended medical care.
I have a friend who has refused to take a drug prescribed by his therapist, simply because he feared the impact that having this prescription on his record might have on his ability in the future to obtain medical insurance, or even employment. And we can easily imagine situations in which information that a person has been tested for AIDS or even for pregnancy could be used against that person.
Unfortunately, as reported in the public draft of "Options for Promoting Privacy on the National Information Highway," written by the National Information Infrastructure Task Force:
"...medical information is routinely shared with and viewed by third parties who are not involved in patient care .... The American Medical Records Association has identified twelve categories of information seekers outside of the health care industry who have access to health care files, including employers, government agencies, credit bureaus, insurers, educational institutions, and the media." 1U
Technology can be used to prevent unauthorized access to medical information, and standards can be used to drive the development and deployment of that technology. We have included below some security recommendations made in a National Research Council report on health care applications. But there are other issues for which well-reasoned standards could impact technology development in a positive fashion. For example, it could be required that any database that is used to store patient health information have patient identifiers that are easily removed without viewing the unencrypted data. Such a requirement would both increase privacy and facilitate the use of the data for analytical purposes.
We have been asked to comment on data standards, health confidentiality, and medical/clinical coding and classification issues associated with the requirements of the Health Insurance Portability and Accountability Act of 1996. I represent a professional society that is uniquely qualified to comment on the relevant technological aspects of these issues.
Standards
Not all transactions mentioned in Section 1173(a)(2) require the same level of security.
For example, health plan premium payments do not have the same sensitivity as health claim attachments. Nonetheless, any standards should heed the following warning from the NIITF draft policy paper:
"Moreover, owing to the rising demand for access by third parties, coupled with the expense of limiting disclosure to that which is specifically requested by the non-medical user, there appears to be no natural limit to the potential uses of medical-record information for purposes quite different from those for which it was originally collected." 1U
We urge the development of standards under the HIPAA that will be designed with the goal of limiting third party access to medical records for non-medical uses. In a properly designed system limiting disclosure need not create significant added expenses.
Confidentiality
The storage and the transmission of sensitive health care data should be protected by the use of strong encryption.
(For a good general discussion of encryption - which is the scrambling of information to make it unreadable by anyone who does not know the "key" for unscrambling - please see the 1994 ACM study "Codes, Keys and Conflicts: Issues in U.S Crypto Policy" 2U).
We recommend that sensitive health information be provided with significant protection, including encryption, limited access, and rigorous maintenance of audit trails. For less sensitive data efficiency and cost considerations might result in less stringent controls.
Unique Health Identifiers
There are a number of well documents problems with the social security number, including the sharing of a single name and number by multiple individuals. In addition, it is far too easy to obtain a person's SSN and other standard identifying information, such as mother's maiden name. Consequently, the SSN cannot be used as a method for authenticating an individual, as was recently illustrated when the Social Security Administration was forced to remove its on-line system for providing Personal Earnings and Benefit Estimate Statement (PEBES).
The widespread availability of a person's SSN also facilitates cross-correlation of databases. Both because there will be times when authentication will be needed for medical purposes and because of the general insecurity of the social security number, we urge the Secretary to eliminate the social security number as a candidate patient identifier.
We hope that if a different identifier is developed for medical records that precautions will be taken to prevent that identifier from becoming easily available from other sources, as has happened with the social security number. Ideally, the use of any medical identifier should be restricted to medically related purposes only. Whether or not the social security number or some other number is used as a medical identifier, we shall need legislation to prevent database cross-correlation and other abuses of privacy.
SOME MORE DETAILED RECOMMENDATIONS: THE NATIONAL RESEARCH COUNCIL REPORT
The Computer Science and Telecommunications Board of the National Research Council recently issued a report entitled "Protecting Electronic Health Information" 3U. We urge the Committee to support the recommendations of the NRC report, listed below:
Security Practices Recommended for Immediate Implementation
This box summarizes a discussion of practices recommended in Chapter 6 of this report. Readers should read Chapter 6 in full for the complete detail, argumentation, and support for these measures.
Technical Practices and Procedures
Organizational Practices
ACM and PRIVACY
Computer professionals tend to be very sensitive to privacy issues probably because we realize how easy it is to compromise information that is stored in a computer or transmitted over the Internet unless special steps are taken to protect that information. Because of our concern, ACM issued the following statement in 1991:
Whereas the ACM greatly values the right of individual privacy;
Whereas members of the computing profession have a special responsibility to ensure that computing systems do not diminish individual privacy;
Whereas the ACM's Code of Professional Conduct places a responsibility on ACM members to protect individual privacy; and
Whereas the Code of Fair Information Practices places a similar responsibility on data holders to ensure that personal information is accurate, complete, and reliable;
Therefore, be it resolved that:
If a strong proactive privacy protection entity had existed in the United States, we almost certainly would have better privacy protection of medical information, outside the medical-care relationship, as well as inside it.
SUMMARY
The USACM believes that computer related technology could significantly improve the quality and delivery of medical care. We also believe that inadequate or poorly designed standards, regulations, and legislation could have a serious negative impact on the privacy of medical records. Consequently, the USACM strongly supports the goal of the Health Insurance Portability and Accountability Act of 1996 to expand privacy protection for medical databases. We would be very pleased to assist those charged with designing the standards called for in the HIPAA in whatever way we can. In particular, we are prepared to provide a list of recognized computer scientist experts in relevant areas such as medical databases, privacy, and security.
References:
1U Options for Promoting Privacy on the National Information Infrastructure, Draft for Public Comment, Information Policy Committee, National Information Infrastructure Task Force, Washington, D.C., April 1997, p. 15.
2U Codes, Keys and Conflicts: Issues in U.S Crypto Policy, Report of a Special Panel of the ACM U.S. Public Policy Committee, ACM, New York, N.Y., June 1994.
3U Protecting Electronic Health Information; Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure; Computer Science and Telecommunications Board; Commission on Physical Sciences, Mathematics, and Applications; National Research Council; National Academy Press; Washington, D.C., 1997.