Beruflich Dokumente
Kultur Dokumente
1AC Trust
Shift to EMRs creates new wave of suspicion over patient
confidentiality- poses unique threat to doctor-patient trust
Healy 09
(Bernadine, M.D., cardiologist, U.S.News & World Report's health editor and author
of the magazine's On Health column, is the former head of the National Institutes of
Health, the American Red Cross, and the College of Medicine and Public Health at
Ohio State University, U.S. News, Electronic Medical Records: Will Your Privacy Be
Safe?, 2009, http://health.usnews.com/health-news/blogs/heart-toheart/2009/02/17/electronic-medical-records-will-your-privacy-be-safe) /jdi-mm
Doctors are supposed to be nosy. It's not just that they examine your naked body inside and out and record all its imperfections.
Physicians are trained to peer into your life , past and present, and ask all sorts of
sensitive, if not uncomfortable, questions. Have you ever used marijuana or cocaine? How about steroids? How many
sexual partners? Ever had a sexually transmitted disease? An abortion? Had sex with the same sex? How much do you smoke or
drink? Have you used Botox or had plastic surgery? Have you been depressed or been treated for mental illness? And how about
assigns billions of dollars to that effort. In light of public sensitivity, this major jump-start for centralized records comes with
breached pledge to keep confidential those urine tests for steroids taken in 2003 has left his career a shambles, and 103 other
players are waiting for their results to be leaked to the press, too. Their past transgressions notwithstanding, more than 1,000
ballplayers consented to these tests back then, with the understanding that results would be anonymous. The findings were to be
destroyed after the league assessed the magnitude of the problem. (In a similar design years ago, anonymous HIV testing studies
helped reveal the size of the AIDS epidemic.) The players' data led to what are now stringent drug testing and penalties, as there
were none at the time. It's easy to translate this situation to a violated personal medical record or, on a larger scale, a research
privacy of medical records in early February that fuels this concern. The IOM started with the premise that protections for electronic
medical records are a must, because the benefit of health IT is so great. The records will speed up access to a patient's health
Keeping medical records private is the lynchpin of the doctorpatient trust relationship- breaches in privacy eviscerates the
relationship, causes patients to avoid the healthcare industry
and kills medical research- guaranteed right to privacy key
Pritts 08
(Joy, JD, National Academy of Sciences, The Importance and Value of Protecting the
Privacy of Health Information: The Roles of the HIPAA Privacy Rule and the Common
public opinions about the privacy of health information reflect in a very real way
the practical importance of privacy to members of the public . They desire
control over and security and confidentiality of their health information. They want
to know who is using their information and why . A significant portion of Americans are concerned enough
about the privacy of their health information that they take matters into their own hands. In response to a recent California
abuse.45 These studies show that protecting the privacy of health information is essential to ensuring that individuals will obtain
quality care. Protecting privacy is also seen by some as enhancing data quality for research and quality improvement initiatives.
its recent decline, and what we can all do to rebuild trust in our profession. Trust is intrinsic to the relationship between citizens around the world and the institutions that serve their
needs: government, education, business, religion, and, most certainly, medicine. Albert Einstein recognized the importance of trust when he said, Every kind of peaceful cooperation
among men is primarily based on mutual trust.1 In our time, trust has been broken, abused, misplaced, and violated. The media have been replete with commentaries, citing stories of
negligence, corruption, and betrayal by individuals and groups in the public and private sectors, from governments to corporations, from educational institutions to the Olympic
Organizing Committee. These all are front-page news. Perhaps the most extreme example is terrorism, in which strangers use acts of violence to shatter trust and splinter society in an
ongoing assault on our shared reverence for human life. Unfortunately, we are not immune in our own sphere of cardiovascular medicine. The physician-investigator conflicts of interest
concerning enrollment of patients in clinical trials, the focus on medical and nursing errors, the high-profile medical malpractice cases, the mandate to control the cost of health care in
ways that may not be aligned with the best interest of the patientall of these undermine trust in our profession. At this time, when more and more public and private institutions have
fallen in public esteem, restoring trust in the healthcare professions will require that we understand the importance of trust and the implications of its absence. Trust is intuitive
confidence and a sense of comfort that comes from the belief that we can rely on an individual or organization to perform competently, responsibly, and in a manner considerate of our
interests.2 It is dynamic, it is fragile, and it is vulnerable. Trust can be damaged, but it can be repaired and restored. It is praised where it is evident and acknowledged in every
profession. Yet it is very difficult to define and quantify. Trust is easier to understand than to measure. For us, trust may be particularly difficult to embrace because it is not a science.
review of the early history of medicine is astonishingly devoid of medical ethics. Even the Codes and Principles of Ethics of the American Medical Association, founded in 1847, required
patients to place total trust in their physicians judgment, to obey promptly, and to entertain a just and enduring sense of value of the services rendered.6 Such a bold assertion of the
authority of the physician and the gratitude of the patient seems unimaginable today. It was not until the early 1920s that role models such as Bostons Richard Cabot linked patientcentered medical ethics with the best that scientific medicine had to offer,6 and Frances Weld Peabody, the first Director of the Thorndike Memorial Laboratory at the Boston City
Hospital, crystallized the ethical obligation of the physician to his patient in his essay The Care of the Patient.7 In one particularly insightful passage, Peabody captures the essence of
the two elements of the physicians ethical obligation: He must know his professional business and he must trouble to know the patient well enough to draw conclusions, jointly with the
The risks from anthropogenic hazards appear at present larger than those from natural ones. Although great progress has been made in reducing the
number of nuclear weapons in the world, humanity is still threatened by the possibility of a global thermonuclear war and a resulting nuclear winter. We
may face even greater risks from emerging technologies.
1AC Privacy
Medical record surveillance causing spikes in privacy concernsexacerbated by EMR shiftMcCann 14
(Erin McCann, Editor at Healthcare It News who covers health privacy issues along with healthcare and ambulatory
problems, Trust Issues Over Health Privacy Persist, Healthcare It News,
http://www.healthcareitnews.com/news/trust-issues-over-health-privacy-persist, 11/5/14)/LGE
Healthcare industry, listen up: You've got a consumer distrust issue on your hands.
After surveying more than 2,000 consumers, ONC officials found that about
three-quarters of them were either very or somewhat concerned over the privacy
and security of their medical records . What's more, 10 percent of respondents
withheld information from their healthcare provider who used an electronic health
record. (This compared to the 6 percent who withheld data from providers who used paper medical records.) The differences
are telling.
between the two were not statistically different, ONC pointed out. The lion's share of Americans are also not keen on their medical
records being sent electronically or through fax, with about 60 percent of consumers indicating concern over unauthorized access of
their medical records when they're sent in these two forms.
and the economic condition of the country, as all being a party of this National Health Security Strategy. In other words,
in by Congress. It was put in by the Department of Health and Human Services. (See
HIPAAPrivacyRegs_EconomicStimulusChanges.pdf) One of the dangers, Brase pointed out, is that this vast amount of medical data
it could be the
entire electronic medical record, it could be that they just have ready access to the
electronic medical records because its on a state health information exchange, for
instance, and if they are one of the partners in the state health information
exchange, they can start this data draw. One of the things we look at is how
research can be done in a way to push policies that we disagree with. They come up
with findings that nobody else can validate because nobody else has access to all
that data the way the government has, and nobody can ever counter it , Brase told
warehoused in a giant electronic database will only be available to government-approved researchers. Now,
CNSNews.com.
professionals struggle to balance individual privacy interests against other strong societal
interests.
attention has
focused on the Agencys surveillance itself, fueling debates over whether it is legal
and ethical to spy on American citizens or to eavesdrop on the leaders of allied countries . NSA
policies that intentionally undermine cybersecurity too often get left out of the
debate, said panelists Monday at a New American Foundation event titled National Insecurity Agency: How the
NSAs Surveillance Programs Undermine Internet Security. If the Chinese government had proposed to put in a
backdoor into our computers and then paid a company $10 million to make that the standard we would be furious,
said Joe Hall, chief technologist at the Center for Democracy and Technology. Thats exactly what the NSA has
become: the best hacker in the entire world. In a statement to TIME, the NSA denied it had made the Internet less
secure. While we cannot comment on specific, alleged intelligence-gathering activities, NSAs interest in any given
technology is driven by the use of that technology by foreign intelligence targets. The United States pursues its
intelligence mission with care to ensure that innocent users of those same technologies are not affected,
spokesperson Vanee Vines said. Our participation in standards development has strengthened the core encryption
technology that underpins the Internet. NSA cannot crack much of the encryption that guards global commerce
and we dont want to. The tension arises due to the two competing missions of the National Security Agency:
electronic surveillance and protecting U.S. systems from cyberattacks. Nearly all of our online communications are
encrypted in some way against cyberattack, to protect our bank accounts from thieves and our intimate lives from
nosy neighbors. This poses a challenge for the NSA as the agency, since September 11, 2001, has focused less on
agents of foreign governments and more on ferreting out terrorist threats. Inevitably the data of innocent people
gets caught its dragnet. A Washington Post report Sunday estimated that 90 percent of those caught in the
agencys data surveillance netincluding intimate communications like family photographs and emails between
The agency
has sought to install backdoors, hardware and software systems with deliberately
weakened security, into some of the most commonly used tech products, as it did in
the program codenamed PRISM. American tech companies say this hurts their
business in the international marketplace, where users arent keen to use software
that comes bugged by an American intelligence agency . Major tech firms, including Google,
loversare everyday Internet users not suspected of wrongdoing, many of them American citizens.
supported an amendment to the defense budget in May to prohibit the NSA from using funds for this kind of
backdoor surveillance. Maybe a year ago this sort of language might have seemed unnecessary, Google Privacy
Policy Counsel David Lieber said, but now its actually really important to restore trust that these sorts of things are
not being requested and/or required of companies. Critics, like panelist Amie Stepanovich, senior policy counsel for
the web freedom group Access, say NSA has also worked to crack and undermine encryption
standards set by the National Institute of Standards and Technology (the body that
establishes the security standards that help protect our email accounts, banking
websites, etc.), and hoarded indexes of computer bugs the agency uses to hack into
machines rather than reveal the vulnerabilities so they can be fixed . In the wake of
apparently unfounded accusations that the NSA knew about the Heartbleed bug and didnt help fix it, the
administration announced this spring it has re-invigorated existing policy on how it decides whether or not to
The
fundamental issue, Schneier said, is should we compromise the security of everybody
in order to access the data of the few.
Critical infrastructure includes areas like the water and food supply,
telecommunications, nuclear power, transportation, banking, and energy ---areas
crucial to the functioning of society. Eighty percent of this critical infrastructure is owned by the
private sector. The continual delegation of control of critical infrastructure to cyberspace without regard to security
has posed many vulnerabilities that malicious actors could exploit. To address these vulnerabilities, policymakers
can utilize three options: strengthening partnerships between the public and private sectors, installing a White
House official to deal solely with cyber security issues, and encouraging collaboration between critical
infrastructure operators for coordinating best practices and crisis management. In conclusion, this analysis
recommends that the federal government follow a course incorporating all three options because the effects could
be mutually reinforcing. A long term solution to cybersecurity must take note of the private sectors insight to be
successful; a national dialogue on the importance of cyber security needs to take its cue from the White House; in
the meanwhile, proprietors of critical infrastructure should ensure that they can reduce the damage caused by
disasters or attacks by establishing clear lines of communication.
access to
critical infrastructure from cyberspace has placed these systems at risk of
destruction by other countries, malicious actors, or terrorists. This analysis proposes three
computer networks to control vital parts of critical infrastructure from cyberspace. However, remote
options that the federal government can implement: strengthening partnerships between the public and private
sectors, integrating resources under a White House official, and increasing collaboration between levels of critical
infrastructure. After scrutinizing these options under the criteria of political feasibility, industry acceptance, and
efficacy, this analysis recommends that the federal government pursue a combination of all three policy options.
Council, 2007). Figure 1 illustrates the myriad of infrastructures and their interdependencies with one another.
critical infrastructure (Forest, 2006, p. 78). Furthermore, about eighty percent of all American commerce occurs on
privately owned telecommunications networks, primarily the Internet (Theohary, 2009, p. 20 ).
Agency and National Intelligence, declared that if the September 11th, 2001, hijackers had launched a focused
attack on an American bank, the economic ramifications would have been of an order of magnitude greater than
the destruction of the World Trade Center (Harris, 2008). Former cyber security advisor Richard Clarke, who served
in the Clinton and Bush Administrations, asserted that the primary target for a terrorists cyber attack would be
the economy whereas casualties and chaos would be secondary (as cited in Rollins & Wilson, 2007, p. 3). In fact,
Beyond threatening the private sector, intruders have been specifically targeting the federal governments
information technology infrastructure. A report by the International Business Machines Corporation revealed that of
the 237 million security attacks carried out in the first half of 2005, more than twenty-two percent, the highest
percentage against any given group, aimed for government agencies (Fitzgerald, 2006, p. 57). Between 2008 and
March 2009, the number of attacks against federal computer networks swelled about forty percent (Smith, 2009).
The Department of Defense dubbed the militarys electronic information infrastructure
since it
owns about
governments assistance with this problem. A number of forums already exist to serve as models for more formal
mechanisms of public-private communication. Microsoft created a Security Response Center that works with the
Department of Defense to secure its products (Information Technology in the 21st Century Battlespace, 2003).
Learning from Carnegie Mellon Universitys public-private alliance model, the Department of Homeland Security in
2003 founded the United States-Computer Emergency Readiness Team, a group of government and industry
experts compiling software vulnerabilities (Barnes, 2004, p. 327). Similarly, the Protected Critical Infrastructure
Information Program in the Department of Homeland Security represents the federal governments first ever
mechanism to collect and analyze data from private companies without fear of releasing that data to the public by
the Freedom of Information Act (Grubesic & Murray, 2006, p. 65). In response to the governments creation of
federal agencies like the Critical Infrastructure Assurance Office and National Infrastructure Protection Center in
1998, industry responded with the creation of the Partnership for Critical Infrastructure Security as well as the
generation of Information Sharing Analysis Centers (Michel-Kerjan, 2003, p. 136). Industry agents staff these
Centers, which specialize in areas like telecommunications, electricity, and finance (Michel-Kerjan, 2003, p. 136).
which could force the disclosure of details of infrastructure weaknesses to the public, may make private companies
apprehensive about sharing their data with the government. Laws like the Critical Infrastructure Information Act of
2002 protect the private sector from such disclosures, but companies may be reluctant nonetheless (Pozen, 2005,
p. 678). Industry acceptance also affects this options efficacy. There are currently federal organizations like the
United States-Computer Emergency Readiness Team bridging the communication gap between the public and
private sectors, but only serious attention to these programs by both parties will evoke substantive results.
Companies confront a tradeoff between security and efficiency as well as transparency and customer satisfaction.
Noting this trend, Clay Wilson addressed studies revealing a low rate of cybercrime incident reporting because
companies fear consumer backlash from negative publicity (Wilson, 2009, p. 24). According to a study conducted
among Fortune 1000 companies, one of the most trenchant effects of compromised cyber security is damage to 6
This
political feasibility and industry acceptance .
reputation among consumers (Hansen, 2001, p. 1161).
options effectiveness
is directly tied to
Extinction
Adhikari 09 (Richard,- leading journalist on advanced-IP issues for several
major publications, including The Wall Street Journal Civilization's High Stakes
Cyber-Struggle: Q&A With Gen. Wesley Clark (ret.))
The conflicts in the Middle East and Afghanistan, to name the most prominent, are taking their toll on human life
and limb. However, the escalating cyberconflict among nations is far more dangerous, argues
retired general Wesley Clark, who spoke with TechNewsWorld in an exclusive interview. That cyberconflict will take
a far greater toll on the world, contends Clark, who last led the NATO forces to end the ethnic cleansing in Albania.
There is a pressing need for new institutions to cope with the ongoing conflict, in his view. Clark is a member of the
boards of several organizations. He has a degree in philosophy, politics and economics from Oxford University and a
master's degree in military science from the U.S. Army's Command and General Staff College.
Background: In
November 2008, the Center for Strategic and International Studies, a Washington-based bipartisan think tank,
presented recommendations on national security to the then-incoming Obama administration. These called for an
overhaul of the existing national cybersecurity organization. Since then, the state of national cybersecurity has
appeared chaotic. In August, White House cybersecurity adviser Melissa Hathaway resigned for reasons that echoed
the departure in 2004 of Amit Yoran, who then held essentially the same post. In an exclusive interview earlier this
year, Yoran told TechNewsWorld that national cybersecurity was still a mess. TechNewsWorld: Security experts warn
that nations are preparing for a new cyberwar. Is our government doing enough to protect our national cyberinfrastructure? Or is it in the process of protecting the cyber-infrastructure? Gen. Wesley K. Clark: I think we're in
the process of trying to get it protected, but unlike conventional security considerations, where one can easily see
an attack and take the appropriate response, the cyberstruggle is a daily, ongoing affair .
It's a matter of
thousands of probes a day, in and out, against systems that belong to obvious targets like the United
States Department of Defense; not-so-obvious targets like banks and energy companies; and
individual consumers or taxpayers. It's ongoing, it's undeclared, it's often unreported, and it's very much
an ongoing concern at all levels -- business, commerce and individual privacy. TechNewsWorld: The national
security infrastructure has repeatedly been reported to be sorely lacking. Is the government moving fast enough?
Does it need to do more? Clark: It does need to do more. It's in the process of doing more, and there's a
tremendous amount of public and private sector effort going into cybersecurity right now. Whether it's going to be
adequate or not is not the issue. There are many approaches to this problem that are mainly based on software, but
software is vulnerable. When you open up to communicate with the Web, when you bring in data and programs
from another source, when you bring in applications -- all that entails huge risks. It's dealing with those risks and
trying to gain the rewards of doing so that make it such a difficult proposition. Online banking was a novelty 20
years ago. Now, everything happens on the Internet. People pay their bills, they do business, they do their work
with customers. People don't fax documents any more if they don't have to -- they do webinars and briefings. All of
this exposes the opportunity for mischief. You don't know the source of the mischief. You don't know whether it's
individuals trying to solve a difficult technical challenge on their own or if they're connected to governments, or if
they're cells attached to governments -- and it's very difficult to pin down ... incoming probes to a source.
TechNewsWorld: While it's generally agreed that the next war may be a cyberwar, much of our infrastructure is
either hooked up to the Internet or in the process of being hooked up to the Internet. Electricity companies, for
example, are agitating for the use of smart meters. That being the case, and with hackers increasing the frequency
and sophistication of their attacks, does the increasing pace of hooking everything up to the Internet pose a real
security threat? Clark: We're going into completely digitized medical records, which could lead to a huge invasion
of privacy. It could also lead to things like blackmail and is physically dangerous because people can tamper with
records of vital signs, or can alter prescriptions. There's no telling just what could be done. Companies could lose
their supply chain management, lose their accounting records, lose their customer lists. Trying to rebuild this on
We are, as a
civilization, quite vulnerable to disruption , and this security problem doesn't just affect one nation
paper when we've all been interconnected on the Internet will cause years of economic decline.
but the whole global economic infrastructure. You can't conceive of the threats from the point of view of a
traditional war. Cyber-efforts are ongoing today; we're in a cyber-struggle today. We don't know who the adversaries
are in many cases, but we know what
global civilization.