Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (3)
- Data (2)
- HIPAA (2)
- Privacy law (2)
- Administrative law (1)
-
- Autonomy (1)
- CCPA (1)
- California Consumer Privacy Act (1)
- Consent (1)
- Consumer protection (1)
- Cybersecurity (1)
- Data breach (1)
- Data protection (1)
- Data security (1)
- Discrimination (1)
- EHR (1)
- Elderly (1)
- Electronic medical records (1)
- Equity (1)
- Expressive harms (1)
- Expressive theory (1)
- Fourth Amendment (1)
- GDPR (1)
- General Data Protection Regulation (1)
- Government surveillance (1)
- Harm (1)
- Health (1)
- Health data (1)
- Health information (1)
- Health information norms (1)
Articles 1 - 6 of 6
Full-Text Articles in Privacy Law
A Recent Renaissance In Privacy Law, Margot Kaminski
A Recent Renaissance In Privacy Law, Margot Kaminski
Publications
Considering the recent increased attention to privacy law issues amid the typically slow pace of legal change.
Data Collection, Ehrs, And Poverty Determinations, Craig Konnoth
Data Collection, Ehrs, And Poverty Determinations, Craig Konnoth
Publications
Collecting and deploying poverty-related data is an important starting point for leveraging data regarding social determinants of health in precision medicine. However, we must rethink how we collect and deploy such data. Current modes of collection yield imprecise data that is unsuited for research. Better data can be collected by cross-referencing other sources such as employers and public benefit programs, and by incentivizing and encouraging patients and providers to provide more accurate information. Data thus collected can be used to provide appropriate individual-level clinical and non-clinical care, and to systematically determine what share of social resources healthcare should consume.
An Expressive Theory Of Privacy Intrusions, Craig Konnoth
An Expressive Theory Of Privacy Intrusions, Craig Konnoth
Publications
The harms of privacy intrusions are numerous. They include discrimination, reputational harm, and chilling effects on speech, thought, and behavior. However, scholarship has yet to fully recognize a kind of privacy harm that this article terms "expressive."
Depending on where the search is taking place and who the actors involved are--a teacher in a school, the police on the street, a food inspector in a restaurant--victims and observers might infer different messages from the search. The search marks the importance of certain societal values such as law enforcement or food safety. It can also send messages about certain groups by …
Entrepreneurial Administration, Philip J. Weiser
Entrepreneurial Administration, Philip J. Weiser
Publications
A core failing of today’s administrative state and modern administrative law scholarship is the lack of imagination as to how agencies should operate. On the conventional telling, public agencies follow specific grants of regulatory authority, use the traditional tools of notice-and-comment rulemaking and adjudication, and are checked by judicial review. In reality, however, effective administration depends on entrepreneurial leadership that spearheads policy experimentation and trial-and-error problem-solving, including the development of regulatory programs that use non-traditional tools.
Entrepreneurial administration takes place both at public agencies and private entities, each of which can address regulatory challenges and earn regulatory authority as a …
Health Information Equity, Craig Konnoth
Health Information Equity, Craig Konnoth
Publications
In the last few years, numerous Americans’ health information has been collected and used for follow-on, secondary research. This research studies correlations between medical conditions, genetic or behavioral profiles, and treatments, to customize medical care to specific individuals. Recent federal legislation and regulations make it easier to collect and use the data of the low-income, unwell, and elderly for this purpose. This would impose disproportionate security and autonomy burdens on these individuals. Those who are well-off and pay out of pocket could effectively exempt their data from the publicly available information pot. This presents a problem which modern research ethics …
Classification Standards For Health Information: Ethical And Practical Approaches, Craig Konnoth
Classification Standards For Health Information: Ethical And Practical Approaches, Craig Konnoth
Publications
Secondary health information research requires vast quantities of data in order to make clinical and health delivery breakthroughs. Restrictive policies that limit the use of such information threaten to stymie this research. While the Notice of Proposed Rulemaking (NPRM) for the new Common Rule permits patients to provide broad consent for the use of their information for research, that policy offers insufficient flexibility. This Article suggests a flexible consenting system that allows patients to consent to a range of privacy risks. The details of the system will be fleshed out in future work.