20
Volume 10, Issue 6 February 11, 2011 FTC Commissioner: If Companies Don‘t Protect Privacy, We‘ll Go To Congress FTC Commissioner Julie Brill told a crowd of privacy researchers at UC Berkeley that her agency was willing to go to Congress if online advertisers and analytics companies don’t clean up their act. By Joe Mullin for paidContent.org As the FTC gathers comments on its proposed privacy rules, including a ―Do Not Track‖ proposal, FTC Commissioner Julie Brill told a crowd of privacy researchers and policy wonks gathered at UC Berkeley that her agency was willing to go to Congress if online advertisers and analytics companies don‘t clean up their act. While Do Not Track has become a buzz phrase that has been getting a lot of attention, there‘s more that‘s needed beyond implementing a good no-tracking option, Brill said. First, companies need to start considering “privacy by design.” That means that companies building new products need to think about privacy from the get-go, not just ―retrofitting‖ privacy features once there‘s a problem. Online companies also need to think about collecting less information about their users and holding it for a shorter period of time, Brill added. That‘s a suggestion that puts the FTC in direct conflict with the data-retention policies desired by the Department of Justice and law-enforcement agencies. Second, privacy choices need to be simplified for consumers. Privacy policies are too cluttered and confusing, and tend to be full of information that‘s barely relevant to the consumer. For example, an online shopper already knows that his address will be shared with FedEx or another shipper when he buys something. Privacy policies need to address the collection of the data itself, not just how the data is used. For example, plenty of companies, such as ad networks, are holding large amounts of consumer data and could stop using it for behavioral advertising if consumers opt out. Finally, data practices need to be transparent. Not only should consumers know what kind of data companies are collecting about them, but the FTC is actually proposing that consumers should get access to that data, Brill said. More at http://paidcontent.org/article/419-ftc-commissioner-if-companies-dont- protect-privacy-well-go-to-congress/ Figure of the week 65% & 54% The percentage of Facebook and Google users, respectively, who, according to results of a USA TODAY/ Gallup Poll, say they are worried about Internet viruses while searching those sites.

FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Volume 10, Issue 6 February 11, 2011

FTC Commissioner: If Companies Don‘t

Protect Privacy, We‘ll Go To Congress

FTC Commissioner Julie Brill told a crowd of privacy

researchers at UC Berkeley that her agency was willing to

go to Congress if online advertisers and analytics

companies don’t clean up their act.

By Joe Mullin for paidContent.org

As the FTC gathers comments on its proposed privacy rules, including a ―Do Not Track‖ proposal, FTC Commissioner Julie Brill told a crowd of privacy researchers and policy wonks gathered at UC Berkeley that her agency was willing to go to Congress if online advertisers and analytics companies don‘t clean up their act.

While Do Not Track has become a buzz phrase that has been getting a lot of attention, there‘s more that‘s needed beyond implementing a good no-tracking option, Brill said. First, companies need to start considering “privacy by design.” That means that companies building new products need to think about privacy from the get-go, not just ―retrofitting‖ privacy features once there‘s a problem. Online companies also need to think about collecting less information about their users and holding it for a shorter period of time, Brill added. That‘s a suggestion that puts the FTC in direct conflict with the data-retention policies desired by the Department of Justice and law-enforcement agencies.

Second, privacy choices need to be simplified for consumers. Privacy policies are too cluttered and confusing, and tend to be full of information that‘s barely relevant to the consumer. For example, an online shopper already knows that his address will be shared with FedEx or another shipper when he buys something. Privacy policies need to address the collection of the data itself, not just how the data is used. For example, plenty of companies, such as ad networks, are holding large amounts of consumer data and could stop using it for behavioral advertising if consumers opt out.

Finally, data practices need to be transparent. Not only should consumers know what kind of data companies are collecting about them, but the FTC is actually proposing that consumers should get access to that data, Brill said. More at http://paidcontent.org/article/419-ftc-commissioner-if-companies-dont-

protect-privacy-well-go-to-congress/

Figure of the week

65% & 54% The percentage of Facebook and

Google users, respectively, who,

according to results of a USA TODAY/

Gallup Poll, say they are worried

about Internet viruses while searching

those sites.

Page 2: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Volume 10, Issue 6 February 11, 2011 Page 2

Health IT

Microsoft Intros State Health Insurance

Exchange Platform

The software giant is partnering with Extend on

turnkey technology for the online insurance

marketplaces required by healthcare reform.

By Marianne Kolbasuk McGee, InformationWeek

The new Microsoft State Health Insurance Exchange, or HIX, includes core technology components from Microsoft as well as from partners, including Extend Health, which operates one of the country's largest supplemental Medicare insurance exchanges.

Microsoft HIX provides an interoperable framework that

connects new and existing government and private insurer

systems.

The offering includes a consumer portal for states to provide

individuals with an online marketplace to shop for insurance

plans via the Web, as well as provide to the exchange "behind

the scenes" functionality, such as eligibility determination,

financial services, plan enrollment, and administration, said

Dave Meyers, chief technology strategist of health and human

services in Microsoft's U.S. health and life sciences group.

For instance, during the eligibility determination process, the

exchange can interface with existing federal or state

government systems to check whether an individual is a citizen

of the United States, qualifies for a state's Medicaid coverage,

or is eligible for subsidized insurance based on income level,

said Meyers.

The end-to-end HIX offering also includes "wizard"

technologies provided by Extend, such as plan comparisons

tools to that help consumers choose coverage that best meets

their needs, said Jack Hersey, general manager of Microsoft's

U.S. public sector, healthcare, and social services group. Also

available for the exchange is call center support from Extend.

Pricing depends on the technology components needed by the

states. "Many components on the backend are already owned

[by potential state customers] and can be leveraged," Meyers

said.

That includes BizTalk Server 2010 and Microsoft SQL Server.

Other key Microsoft technologies that are part of Microsoft

HIX's foundation also include Windows Azure and Microsoft

Lync Server 2010.

More at http://www.informationweek.com/news/healthcare/

admin-systems/showArticle.jhtml?

articleID=229203006&cid=RSSfeed_IWK_All

Laboratory IT Systems Poised For Growth

By Bernie Monegain, Editor, Healthcare IT News

The laboratory information systems (LIS/LIMS) market will

grow in the 6 percent range annually in the next few years, up

from $800 million in 2010, forecasts a new report from

research firm Kalorama Information.

Tomorrow's laboratories will utilize advanced diagnostic and

information management technologies, such as digital

pathology and molecular studies, and they will require

sophisticated, fast, easy-to-use and, most importantly,

interoperable laboratory information systems (LIS) to handle

the resulting more complex and high volume data, according

to the report Laboratory Information Systems (LIS/LIMS)

Markets.

Because labor accounts for more than 60 percent of the cost

of producing test results, automation and better information

management systems effectively can reduce the number of

hands-on procedures in a lab and optimize the efficiency of

labor, researchers say.

Many operations still use manual processes for collecting,

analyzing, and reporting data. It is estimated that more than

two thirds of laboratories operate with less than half of their

instruments interfacing with an LIS. But with growing

pressures to cut costs, increase efficiencies and quality of

care, and report test results in real time, labs must plan for

more sophisticated LIS if they wish to remain competitive,

Kalorama concludes.

"The vendors with a long-term view are developing a next-

generation of LIS that will meet the needs that even many of

today's systems cannot provide," says Bruce Carlson,

publisher of Kalorama Information. "Hospitals are rapidly

automating, and clinical lab information systems will need to

offer features such as an interface with electronic charting,

EMRs, real-time data integration, reporting, analytics and

data visualization, and insurance billing software."

More at http://www.healthcareitnews.com/news/laboratory-it

-systems-poised-growth

Page 3: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 3 Volume 10, Issue 6 February 11, 2011

Health IT - (cont.)

ONC to Track Nationwide EHR, Info-

Exchange Use

By Joseph Conn, Modern Healthcare.com

The Office of the National Coordinator for Health Information

Technology at HHS has awarded two contracts totaling more

than $3.9 million to monitor the nationwide use of health

information exchanges and adoption of electronic health-

record systems.

Surescripts, an Arlington, Va.-based vendor of electronic

prescribing services and, more recently, an information

exchange portal and an ONC-authorized health IT testing and

certification body, was awarded a contract valued at more than

$1.4 million.

Surescripts is to collect, report and analyze "ongoing evidence

of nationwide electronic exchange of clinical information, such

as electronic prescribing," and submit reports at least

quarterly, according to a contract description posted on a

federal website.

Surescripts also should include breakdowns by state,

metropolitan area, county and ZIP code, and identify "any

areas where accurate estimates of exchange could not be

made," according to the description.

SK&A Information Services, Irvine, Calif., received an ONC

contract for $2.5 million to conduct ongoing surveys to assess

providers' adoption and use of EHR systems.

SK&A's quarterly reports should group healthcare providers

using EHR systems by medical specialty and characterize their

level of EHR system adoption and use of key functions,

according to the terms of the contract, as well as provide

detailed analysis of providers' EHR use by state, metropolitan

area, county and ZIP code.

For both contracts, the ONC expects to receive data beginning

in September and continuing through 2014.

More at http://www.modernhealthcare.com/article/20110207/

NEWS/302079987

Information Sharing

IG Deems DHS Intel System Management

'Effective'

By GovInfoSecruity.com

The Department of Homeland Security inspector general

expressed a few reservations about DHS's enterprise-wide

security program and practices for its top secret/sensitive

compartmented information intelligence system, but generally

called the management of the system effective.

In an unclassified summary of the audit made public Tuesday,

the IG said the overall IT security procedures have been

documented and adequate security controls have been

implemented. Nonetheless, the IG said "issues remain"

regarding the effectiveness of management oversight and

operational issues.

"We have concerns with the documentation for the Coast

Guard Intelligence Support System certification and

accreditation package and the information system security

training and awareness program for intelligence personnel,"

the summary said. "Also, we identified security issues with the

classified local area network and Coast Guard Intelligence

Support System.

We recommended that the undersecretary for intelligence and

analysis address the open recommendations identified during

our review. The department concurred with all four

recommendations."

The Federal Information Security Management Act required

the IG to review the department's security management,

implementation, and evaluation of its intelligence activities,

including its policies, procedures and system security controls

for enterprise-wide intelligence systems.

The IG assessed the department's plan of action and

milestones, certification and accreditation and incident

reporting processes, as well as its security training and

awareness program.

More at http://www.govinfosecurity.com/articles.php?

art_id=3334&utm_source=feedburner&utm_medium=feed&ut

Page 4: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 4 Volume 10, Issue 6 February 11, 2011

Points of View

The State of the Internet

By Anna G. Eshoo, U.S. House of Representatives, Co-Chair of

the Congressional Internet Caucus; Published by the San

Francisco Chronicle

As we enter the second decade of the 21st century, the Internet is no longer an optional resource. It is a fundamental tool encountered in every aspect of our daily lives. We rely on it for business, information, education, communication and personal expression. We use it at our offices, in our homes, on desktops and laptops and even on our phones. The vibrancy of our nation's economy increasingly depends on the growth and utilization of this transformative technology.

In Silicon Valley, the innovation capital of our country, startups have become billion-dollar businesses by leveraging the power of the Internet. These companies are transforming our society, making our economy grow and creating hundreds of thousands of domestic jobs.

As President Obama noted in his State of the Union address, the federal government has played a crucial role in the growth of the Internet and our most innovative businesses. The technology at the Internet's core was funded by a Defense Department program, the Defense Advanced Research Projects Agency. Silicon Valley has been a substantial beneficiary of federal research funding, and the dividends are apparent. Giants like Google, Cisco and Sun Microsystems (now part of Oracle) all emerged from federally funded research projects.

But as the Internet continues to grow in prevalence and complexity, what can we do to replicate our past two decades of success?

It begins with an investment in basic research. The private sector has always been the engine of American job creation and innovation, and the federal government has provided the resources and incentives necessary for our businesses to innovate and compete. While the United States still leads the world in funding basic research, China and other nations are working aggressively to catch up. We must continue to invest in research and preserve our advantage in this critical area.

The Research and Development Tax Credit is another essential economic tool, because it directly rewards business investment in new technologies, but the tax credit has been renewed only on a short-term basis.

During my 18 years in Congress and three administrations, I've worked to make the tax credit permanent. Last February, I led a bipartisan effort of 120 members of Congress in urging the expansion of the credit. There are few easy answers to improving the economy of our nation, but the R&D tax credit is one of them. It needs to be made permanent.

A climate of openness and innovation has been the hallmark of the Internet. A decade ago, it's what allowed a startup named Google to compete with better-funded, less technologically advanced competitors. Today, Congress has the responsibility to preserve this climate for the next Google, and for the consumers and the economy that will benefit from its success.

This begins with broadband availability, ensuring that every community has access to affordable high-speed Internet. In a recent poll conducted by Cisco Systems and the Saïd Business School, the United States ranked 15th in the world in broadband quality. We must close these gaps, and quickly.

All available options should be on the table. In the last Congress, I sponsored legislation calling for the installation of broadband channels when the ground is already being torn up for construction and transportation projects. The Federal Highway Administration estimates it is 10 times more expensive to dig up and then repair a road to lay fiber than to dig a channel for it when the road is being fixed or built.

More at http://www.sfgate.com/cgi-bin/article.cgi?f=/c/

a/2011/02/06/INEI1H56JG.DTL&tsp=1

Page 5: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 5 Volume 10, Issue 6 February 11, 2011

Points of View - (cont.)

Could Health IT Progress Stall Given Recent

Events?

By Kate Ackerman, iHealthBeat Senior Editor

It's been a busy time in the health IT sphere. On Thursday,

National Coordinator for Health IT David Blumenthal

announced that he plans to step down from his post as the

country's health IT chief in April.

The news of Blumenthal's departure came just 10 days after

Rep. Jim Jordan (R-Ohio) introduced a bill (HR 408) aimed

at cutting $2.5 trillion in federal spending over 10 years partly

by eliminating funding for the meaningful use incentive

program.

Under the meaningful use incentive program, included in the

2009 federal economic stimulus package, health care

providers who demonstrate meaningful use of electronic

health records can qualify for Medicare and Medicaid

incentive payments. While Jordan's bill appears to have little

chance of passing, it has raised concerns among health care

providers who were preparing to move forward with their

health IT adoption plans.

At the same time, the battle over the health reform law --

which includes several health IT-related provisions, such as

Web-based state insurance exchanges and online enrollment

for health care and human services programs -- has

heightened.

Last week, U.S. District Court Judge Roger Vinson ruled that

the reform law's individual mandate is unconstitutional,

agreeing with plaintiffs in a multistate lawsuit that the

provision exceeds Congress' power to regulate interstate

commerce.

Vinson went a step further and invalidated the entire law

because he concluded that the mandate is "inextricably

bound" to other provisions in the law.

So what do all of these policy developments mean? Could

they slow health IT momentum and ultimately derail the

meaningful use incentive program? Or are they part of the

normal policymaking process?

In an e-mail to Office of the National Coordinator for Health IT staff, Blumenthal, who has served as the country's top health IT leader for nearly two years, said returning to his academic post at Harvard University "was planned when I accepted the position."

More at http://www.ihealthbeat.org/features/2011/could-

health-it-progress-stall-given-recent-events.aspx

A Prescription for Fear

By Virginia Heffernan, The New York Times

If you‘re looking for the name of a new pill to ―ask your doctor

about,‖ as the ads say, the Mayo Clinic Health Information

site is not the place for you. If you‘re shopping for a newly

branded disorder that might account for your general feeling

of unease, Mayo is not for you either.

But if you want workaday, can-do health information in a

nonprofit environment, plug your symptoms into Mayo‘s

Symptom Checker. What you‘ll get is: No hysteria. No drug

peddling. Good medicine. Good ideas.

This is very, very rare on the medical Web, which is

dominated by an enormous and powerful site whose name —

oh, what the hay, it‘s WebMD — has become a panicky

byword among laysurfers for ―hypochondria time suck.‖

In more whistle-blowing quarters, WebMD is synonymous

with Big Pharma Shilling. A February 2010 investigation into

WebMD‘s relationship with drug maker Eli Lilly by Senator

Chuck Grassley of Iowa confirmed the suspicions of longtime

WebMD users. With the site‘s (admitted) connections to

pharmaceutical and other companies, WebMD has become

permeated with pseudomedicine and subtle misinformation.

Because of the way WebMD frames health information

commercially, using the meretricious voice of a

pharmaceutical rep, I now recommend that anyone except

advertising executives whose job entails monitoring product

placement actually block WebMD. It‘s not only a waste of

time, but it‘s also a disorder in and of itself — one that preys

on the fear and vulnerability of its users to sell them half-

truths and, eventually, pills.

But if careering around the Web doing symptom searches is

your bag (and, come on, we‘ve all been there), there‘s still

MayoClinic.com. Where WebMD is a corporation that started

as an ad-supported health-alarmism site with revenues of

$504 million in 2010, the Mayo Clinic is a nonprofit medical-

practice-and-research group that started as a clinic.

More at http://www.nytimes.com/2011/02/06/

magazine/06FOB-Medium-t.html?_r=2

Page 6: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 6 Volume 10, Issue 6 February 11, 2011

Points of View - (cont.)

Security and Freedom in the Cyber Age -

Seeking the Rules of the Road

In a speech to the Munich Security Conference,

Foreign Secretary William Hague said that Britain

is "ready to play its part" in responding to the

security challenges.

Published by the Foreign & Commonwealth Office of the

United Kingdom

It is a pleasure to be here at the Munich Security Conference

and to share a platform with two such distinguished speakers.

It is one of the first principles of security that you must look

ahead to anticipate the evolution of future threats, even during

times of austerity, which is why I would like to speak today on

the subject of cyber security.

Cyberspace is changing the way we view and conduct foreign

policy as well as transforming our everyday lives.

The political upheaval in Egypt is a recent example. The

Egyptian government tried to shut down the internet and

mobile phone networks and broadcasters like Al Jazeera.

The CEO of Vodafone called me just before to discuss the

attempt made yesterday by the Egyptian authorities to send

messages to all their supporters via the Vodafone network.

Twitter and Google created a ‗speak-to-tweet service‘ so that

Egyptian citizens could circumvent government controls. And

NGOs like Amnesty International sent live updates about

casualties via Twitter. There are also reports of authorities in

third countries blocking internet searches for the words

―Egypt‖ and ―Cairo.‖

The internet, with its incredible connective power, has created

opportunity on a vast and growing scale; unlocking economic

potential, revolutionizing access to information and requiring

democratic governments to be more transparent.

It has transformed traditional notions of hierarchy and

authority.

It blurs geographical boundaries, allowing people on opposite

sides of the world to communicate at the speed of light and to

organise themselves around a sense of anger or common

identity.

As a colleague of mine Lord Howell has written, ―for better or

worse we are destined to be all connected, rich and poor,

developed and developing, benign and malign, small and

mighty.‖

But there is a darker side to cyberspace that arises from our

dependence on it.

We rely on computer networks for the water in our taps, the

electricity in our kitchens, the ‗sat navs‘ in our cars, the

running of trains, the storing of our medical records, the

availability of food in our supermarkets and the flow of money

into high street cash machines.

Many government services are now delivered via the internet,

as is education in many classrooms. In the UK 70% of younger

internet users bank online and two thirds of all adults shop on

the internet.

This is not a phenomenon confined to any one part of the

world. In less than 15 years the number of web users has

exploded from 16 million in 1995 to more than 1.7 billion

today, more than half of whom are in developing countries. By

2015, it is said that there will be more interconnected devices

on the planet than humans.

More at http://www.fco.gov.uk/en/news/latest-news/?

view=Speech&id=545077882

In Britain’s view, seven principles

should underpin future international

norms about the use of cyberspace:

The need for governments to act proportionately in cyberspace and in accordance with national and

international law

The need for everyone to have the ability – in terms of skills, technology, confidence and opportunity – to access cyberspace

The need for users of cyberspace to show tolerance and respect for diversity of language, culture and ideas

Ensuring that cyberspace remains open to innovation and the free flow of ideas, information and expression

The need to respect individual rights of privacy and to provide proper protection to intellectual property

The need for us all to work collectively to tackle the threat from criminals acting online

And the promotion of a competitive environment

which ensures a fair return on investment in network,

services and content.

Page 7: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 7 Volume 10, Issue 6 February 11, 2011

Points of View - (cont.)

The Information

How the Internet Gets Inside Us

By Adam Gopnik, The New Yorker

When the first Harry Potter book appeared, in 1997, it was just

a year before the universal search engine Google was launched.

And so Hermione Granger, that charming grind, still goes to

the Hogwarts library and spends hours and hours working her

way through the stacks, finding out what a basilisk is or how to

make a love potion.

The idea that a wizard in training might have, instead, a magic

pad where she could inscribe a name and in half a second have

an avalanche of news stories, scholarly articles, books, and

images (including images she shouldn‘t be looking at) was a

Quidditch broom too far. Now, having been stuck with the

library shtick, she has to go on working the stacks in the Harry

Potter movies, while the kids who have since come of age

nudge their parents. ―Why is she doing that?‖ they whisper.

―Why doesn‘t she just Google it?‖

That the reality of machines can outpace the imagination of

magic, and in so short a time, does tend to lend weight to the

claim that the technological shifts in communication we‘re

living with are unprecedented. It isn‘t just that we‘ve lived one

technological revolution among many; it‘s that our

technological revolution is the big social revolution that we live

with. The past twenty years have seen a revolution less in

morals, which have remained mostly static, than in means: you

could already say ―f—-‖ on HBO back in the eighties; the

change has been our ability to tweet or IM or text it. The set

subject of our novelists is information; the set obsession of our

dons is what it does to our intelligence. The scale of the

transformation is such that an ever-expanding literature has

emerged to censure or celebrate it. A series of books explaining

why books no longer matter is a paradox that Chesterton

would have found implausible, yet there they are, and they

come in the typical flavors: the eulogistic, the alarmed, the

sober, and the gleeful.

When the electric toaster was invented, there were, no doubt,

books that said that the toaster would open up horizons for

breakfast undreamed of in the days of burning bread over an

open flame; books that told you that the toaster would bring an

end to the days of creative breakfast, since our children,

growing up with uniformly sliced bread, made to fit a single

opening, would never know what a loaf of their own was like;

and books that told you that the toaster would make breakfast

better and sometimes it would make breakfast worse.

More at http://www.newyorker.com/arts/critics/

atlarge/2011/02/14/110214crat_atlarge_gopnik

The Technology of Counterrevolution

The Web helps reformers, but Egypt's autocrats

are using it for their own ends.

By L. Gordon Crovitz, The Wall Street Journal

Hosni Mubarak isn't the only one caught flat-footed by the

revolt against his rule. The suddenness of the popular

movement against his regime, powered by Facebook and other

tools of fast-developing technology, shocked everyone from

telecommunications executives whose companies were turned

into instruments of state repression to leaders of authoritarian

countries far from Egypt.

Technology is now shortening the cycle of political change,

leading to what seem like instant revolts in unlikely places that

were long thought stable. Authoritarian regimes are reacting to

this new reality.

Nepal severed Internet connections in 2005 when the king

declared martial law, and the government in Burma closed off

the Web in 2007 during the crackdown on reformers. Bahrain,

Uganda and Yemen have all blocked communications during

elections in recent years. China closed down the Internet in

Xinjiang province in 2009 following ethnic riots.

But the authorities in Cairo last week added a new element to

what the OpenNet Initiative, which tracks controls on the Web,

calls "just-in-time blocking."

Western telecommunications companies were instrumental in

closing off the Internet in the country almost entirely. The

Egyptian government does not have direct control of the

Internet from a central, state-run service hub. Instead,

authorities ordered Internet service providers to shut down

service.

Egypt's largest mobile-phone provider, Vodafone, was even

commandeered to send government-drafted text messages to

its customers. These included, "Youth of Egypt, beware rumors

and listen to the sound of reason" and "Egypt's honest and

loyal men to confront the traitors and criminals." Other text

messages gave details about rallies in support of the regime.

More at http://online.wsj.com/article/

SB10001424052748704709304576124573160468928.html

Page 8: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 8 Volume 10, Issue 6 February 11, 2011

Points of View - (cont.)

In Europe, a Right to Be Forgotten Trumps

the Memory of the Internet

Why is it that two sprawling yet similar Western

cultures -- those on both sides of the Atlantic --

respond so differently to Internet privacy?

By John Hendel, The Atlantic

A quarter-century after coming to the United States, Franz

Werro still thinks like a European. The 54-year-old

Georgetown law professor, born and raised in Switzerland, is

troubled when ads in French automatically pop up on his

American laptop. The computer assumes that's what he wants.

We live naked on the Internet, Werro knows, in a brave new

world where our data lives forever. Google your name, and

you'll stumble onto drunken photos from college, a misguided

quote given to a reporter five years ago, court records, ancient

1 a.m. blog comments, that outdated Friendster profile ... the

list goes on, a river of data creating a profile of who you are for

anyone searching online: friend, merchant, or potential future

employer. Werro's American students rarely mind.

But America is not Europe, and despite our no-secrets age of

WikiLeaks, Europe wants to enshrine a special form of privacy

into law. Individuals should, according to many in Europe,

possess what they call a "right to be forgotten" on the Internet.

How would this even be possible? This developing right,

authorities in several European countries suggest, would allow

an individual to control and sometimes eliminate his or her

data trail and allow him or her to ask Google to

remove select search results -- a newspaper article, say, which

once painted him or her in a bad light. A look at recent news

events guarantees that this right will only become more

relevant in 2011.

On January 19, Google refused Spain's request that the

ubiquitous, California-based search engine remove 90 links.

Many of the links Spain wanted to remove included newspaper

articles and information from public record, often painting the

plaintiffs in a bad light.

Google called Spain's request "disappointing" in its official

statement and emphasized that as a search engine, it should

not be responsible for curating Internet content. Removing

links would be expensive, Google argued in court, and violate

the "objectivity" of the Internet search.

Last November, the European Union announced data

protection goals for 2011, which include "clarifying the so-

called 'right to be forgotten', i.e. the right of individuals to have

their data no longer processed and deleted when they are no

longer needed for legitimate purposes.

The EU explicitly said that users should have the right. It has

already been heavily discussed and praised in countries such as

France, whose President Sarkozy said last year:

"Regulating the Internet to correct the excesses and abuses

that come from the total absence of rules is a moral

imperative!" France's leadership at the coming G8 summit also

signifies more dialogue, as Sarkozy hopes to discuss the right

on an international stage.

These European concerns rarely come up in the United States.

People may worry about Facebook's privacy settings, but few

would suggest an individual has a right to remove an offending

Gawker post from Google's index.

After all, who decides? A person might want an embarrassing

photo removed from record, but what if the photo features not

only that person but four others?

The question of censorship is inevitable.

The European Union seeks to clarify it’s previously

announced plans for a “right to be forgotten”

initiative. (Img: Corbis)

More at http://www.theatlantic.com/technology/

archive/2011/02/in-europe-a-right-to-be-forgotten-trumps-

Page 9: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 9 Volume 10, Issue 6 February 11, 2011

Points of View - (cont.)

The Facebooks of China

China's fake Facebooks started as mere copycats

but now drive innovation in advertising and

gaming. They've also built something unique in

their country: a place where people can find love,

speak out, and be whoever they want to be.

By April Rabkin

"Know anyone who has any needs?"

"I'm not sure, I can ask around for you."

"Don't you have any needs?"

"I just want to be with someone I love."

"Really, I'm not bad. Give it some thought."

It was the worst pickup attempt that Dong Jin had ever heard.

You might think that something was lost in translation, that

surely this sounds better in the original Chinese, but you would

be wrong. That all this was unfolding online -- Dong, 26, a

Beijing teacher, was being approached by a college student

who had just friended her on the Chinese social network

Renren -- made it even weirder. Scenes like this (many of

them, fortunately, less awkward) repeat themselves hundreds,

if not thousands, of times a day on the Facebooks of China.

The real Facebook is not available behind the Great Firewall of

China, except to netizens rich enough and technologically

savvy enough to buy access to proxy servers, because

government censors have blocked it as a foreign threat. Twitter

and Google are off-limits too. According to the recent

WikiLeaks disclosures of U.S. State Department cables, the

latter fell victim to politburo member Li Changchun, who

launched a personal campaign against it after Googling himself

and finding an abundance of critical material.

In the absence of these web titans, dozens of Chinese copycats

have sprung up, but none tell a story of evolving, modern

China like the fake Facebooks, some of which mimic Facebook

down to page architecture and color scheme. The leading social

networks on the mainland are Renren, which, like Facebook,

initially targeted the college crowd, and Kaixin001 (kaixin

means "happy," and the 001 was added to give a techy feel to

the name), aimed at young professionals.

In some ways, social networking in China is much like that in

the U.S. It has spread well beyond its original target

demographic. Office workers stay logged on constantly. Artists,

singers, and secretaries post status updates a dozen times a

day from their laptops or their cell phones. Grandmothers

grow potatoes on local versions of FarmVille.

As with Facebook, the membership rolls are astounding and

growing rapidly. In a 1.3 billion-strong nation where less than

a third of the populace is online, Renren claims about 165

million users. A slogan on a chalkboard in an employee lounge

at its HQ claims, "Every day the number of people joining

Renren.com would fill 230 Tiananmen Squares." Kaixin001

says it has 95 million users.

In significant ways, though, online life behind the Great

Firewall is different. For one thing, there is no dominant site.

By blocking Facebook, the government has unwittingly ignited

an especially fierce and litigious competition between Renren

and Kaixin001. The two networks have pushed each other

strategically and technologically, devising ingenious new ways

to advertise to audiences that are even more saturated by

marketing than Americans.

Also, according to Netpop Research in San Francisco, Chinese Internet users are twice as conversational as American users; in other words, they're twice as likely to post to online forums, chat in chat rooms, or publish blogs. And to the joy of advertisers and marketers, social media is twice as likely to influence Chinese buying decisions as American ones, which explains why brands such as BMW, Estée Lauder, and Lay's have flocked to China's social networks.

Sites like Renren and Kaixin001 are microcosms of today's changing China -- they copy from the West, but then adjust, add, and, yes, even innovate at a world-class level.

Wang Xing, who started the site that is now called

Renren, says his goal in creating a social network was

"to make a better world." Today, he almost never goes

on Renren. (Image: Fastcompany)

More at http://www.fastcompany.com/magazine/152/the-

socialist-networks.html

Page 10: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 10 Volume 10, Issue 6 February 11, 2011

Internet Governance

(Secret) US Cables Reveal: ACTA Was Far

Too Secret

By Nate Anderson, Ars Technica

US government cables published by WikiLeaks show us that it

wasn't just "the usual blogger-circles" (as the US Embassy in

Sweden called them) complaining about the secrecy of the Anti

-Counterfeiting Trade Agreement (ACTA).

French digital rights group La Quadrature du Net has compiled

a list of relevant WikiLeaks cables regarding ACTA.

In one, a top intellectual property official in Italy told the US

that "the level of confidentiality in these ACTA negotiations

has been set at a higher level than is customary for non-

security agreements."

He added that it was "impossible for member states to conduct

necessary consultations with IPR stakeholders and legislatures

under this level of confidentiality."

In Sweden, the EU's top negotiator on ACTA told the US

embassy there that "the secrecy issue has been very damaging

to the negotiating climate in Sweden…

The secrecy around the negotiations has led to that the

legitimacy of the whole process being questioned."

SK&A Information Services, Irvine, Calif., received an ONC

The inevitable result of such secrecy was leaks and rumors.

When the US proposals for the Internet section of ACTA

leaked, the head of Sweden's Justice Ministry had "to go public

earlier this month to appease the storm of critics by assuring

them that the Swedish government will not agree to any ACTA

provision that would require changes to current Swedish laws."

And the EU negotiator added a criticism of his own: "the

European Commission is concerned that the USG [US

government] has close consultation with US industry, while

the EU does not have the same possibility to share the content

under discussion in the negotiations."

The cables note that critics wanted ACTA to take place before

an existing body like WIPO, where processes were in place for

transparency and for the involvement of public interest groups.

But cables from the US embassy in Japan make clear that the

US pushed back against this approach, in large part because it

knew other nations wouldn't go along with what it wanted.

More at http://arstechnica.com/tech-policy/news/2011/02/

secret-us-cables-reveal-acta-was-far-too-secret.ars?

utm_source=rss&utm_medium=rss&utm_campaign=rss

Neelie Kroes ,Vice-President of the

European Commission Responsible for the

Digital Agenda Ending Fragmentation of the

Digital Single Market Business for New

Europe Event London, 7 February 2011

By Neelie Kroes, European Commission

It is a great pleasure to be here today. I know we share the

same passion for Europe‘s Single Market. Indeed, I understand

that Lord Brittan addressed you recently about the need for a

'ruthless focus' on completing the Single Market. I have to say

that matches my view perfectly.

The growth and development of the digital Single Market is

where we need to put our attention now. Every gap, and every

failure to keep up with developments in the digital economy

that lead to growth, holds us back from long-term recovery. In

times of austerity, even more so.

Just as the UK Government is currently taking hard policy and

investment decisions, at the European level we need to make

hard reforms if we want the Single Market to live up to name.

This level of ambition is there in the Single Market Act reforms

introduced by my colleague Michel Barnier, and in my own

Digital Agenda for Europe. These are truly comprehensive

reform agendas – and they have to be – because we can‘t

afford to waste our time playing at the edges.

For me, the top of the list is ending fragmentation in the digital

Single Market and ensuring it runs using the best digital

infrastructure.

Today, for example, a company specialising in health

equipment needs 27 certificates if it wants to operate in all 27

member states. That is no way to grow eHealth markets or deal

with our ageing population.

More at http://europa.eu/rapid/pressReleasesAction.do?

reference=SPEECH/11/70&format=HTML&aged=0&language=

EN&guiLanguage=en

Page 11: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 11 Volume 10, Issue 6 February 11, 2011

Internet Governance - (cont.)

China Building a City for Cloud Computing

But it Has a Way to Go to Match U.S. in IT

Spending

By Patrick Thibodeau , Computerworld

China is building a city-sized cloud computing and office

complex that will include a mega data center, one of the

projects fueling that country's double-digit growth in IT

spending. The entire complex will cover some 6.2 million

square feet, with the initial data center space accounting for

approximately 646,000 square feet, according to IBM, which is

collaborating with a Chinese company to build it.

In sheer scale, this project, first announced late last month, is

nearly the size of the Pentagon, although in China's case it is

spread over multiple buildings similar to an office park and --

from the rendering -- may include some residential areas. But

it may be a uniquely Chinese approach that brings data centers

and developers together.

These big projects, whether supercomputers or sprawling

software development office parks, can garner a lot of

attention. But China's overall level of IT spending, while

growing rapidly, is only one-fifth that of the U.S.

According to market research firm IDC, China's IT spending,

which includes hardware, packaged software and services, is

forecast to total about $112 billion this year, up 15.6% from $97

billion in 2010. By comparison, U.S. IT spending is expected to

reach $564 billion this year, a 5.9% increase from 2010.

China's IT industry isn't that big at this point and "there is a lot

of reliance on the vendors" to design data centers, said Dale

Sartor, an engineer at U.S. Department of Energy's Lawrence

Berkeley National Laboratory, who visited about eight data

centers in China last year. Sartor, who leads a team of energy

efficiency specialists, is on a project to "scope" out the

possibility of helping the Chinese on data center energy

efficiency issues, something the Energy Department has

already been doing in India for several years.

Among the things Sartor is working on, in an effort that

includes the China Electronics Standardization Institute, is

data center standards development. He said there is a lot more

regulation in China on data center design, but these

regulations "haven't to date paid a lot of attention to energy

efficiency." Sartor expects to see accelerating data center

development in China, particularly involving very large centers

delivering cloud services. Large data centers may soon be the

norm.

"I got a sense that the cloud is going to be huge in China for

both efficiency reasons as well as the ability to control," said

Sartor. "If everything was cloud computing and the

government owns it, it's much easier to keep your finger on the

Internet and other issues than [by using] a very distributed

model."

China will be using IBM's data design services, among other

services, in the Hebei Province complex. It is working with

Range Technology Development Co. on the project. China's

rapid IT growth has been a plus for IBM, which said its growth

in that country in 2010 was up 25% over the year before.

The first phase of the Hebei Province plan calls for building

seven low-slung data centers. But the data center space could

easily expand to more than a million square feet. The plan calls

for another six data center buildings, three on either side of the

initial seven, if they're needed. The center is expected to be

completed in 2016, IBM said.

In terms of size, the data centers will be among the world's

biggest. The largest known data center complex is a 1.1-million

-square-foot facility in Chicago owned by Digital Realty Trust,

according to Data Center Knowledge, which has ranked the

data centers by size.

More at http://www.computerworld.com/s/article/9208398/

China_building_a_city_for_cloud_computing

This rendering shows the planned city-sized cloud computing

and office complex being built in China. (Image: IBM)

Page 12: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 12 Volume 10, Issue 6 February 11, 2011

Internet Governance - (cont.)

Progress on the Intellectual Property

Enforcement Strategy

By Victoria Espinel , The White House Blog

In his State of the Union address, President Obama re-

emphasized our nation‘s commitment to help turn America‘s

innovative spirit into economic prosperity for our people and

our nation.

That is what my job and my office is all about. America‘s

creativity and ingenuity cannot thrive without intellectual

property protection and enforcement, which allows a

revolutionary idea to blossom into economic opportunity.

A little over a year ago, I was confirmed by the U.S. Senate as

the first U.S. Intellectual Property Enforcement Coordinator.

A little over six months ago, I submitted to Congress the

inaugural Joint Strategic Plan on Intellectual Property

Enforcement (Strategy), which was developed as a result of

significant public input (including more than 1,600 public

comments) and the coordinated efforts of the Federal agencies

that enforce intellectual property rights.

It included 33 specific actions that we committed to undertake

to improve intellectual property enforcement.

In the little more than six months since we issued that Strategy

in June, the U.S. Government has been hard at work taking the

steps we identified to improve intellectual property

enforcement. Today, I have sent to Congress the first annual

report outlining what we have done to implement the Strategy.

Some of the significant activities that I want to highlight for

you are:

Voluntary Private Sector Action: As a result of our efforts

to work with those who make the Internet function effectively

and efficiently, I announced that American Express, eNom,

GoDaddy, Google, MasterCard, Microsoft, PayPal, Neustar,

Visa, and Yahoo! agreed to form a nonprofit organization with

other private sector participants to educate consumers, share

information, and take voluntary enforcement action against

illegal online pharmacies.

Anti-Counterfeiting Trade Agreement: In November,

the Office of the U.S. Trade Representative concluded the

negotiations of the Anti-Counterfeiting Trade Agreement

(ACTA) with 38 countries, representing over 50% of

global trade.

More at http://www.whitehouse.gov/blog/2011/02/07/

progress-intellectual-property-enforcement-strategy

Digital Agenda: Commission to Step Up

Efforts to Safeguard Children Online

By Staff Writer, Europa

On the occasion of Safer Internet Day 2011, the European

Commission today announced that it will step up talks with

ICT industry and children's organizations to encourage the

design of safer products to help keep children safe online.

Moreover, the Commission will shortly review the 2006

Recommendation on minors and how to protect them in

audiovisual media and Internet and on the 2008

Communication on the protection of youngsters from harmful

content in video games.

Children are going online from a younger age and not just from

computers, but also games consoles and mobile phones. More

than 82 % of 15-16 year olds in Europe have a social

networking profile, as well as 26 % of 9-10 year olds. Safer

Internet Day is being marked today in more than 65 countries

around the world under the slogan "Internet is more than a

game, it's your life!".

This is supported by the EU's Safer Internet Programme,

which helps parents and their children to be safe online.

Children's safety online is an important part of the Digital

Agenda for Europe.

Neelie Kroes, Vice President of the European Commission for

the Digital Agenda said: ―It is hard for parents to ensure their

children are always safe online, especially as youngsters now

access the Internet not just from PCs, but also via smart

phones and games consoles.

This places greater responsibility on the ICT industry to

provide products and services that protect and empower

children online. We have worked productively with social

networks and mobile operators. Now we call on the whole

chain of ICT industry to work together to do more to safeguard

children online."

More at http://europa.eu/rapid/pressReleasesAction.do?

reference=IP/11/135&format=HTML&aged=0&language=EN&g

uiLanguage=en

Page 13: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 13 Volume 10, Issue 6 February 11, 2011

New Reports and Papers

On-line Threats a Fundamental Weakness

in Australian Security

By Nicole Quinn, Kokoda Foundation

A Kokoda Foundation report, Optimising Australia's

Response to the Cyber Challenge, to be released today has

found that cyber security has become the fundamental

weakness in Australia's national security, and that the threat

is poorly understood by politicians, business people and the

general public.

Authored by former Deputy Chief of Air Force John

Blackburn and strategic consultant Gary Waters, the report

says that Australia has reached a tipping point where the

current trajectory of cyber responses is being rapidly

outpaced by the evolving threat.

―A broader understanding of the nature, scale and extent of

on-line threats to private information is crucial to the

ongoing security of this country,‖ said Mr Blackburn.

The report concludes that whilst progress in implementing

the government‘s 2009 Cyber Security Strategy has been

laudable, Australia is not keeping pace with the growing

threat and as a result our collective and individual security is

being placed at risk.

The Future of Computing Performance:

Game Over or Next Level?

By Samuel H. Fuller and Lynette I. Millett, Committee on Sustaining Growth in Computing Performance & National Research Council

Summary

Information technology (IT) has the potential to continue to

dramatically transform how we work and live. One might

expect that future IT advances will occur as a natural

continuation of the stunning advances that IT has enabled over

the last half-century, but reality is more sobering.

IT advances of the last half-century have depended critically on

the rapid growth of single processor performance—by a factor

of 10,000 in just the last 2 decades—at ever-decreasing cost

and with manageable increases in power consumption. That

growth stemmed from increasing the number and speed of

transistors on a processor chip by reducing their size and—

with improvements in memory, storage, and networking

capacities—resulted in ever more capable computer systems. It

was important for widespread IT adoption that the

phenomenal growth in performance was achieved while

maintaining the sequential stored-program model that was

developed for computers in the 1940s.

Moreover, computer manufacturers worked to ensure that

specific instruction set compatibility was maintained over

generations of computer hardware—that is, a new computer

could run new applications, and the existing applications

would run faster.

Thus, software did not have to be rewritten for each hardware

generation, and so ambition and imagination were free to drive

the creation of increasingly innovative, capable, and

computationally intensive software, and this in turn inspired

businesses, government, and the average consumer to buy

successive generations of computer software and hardware.

Software and hardware advances fed each other, creating a

virtuous IT economic cycle.

More at http://www.nap.edu/catalog.php?record_id=12980

More than a million computers in Australia each year are said

to be infected by viruses that can be used to bring down a

website or network, while Australia has the fifth-highest level

of malware infections in the world.

―This is an issue that is just as important to Mums and Dads

and small business operators as it is to governments,

bureaucrats and corporations, ‖ said Mr Waters.

According to Paul O‘Rourke, Security Lead for Accenture

Australia, the issue of security has moved from being just a

technical issue, and has risen in prominence within local

organizations.

―Security needs to be assessed as a broad-based business

problem, and not just a technical issue, as it has reputational

and transactional implications which are obviously top of

mind for executives and boards,‖ Mr O‘Rourke said.

The Kokoda report warns that such threat could endanger

critical infrastructure such as electricity grids, water storage

and distribution, aviation and maritime transport and

telecommunications networks.

More at http://www.kokodafoundation.org/Resources/

Documents/CyberMediaRelease4February2011.pdf

Page 14: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 14 Volume 10, Issue 6 February 11, 2011

Reports and Papers - (cont.)

Clinical Data as the Basic Staple of Health

Learning: Creating and Protecting a Public

Good: Workshop Summary

By Alex W. Goodby, LeighAnne Olsen, and Michael McGinnis, IOM Roundtable on Evidence-Based Medicine (Series), Institute of Medicine Because of their potential to enable the development of new

knowledge and to guide the development of best practices from

the growing sum of individual clinical experiences, clinical

data represent the resource most central to healthcare progress

(Arrow et al., 2009; Detmer, 2003).

Whether captured during product development activities such

as clinical research trials and studies, or as a part of the care

delivery process, these data are fundamental to the delivery of

timely, appropriate care of value to individual patients—and

essential to building a system that continually learns from and

improves upon care delivered.

The opportunities for learning from practice are substantial,

from improved understanding of the effects of different

treatments and therapies in specific patient subpopulations, to

developing and refining practices to streamline or tailor care

processes for complex patients, to the development of a

delivery system that can advance the evidence base on novel

The Future of Computing Performance:

Game Over or Next Level?

By Samuel H. Fuller and Lynette I. Millett, Committee on Sustaining Growth in Computing Performance & National Research Council

Summary

Information technology (IT) has the potential to continue to

dramatically transform how we work and live. One might

expect that future IT advances will occur as a natural

continuation of the stunning advances that IT has enabled over

the last half-century, but reality is more sobering.

IT advances of the last half-century have depended critically on

the rapid growth of single processor performance—by a factor

of 10,000 in just the last 2 decades—at ever-decreasing cost

and with manageable increases in power consumption.

That growth stemmed from increasing the number and speed

of transistors on a processor chip by reducing their size and—

with improvements in memory, storage, and networking

capacities—resulted in ever more capable computer systems. It

was important for widespread IT adoption that the

phenomenal growth in performance was achieved while

maintaining the sequential stored-program model that was

developed for computers in the 1940s.

Moreover, computer manufacturers worked to ensure that

specific instruction set compatibility was maintained over

generations of computer hardware—that is, a new computer

could run new applications, and the existing applications

would run faster.

Thus, software did not have to be rewritten for each hardware

generation, and so ambition and imagination were free to

drive the creation of increasingly innovative, capable, and

computationally intensive software, and this in turn inspired

businesses, government, and the average consumer to buy

successive generations of computer software and hardware.

Software and hardware advances fed each other, creating a

virtuous IT economic cycle.

More at http://www.nap.edu/catalog.php?record_id=12980

diagnostic and therapeutic techniques Furthermore, U.S. per

capita healthcare costs are now nearly double that of

comparable nations (Health care spending in the United tates

and OECD countries, 2007), and broader access and use of

existing and future clinical data may be a key opportunity to

better understand and address system-wide factors— such as

waste and inefficiencies—that contribute to rising healthcare

expenditures.

Clinical data now reside in many often unconnected and

inaccessible repositories, making linkage, analysis, and

interpretation of these data challenging on an individual or

population level.

The increase in potentially interoperable electronic and

personal health datasets—integrated with laboratory values,

diagnostic images, and patient demographic information and

preferences—and development of approaches to link and

network these data offer even greater opportunity to create and

use rich data resources to help transform healthcare delivery

and improve the public‘s health. Concerns about privacy of

health data, as well as the treatment of medical data—even

those generated with public funds—as proprietary goods pose

additional challenges to data use.

More at http://books.nap.edu/catalog.php?record_id=12212

Page 15: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 15 Volume 10, Issue 6 February 11, 2011

Reports and Papers - (cont.)

Rethinking Knowledge Work: A Strategic Approach

Knowledge Workers’ Information Needs Vary. The Key to Better Productivity is Applying Technology More Precisely.

By Thomas H. Davenport, McKinsey Quarterly In the half-century since Peter Drucker coined the term

―knowledge workers,‖ their share of the workforce has steadily

grown—and so has the range of technology tools aimed at

boosting their productivity.

Yet there‘s little evidence that massive spending on personal

computing, productivity software, knowledge-management

systems, and much else has moved the needle. What‘s more, a

wide variety of recent research has begun suggesting that

always-on, multitasking work environments are so distracting

that they are sapping productivity. (For more on this problem,

see ―Recovering from information overload.‖)

After researching the productivity of knowledge workers for

years, I‘ve concluded that organizations need a radically

different approach. Yes, technology is a vital enabler of

communication, of collaboration, and of access to rising

volumes of information. But least-common-denominator

Most Americans Favor Electronic Medical

Records: Study

Despite Privacy Concerns, More Than Three

Quarters of Americans Favor the Use of

Electronic Medical Records, According to a New

Study.

By Bernd Debusmann Jr., Reuters

Researchers from the University of Chicago who polled 1,000

people found that while nearly half said they had worries about

the privacy of electronic medical records but 64 percent

thought the benefits of being able to access their records online

outweighed those concerns.

"Our core finding is that a large majority of Americans support

use of health IT to improve healthcare and safety, and reduce

costs," said Daniel Gaylin, executive vice president for research

at the university's National Opinion Research Center.

"This suggests that government and industry efforts to

increase the effectiveness and use of health IT are generally

consistent with the public's wishes."

Gaylin and Adil Moiduddin, one of the authors of the study,

described the results as notable because they show that many

Americans back government efforts to ensure that all

Americans have electronic medical records by 2014. President

Barack Obama set aside $20 billion for a plan that provides for

health care to be modernized to eventually reduce costs.

But the program, part of Obama's stimulus plan, the Recovery

Act of 2009, is being questioned by the new, Republican-

dominated Congress. "Prior to the Recovery Act, there was a

sense that investment in health IT and government promotion

of it was generally seen as a positive thing. This is still basically

the case, but many elements of the Recovery Act (including

health IT adoption provisions) are undergoing serious scrutiny

in the new Congress," Moiduddin said.

More at http://www.reuters.com/article/2011/02/08/us-

records-electronic-idUSTRE7174QS20110208

approaches involving more technology for all have reached a

point of diminishing returns. It‘s time for companies to

develop a strategy for knowledge work—one that not only

provides a clearer view of the types of information that workers

need to do their jobs but also recognizes that the application of

technology across the organization must vary considerably,

according to the tasks different knowledge workers perform.

Few executives realize that there are two divergent paths for

improving access to the information that lies at the core of

knowledge work.

The most common approach, giving knowledge workers free

access to a wide variety of tools and information resources,

presumes that these employees will determine their own work

processes and needs.

The other, the structured provision of information and

knowledge, involves delivering them to employees within a

well-defined context of tasks and deliverables. Computers send

batches of work to employees and provide the information

needed to do it.

More at http://www.mckinseyquarterly.com/Organization/

Strategic_Organization/

Rethinking_knowledge_work_A_strategic_approach_2739

Page 16: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 16 Volume 10, Issue 6 February 11, 2011

Reports and Papers - (cont.)

Open Data: Empowering the Empowered of

Effective Data Use for Everyone?

By Dr. Michael Gurstein, Executive Director of the Centre for

Community Informatics Research, Development and Training

in Vancouver, Canada; published by First Monday.

Abstract

This paper takes a supportive but critical look at ―open data‖

from the perspective of its possible impact on the poor and

marginalized and concludes that there may be cause for

concern in the absence of specific measures being taken to

ensure that there are supports for ensuring a wide basis of

opportunity for ―effective data use.‖ The paper concludes by

providing a seven element model for how effective data use can

be achieved.

The Open Data Movement

The open data movement in the area of access to public (and

other) information is a relatively new but very significant, and

potentially powerful, emerging force.

It has now been widely endorsed by, among others, Tim

Berners–Lee, often referred to as the father of the World Wide

Web. The overall intention is to make local, regional and

national data (and particularly publicly acquired data)

available in a form that allows for direct manipulation using

software tools as for example, for the purposes of cross

tabulation, visualization, mapping and so on.

The underlying idea is that public (and other) data, whether

collected directly as part of a census collection or indirectly as

a secondary output of other activities (crime or accident

statistics, for example) should be available in electronic form

and accessible via the Web.

There are significant initiatives in this area underway in the

U.S., the U.K. and Canada among many other jurisdictions and

as part of a wide variety of not–for–profit initiatives as well.

This drive towards increased public transparency and allowing

for enhanced data–enriched citizen/public engagement in

policy and other analysis and assessment is certainly a very

positive outcome of public computing and online tools for data

management and manipulation. However there would appear

to be some confusion between movements to enhance citizen

―access‖ to data and the related issues concerning enhancing

citizen ―use‖ of this data.

More at http://firstmonday.org/htbin/cgiwrap/bin/ojs/

index.php/fm/article/view/3316/2764

Consider the Censor

By Derek E. Bambauer, Wake Forest Journal of Law & Policy,

Forthcoming Brooklyn Law School, Legal Studies Paper

Abstract

WikiLeaks is frequently celebrated as the whistleblowing heir

of the Pentagon Papers case. This Essay argues that portrayal

is false, for reasons that focus attention on two neglected

aspects of the case.

First, the New York Times relied on a well-defined set of

ethical precepts shared by mainstream journalists to

contextualize the Papers and to redact harmful information.

Second, American courts acted as neutral arbiters of the

paper‘s judgment, and commanded power to enforce their

decisions. WikiLeaks lacks both protective functions to

regulate its disclosures. The Essay suggests that WikiLeaks is a

bellwether: an exemplar of the shift in power over data

generated by plummeting information costs.

While that trend cannot realistically be reversed, the Essay

offers two responses to the problems that WikiLeaks and its

progeny create.

First, established media outlets must continue to act as

gatekeepers governed by strong journalistic ethics, even in an

environment of ubiquitous access to raw data.

Second, governments should consider, and debate, the

possibility of using technological countermeasures –

cyberattacks – against intermediaries threatening to disclose

especially harmful data. There are times when the censor

should win.

Nixon could have won. This is the key lesson from the

Pentagon Papers case, as the recent controversy over

WikiLeaks demonstrates. The fight between Daniel Ellsberg,

the New York Times, and the administration of President

Richard Nixon is typically celebrated as a triumph for free

speech, and for transparency in government.

More at http://papers.ssrn.com/sol3/papers.cfm?

abstract_id=1757890&http://papers.ssrn.com/sol3/

papers.cfm?abstract_id=1757890##

Page 17: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 17 Volume 10, Issue 6 February 11, 2011

Reports and Papers - (cont.)

Health and Well-Being in the Home: A

Global Analysis of Needs, Expectations, and

Priorities for Home Health Care Technology

By Soeren Mattke, Lisa Klautzer, Tewodaj Mengistu, Jeffrey

Garnett, Jianhui Hu, Helen Wu. Published by RAND.

Background

An increasing number of countries are experiencing the so-

called ―epidemiological transition‖: Chronic diseases with the

need for long-term treatment have begun to replace infections

as the primary cause of death in these aging societies. This

shift is not confined to the developed world.

While noncommunicable diseases accounted for 44 percent of

the burden of disease in low- and middle-income countries in

2002, it has been estimated that, by 2030, this share will

reach 54 percent.

As a result, there is growing concern about the sustainability of

the current system of health care delivery, which is

compounded by rapidly rising costs and workforce shortages.

This concern has triggered an interest in approaches to

mitigate the impact of chronic disease and disability on

population health, economic productivity, and health care

spending.

Several medical and technological innovations have

theoretically framed this challenge as an opportunity and have

caused the health care sector to rethink current paradigms of

health care delivery.

For example, promoting tools for aging in place and for

transforming the current provider-driven model into a patient-

centric system not only would objectively improve health

status but would also enable patients with chronic conditions

to live an active and fulfilling life as an integrated segment of

society.

Advances in home health care products and services are

attractive, promising, and, perhaps, even necessary solutions

to mitigate the current pressure on the health care system

while improving the patients‘ well-being beyond the

physiological parameters of disease control.

These innovations allow the shifting of care from institutional

and professional settings to patients‘ homes.

More at http://www.rand.org/content/dam/rand/pubs/

occasional_papers/2010/RAND_OP323.sum.pdf

Online Privacy as a Corporate Social

Responsibility: An Empirical Study

By Irene Pollach, Business Ethics: A European Review, Vol.

20, Issue 1

Abstract

Information technology and the Internet have added a new

stakeholder concern to the corporate social responsibility

(CSR) agenda: online privacy.

While theory suggests that online privacy is a CSR, only very

few studies in the business ethics literature have connected

these two. Based on a study of CSR disclosures, this article

contributes to the existing literature by exploring whether and

how the largest IT companies embrace online privacy as a CSR.

The findings indicate that only a small proportion of the

companies have comprehensive privacy programs, although

more than half of them voice moral or relational motives for

addressing online privacy. The privacy measures they have

taken are primarily compliance measures, while measures that

stimulate a stakeholder dialogue are rare. Overall, a wide

variety of approaches to addressing privacy was found, which

suggests that no institutionalization of privacy practices has

taken place as yet. The study therefore indicates that online

privacy is rather new on the CSR agenda, currently playing

only a minor role.

More at http://papers.ssrn.com/sol3/papers.cfm?

abstract_id=1754812

Figures of the Week

7 out of 10 & 52% Number of Facebook members and Google users,

respectively, who say they are either "somewhat" or

"very concerned" about their privacy while using the

world's most popular social network and dominant

search engine, according to results of a USA TODAY/

Gallup Poll.

Page 18: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 18 Volume 10, Issue 6 February 11, 2011

Reports and Papers - (cont.)

Shaping Preventive Policy in “Cyber War”

and Cyber Security: A Pragmatic Approach

By Tony Guo, University of Miami

Abstract

As the Egyptian government took the country offline—in an effort to squelch public dissent—the U.S. Senate considers a bill that would give the President the same emergency powers to shut off ―critical‖ Internet infrastructure in the event of a ―cyber emergency.‖ This bill, along with others like it, has been introduced in light of recent political rhetoric on ―cyber war.‖ The proponents of ―cyber war‖ evoke images of large explosions, poison gas clouds, and a high degree of mortality.

In reality, cyber warfare is a misleading metaphor, and has long been confused with crime and espionage. "Cyber war" is not an issue of war, but an issue of security--systems security, network security, and due diligence on part of its operators.

The majority of security breaches today are as a result of systems failure and human error, and the legal responses considered should be limited to such.

This comment acknowledges that cyber security is relevant to national security, but makes the point that sweeping legislation may have the same effect as the cyber attacks they seek to

address—both may have devastating effects on the economic vitality of the nation.

On January 28th, 2011, Egypt disappeared from the global

map. In a coordinated shutdown of all major Egyptian

internet service providers--an effort by its government to

squelch public dissent--virtually all of Egypt‘s Internet

addresses became unreachable worldwide. The action was

unprecedented in Internet history.

Across the globe, the U.S. Senate is currently considering a bill

that would give the President the same power to shutdown

―critical‖ Internet infrastructure in the event of a ―national

cyber emergency.‖ This bill and others like it were introduced

in light of the political rhetoric on ―cyber war.‖

In recent years, ―cyber war‖ has emerged as one of the nation‘s

most widely publicized national-security concerns.

"In the past, you would count the number of bombers and the

number of tanks your enemy had. In the case of cyber war, you

really can't tell whether the enemy has good weapons until the

enemy uses them," says Richard Clarke, former chairman of

the White House Critical Infrastructure Protection Board.

More at http://works.bepress.com/tony_guo/2/

Privacy and Security

Internet Tracking May Threaten Privacy

Rights, EU’s Reding Says

By Stephanie Bodoni, Bloomberg

European Union regulators are concerned individual privacy

rights are threatened by mobile phone and computer products

that monitor online activities.

―I am concerned about the use of highly privacy-intrusive

tracking technologies,‖ EU Justice Commissioner Viviane

Reding said in a speech in Brussels today.

―Mobile phones and computers have become tracking devices.

We no longer range unseen across the net.‖

Reding proposed in November an overhaul of the 27-nation

region‘s almost 16-year-old data protection rules to adapt them

to online advertising and social-networking sites such as

Facebook Inc.

The new law, which the commission may propose later this

year, may include stricter sanctions, such as criminal penalties,

and the possibility for consumer groups to file lawsuits.

Tracking technologies have ―serious consequences‖ for people

and can lead to criminal penalties for people or cause them to

being blocked or disconnected from the Internet in an

―unauthorized‖ manner, said the EU commissioner today.

Reding, 59, said ―recent events‖ in Egypt have shown

governments can ―manipulate and censor the Internet to crush

dissent,‖ and she urged nations to let journalists use the

Internet to ―speak out‖ and allow people share their thoughts

and feelings.

―The Internet cannot be used as a tool of oppression,‖ she said.

More at http://www.bloomberg.com/news/2011-02-09/

internet-tracking-may-threaten-privacy-rights-eu-s-reding-

says.html

Page 19: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 19 Volume 10, Issue 6 February 11, 2011

Calendar

FEBRUARY 14—16, 2011 Defending America’s Interests at Home and Abroad. This forum will discuss preparedness, incident management, threat reduction, advanced technologies, interoperability, and medical countermeasures to prevent, detect, protect against, and respond to chemical, biological, radiological, nuclear, and high-yield explosives attack.

Location: Sheraton Premiere at Tysons Corner Hotel, Vienna, VA.

More at http://cbrnevent.com/Event.aspx?id=408522

FEBRUARY 16, 2011

2:00 PM - 3:00 PM EST. What Local Health Departments Need to Know about Meaningful Use. This Web seminar presents the most up-to-date information about Meaningful Use criteria and meeting incentive eligibility.

Location: Online

More at https://www1.gotomeeting.com/register/574331160

FEBRUARY 16, 2011 Cyber Security: Legal and Policy Issues. Not only will internationally recognized subject matter experts provide the latest developments regarding the threat posed by cyber attacks as it impacts national security, law enforcement, and the business community, the conference will also concentrate on identifying all of the myriad legal and policy challenges associated with each of these fields of interest. Location: St. Mary‘s University, San Antonio, TX. More at https://www.stmarytx.edu/ctl/pdf/Cyber_conf11.pdf

February

Sun Mon Tue Wed Thu Fri Sat

30 31 01 02 03 04 05

06 07 08 09 10 11 12

13 14 15 16 17 18 19

20 21 22 23 24 25 26

27 28 01 02 03 04 05

06 07 08 09 10 11 12

Featured Conference

of the Week

Public Media and Political

Influence: Lessons for the Future of

Journalism from Around the World

February 15, 2011 6:00—8:00PM

Public media in America are weathering new attacks on their funding and independence, at the same time they are being asked to fill the widening news and information gap left by the shifting media landscape.

At the heart of these attacks is a question: Can government play a positive role in helping promote quality, independent journalism?

In a new international study of public media systems in 14 leading democracies, NYU media scholars Rodney Benson and Matthew Powers analyze the concrete ways that other countries fund and protect the autonomy of their public media.

Their findings may surprise you.

Location:

20 Cooper Square, New York, NY

NYU Journalism 7th Floor Commons

More at http://www.nyu.edu/ipk/events/152

On February 15, NYU School of Journalism hosts a discussion on the

struggles of public media funding in America. Rodney Benson and Matthew

Powers, present, with panel discussions by Emily Bell, Director, Columbia

University Tow Center for Digital Journalism; Ellen Goodman, Professor of

Law, Rutgers University; and Hartmut Wessler, Professor, University of

Mannheim Department of Communication.

Page 20: FTC Commissioner: If Companies Don‘t Protect Privacy, We ... · By Bernie Monegain, Editor, Healthcare IT News The laboratory information systems (LIS/LIMS) market will grow in

Page 20 Volume 10, Issue 6 February 11, 2011

Sites Compendium www.arstechnica.com

www.theatlantic.com

www.bepress.com

www.bloomberg.com

www.computerworld.com

www.fco.gov.uk

www.firstmonday.org

www.georgetown.edu

www.govinfosecurity.com

www.healthcareitnews.com

www.ihealthbeat.org

www.informationweek.com

www.kokodafoundation.org

www.mckinseyquarterly.com

www.modernhealthcare.com

www.newyorker.com

www.nytimes.com

www.prnewswire.com

www.reuters.com

www.ssrn.com

www.sfgate.com

www.whitehouse.gov

www.wsj.com

Book Notice

The National Security Enterprise

Navigating the Labyrinth Edited by Roger Z. George, Harvey Rishikof, Foreword

by Lt. Gen. Brent Scowcroft, USAF (Ret)

Recent breakdowns in American

national security have exposed the

weaknesses of the nation‘s vast

overlapping security and foreign

policy bureaucracy and the often

dysfunctional interagency process.

In the literature of national security

studies, however, surprisingly little

attention is given to the specific

dynamics or underlying

organizational cultures that often

drive the bureaucratic politics of

U.S. security policy.

The National Security Enterprise offers a broad overview and

analysis of the many government agencies involved in national

security issues, the interagency process, Congressional checks

and balances, and the influence of private sector organizations.

The chapters cover the National Security Council, the

Departments of Defense and State, the Office of the Director of

National Intelligence, the Central Intelligence Agency, the

Federal Bureau of Investigation, the Department of Homeland

Security, and the Office of Management and Budget. The book

also focuses on the roles of Congress, the Supreme Court, and

outside players in the national security process like the media,

think tanks, and lobbyists.

About the Editors

Roger Z. George teaches national security policymaking at

Georgetown University and the National War College. He has

also worked at the CIA, National Intelligence Council, the State

Department's Policy Planning Staff, and the Office of the

Secretary of Defense.

Harvey Rishikof is a professor of law and national security

studies at the National War College and the chair of the

American Bar Association Standing Committee on law and

national security.

More at http://press.georgetown.edu/detail.html?

id=9781589016989

Research and Selection: Stefaan Verhulst

Production: Kathryn Carissimi & Lauren Hunt

Please send your questions, observations and suggestions to

[email protected]

The views expressed in the Weekly Digest do not

necessarily reflect those of the Markle Foundation.