Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Conclusion
The medical sector requires more and more data for statistical purposes. The privacy requirements have to be fully integrated in any infrastructure dealing with e-health. But loyalty cards, credit cards or cellular phone operators collect large amounts of information about customers too. Such information can be used for accessing health-related information. For instance, Mrs. X has bought a pregnancy test; Mr. Z was in the left wing of the hospital at 10:00 am and had a scan two hours later, hence he probably has cancer. Such indirect health data have a similar level of confidentiality and should be treated as such by their owners. This risk can be excluded by systematically anonymizing data.
The approach described in this chapter shows how cryptographic methods and non-identifying pseudonyms can, in special situations, be used to guarantee to some extent that identifying information cannot be used for purposes other than originally intended, while still allowing for statistical information to be drawn from the whole set of data. This is a relevant finding for the purpose of this deliverable, since it shows that identification data need not necessarily be processed even when exploiting new opportunities of electronic data processing.
Governments can exploit the potential of ICT to improve service delivery for citizens in eGovernment, but it is not always necessary for governments to process and store identifying data. For certain purposes, the identity knowledge of governments need not necessarily be enlarged, which is particularly relevant if sensitive data – such as medical data – are concerned. The technical approach sketched in this chapter could therefore be used in and adapted to new fields of application in public service delivery, as a privacy-enhancing technology.
40 / 45 |