Finding the Best of the Imperfect Alternatives for Privacy, Health IT, and Cybersecurity Peter Swire Moritz College of Law Wisconsin Symposium in Honor.

Slides:



Advertisements
Similar presentations
Tamtron Users Group April 2001 Preparing Your Laboratory for HIPAA Compliance.
Advertisements

Why the Financial Privacy Law is Better than People Think Professor Peter P. Swire Ohio State University University of Minnesota Symposium February 9,
The United States, Privacy, and Data Protection Peter P. Swire Dutch Embassy Presentation January 19, 2001.
HIPAA In Relation to Other Federal Laws Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP Glasser LegalWorks/HIPAA Conference.
Better Security and Privacy for Home Broadband Peter P. Swire Moritz College of Law The Ohio State University Morrison & Foerster LLP Privacy 2002 Conference.
"Embedding Privacy in Federal Information Systems" Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP MITRE Corp. Workshop.
Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.
Privacy in America: Your Role as Guardians of the Publics Data Professor Peter P. Swire Moritz College of Law The Ohio State University Ohio Digital Government.
Privacy and the Use of Cost/Benefit Analysis Professor Peter Swire Ohio State University FTC Workshop on Information Flows June 18, 2003.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Research and Privacy Under HIPAA Professor Peter P. Swire Moritz College of Law Ohio State University National Academy of Science Panel on Science, Technology.
Trust Over Time on the Internet Peter Swire Moritz College of Law Penn Law School Symposium on the Evolving Internet October 19, 2012.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
Trustwrap: The Importance of Legal Rules to E-Commerce and Internet Privacy Professor Peter P. Swire Moritz College of Law The Ohio State University Enforcing.
Some U.S. Legal Developments Relevant to Consumer & Copyright Law Professor Peter P. Swire Moritz College of Law The Ohio State University Amsterdam, IVR.
Why the Right to Data Portability Likely Reduces Consumer Welfare: Antitrust and Privacy Critique Peter Swire Moritz College of Law Yale Law School Information.
Why the Right to Data Portability Likely Reduces Consumer Welfare: Antitrust and Privacy Critique Peter Swire Moritz College of Law Attorneys General Education.
Reflections on the White House Privacy Office Peter P. Swire Ohio State University Center for American Progress N.C. State Privacy Day January 29, 2008.
A New Framework for Protecting Consumers on the Internet Peter P. Swire Ohio State University & Center for American Progress Center for American Progress.
Accra, Ghana October 19-23, Extending Health Insurance: How to Make It Work Design Element 7: Health Insurance Scheme Operations October 21, 2009.
Overview of the Regulation of Investigatory Powers Act 2000 Andrew Charlesworth University of Warwick 10 June 2002.
IT Security Policy Framework
EHealth Privacy & Security Closing Remarks Brenda Kelley AARP CT 4/20/2009.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Health Insurance Portability and Accountability Act (HIPAA)
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
The Federal Reserve System Shuffle A Federal Reserve Centennial Lesson that illustrates change over time (1945 to 1987).
Accessing Valid Health Information, Products, and Services
2 HIPAA, HITECH, and Medical Records. Learning Outcomes When you finish this chapter, you will be able to: 2.1Discuss the importance of medical records.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
Lecture 14 Policy, Legal, and Regulatory Issues in HIS (Chapters 18,19,20)
Health Information Technology Nationwide Activities and Issues Roy H. Wyman, Jr. May 7, 2009.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
HIPAA The Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) The 104 th Congress passed the Act, Public Law ,
Can We Have EHRs and Privacy Too? Dr. Alan F. Westin Professor of Public Law and Government Emeritus, Columbia University; Principal, Privacy Consulting.
PRIVACY AND HIPAA THE RIGHT THING TO DO. WHAT’S WRONG WITH THIS PICTURE? ? “ Did you hear that Jane from the 5 th floor is in the hospital?” “No!! Let’s.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Enforcing Competition on the Internet Howard Shelanski Georgetown University February 13, 2012.
Law and Economics-Charles W. Upton The Coase Theorem.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
1 Stigler : The Economists’ Traditional Theory of the Economic Functions of the State 1. Schizophrenic view 2. 19th C. economists had developed theory.
Where Did HIPAA Come From? “HIPAA Then and Now” Peter Swire Georgia Tech Scheller College of Business Alston & Bird LLP IAPP-Las Vegas 2015.
A LAW AND ECONOMICS PERSPECTIVE ON INJUNCTIVE RELIEF Anthony Ogus Louis Visscher.
Markets, Firms and Consumers Lecture 2- Theory of the Firm.
Economic Systems Three Basic Questions Due to scarcity, individuals, governments, and businesses, must make decisions about what to produce. The type.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
TOWARDS BETTER REGULATION: THE ROLE OF IMPACT ASSESSMENT COLIN KIRKPATRICK IMPACT ASSESSMENT RESEARCH CENTRE UNIVERSITY OF MANCHESTER, UK UNECE Symposium.
Changes in Health Care Beth Sammis Deputy Insurance Commissioner October 16, 2009.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
College of Public Health and Human Sciences Communicating About Public Health Policy Presenter: Craig Mossbaek Date: August 22, 2013 Public Health Policy.
Privacy Advisory Services … … A Best Practices, Integrated Approach Insert Firm Name Here.
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
Bringing Health Information to Life DAVID BLUMENTHAL, MD, MPP National Coordinator of Health Information Technology US Department of Health & Human Services.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Overview of ONC Report to Congress on Health Information Blocking Presented to the Health IT Policy Committee, Task Force on Clinical, Technical, Organizational,
C H A P T E R 5. CHAPTER ISSUE How well do Canada’s immigration laws and policies respond to immigration issues? CHAPTER TASK Create a storyboard about.
Privacy Déjà Vu: Crypto, Government Surveillance and Safe Harbor, Peter Swire Georgia Tech/Alston & Bird IAPP Summit April 4, 2016.
© 2014 By Katherine Downing, MA, RHIA, CHPS, PMP.
South African Perspective Cynthia Matshiakgotshi Head Of Department – Credit Information.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Welcome to Law A Level By the end of this course you will:
Health Care: Privacy in a Digital Age
Government’s Role in Economy
Individual Rights and Federal Preemption of State Privacy Laws
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
La voix des Consommateurs à travers le monde
Principles of Government
Part D-I The Economics of Tort Law
Presentation transcript:

Finding the Best of the Imperfect Alternatives for Privacy, Health IT, and Cybersecurity Peter Swire Moritz College of Law Wisconsin Symposium in Honor of Neil Komesar October 20, 2012

To Begin 2003 Law of Cybersecurity Course Theory and practice

Overview Market and government failures Examples HIPAA medical privacy Health IT and 2009 funding Internet privacy Cybersecurity Role of courts Conclusion

The Test of a First-Rate Intelligence Market failures and welfare economics Government failures and public choice Coase and Williamson The test of a first-rate intelligence These two ideas all-too-often incompatible, at least in D.C. My ultimate goal is to aid the reformation of society So, I suggest the following description …

A Raging Moderate Passionate commitment to reform society Acute awareness of market failures Acute awareness of government failures I find this congenial OIRA does as well

HIPAA Privacy Rule HHS reg Clearly had flaws But Congress couldnt do it And electronic payments compelled action, so Tasks that strain the abilities of an institution may wisely be assigned to it anyway if the alternatives are worse

Health IT in ARRA Bipartisan support for EHRs, not manila folders Need standards for interoperability The market didnt do it, even with jawboning Recovery Act $19 billion Meaningful use Tipping point for adoption, so The analysis converges with Ronald Coases famous transaction cost approach

Internet Privacy Market failure – hard for consumer to monitor data flows Government failure – hard to dictate acceptable technology, quickly and accurately 1997 paper on Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information But, self-regulation only works here when have a credible threat of government action, so … Speaking prose

Cybersecurity 2003 course Market failures – externalities Government failures – like privacy only worse First, do no harm – dont create backdoors to help surveillance Large bank CISO, so Quite commonly … institutions move together

The Courts Some information policy issues have specific factual triggers and/or harms Defamation Data breach Violate a promise – Section 5 FTCA IP and infringement Many, though, concern design of complex, fast- changing IT systems Judicial management through structural reform suits? Im skeptical.

Conclusion Imperfect Alternatives and 2003 course An analytic approach for a wide range of issues And, a call for something too rare in a divided political world, the passion and humility of raging moderation