Chapter Overview
Biosurveillance entails the collection and analysis of information needed to provide early warning of outbreaks of infectious disease, both naturally occurring and intentionally introduced. Data derived from repositories containing various types of sensitive information may be required for this purpose, including individually identifiable, copyrighted, and proprietary information. The Project Argus Biosurveillance Doctrine was developed to ensure that ethical and legal principles guide the collection and handling of such information. Project Argus does not, however, use individually identifiable information or any material derived from individually identifiable information for any phase of the project. Further, Project Argus is not used for purposes of law enforcement, counterterrorism, or public health surveillance. This chapter details why and how the doctrine was developed and summarizes its guiding principles and key elements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wilson, J., Polyak, M., Blake, J., and Collmann, J. A Heuristic Indication and Warning Staging Model for Detection and Assessment of Biological Events. Journal of American Medical Informatics Association 15(2) (2008 Mar/Apr), 158–171.
Fisher, K., Hogstedt, K., Rogers, A., and Smith, F. (2002). Hancock 2.0.1 Manual, AT&T Labs Shannon Laboratory http://www.research.
Odom, W.E. (2003). Fixing Intelligence for a More Secure America. New Haven, CT:Yale University Press.
Department of Health and Human Services; Office of the Secretary. (2002). Final Rule.45 CFR Part 160, 162, and 164, standards for privacy of individually identifiable health information. Federal Register 67, no. 157 (14 August), 53181–53273.
Department of Health and Human Services; Office of the Secretary. (2003) Final rule. 45CFR Part 160, 162, and 164, security standards. Federal Register 68, no. 34 (20 February),8333–8381.
Crews, Jr., C. The Pentagon’s total information awareness project: Americans under the microscope? National Review Online, (2002 25 November).
Cooper, T., and Collmann, J. (2005). Managing Information Security and Privacy in Health Care Data Mining. In, Advances in Medical Informatics: Knowledge Management and Data Mning in Biomedicine, New York, NY: Springer Science; pp. 95–137.
Defense Advanced Research Projects Agency; Information Awareness Office. (2003).Report to Congress regarding the terrorist information awareness program: in response to consolidated appropriations resolution, Pub. L. No. 108-7, Division M, § 111(b); 20 May.
Department of Defense; Office of the Inspector General, Information Technology Management. (2003). Terrorist information awareness program. Report D-2004–033; 12 December.
Department of Health and Human Services; Office for Human Research Protections.(2004). Guidance on research involving coded private information or biological specimens. 10 August. Available at http://www.hhs.gov/ohrp/humansubjects/guidance/cdebiol.pdf.
Department of Health and Human Services; National Institutes of Health Office for Protection from Research Risks. (2001). Protection of human subjects. 45 C.F.R. § 46.
Department of Health and Human Services. (2003). Protecting personal health information in research: understanding the HIPAA privacy rule. NIH publication no. 03–5388.
Federal Trade Commission. (1999). In brief: the financial privacy requirements of the Gramm-Leach-Bliley Act. Available at http://www.ftc.gov/bcp/conline/pubs/buspubs/glbshort.htm.
Fisher, K., Hogstedt, K., Rogers, A., and Smith, F. (2002). Hancock 2.0.1 Manual. Florham Park, NJ: AT&T Labs Shannon Laboratory.
Mack, G., Bebee, B., Shafi, I., Wenzel, G., Medairy, B., and Yuan, E. (2002) Total Information Awareness Program (TIA) System Description Document (SDD) v1.1.Defense Advanced Research Projects Agency Information Awareness Office. White Paper; 19 July.
National Institutes of Health. (2004). Clinical research and the HIPAA privacy rule. NIH publication no. 04–5495.
Safire, W. You are a suspect The New York Times, (2002 14 November). Available from: http://www.commondreams.org/views02/1114–08.htm.
Simons, B., and Spafford, E. Letter to Honorable John Warner, Chairman, Senate Committee on Armed Forces; (2003 23 January).
Stanley, J., and Steinhardt, B. (2003) Bigger monster, weaker chains: the growth of an American surveillance society. American Civil Liberties Union, Technology and Liberty Program. White Paper.
Sweeney, L. ed. (2003). Navigating computer science research through waves of privacy concerns. Carnegie Mellon University, School of Computer Science, Pittsburgh, Technical report, CMU CS 03–165, CMU-ISRI-03–102.
Taipale, K. Data mining and domestic security: connecting the dots to make sense ofdata. The Columbia Science and Technology Law Review 5 (2003), 5–83.
Taylor, S. Big brother and another overblown privacy scare. Atlantic Online, (2002 10 December).
The Washington Post. Total information awareness. Editorial, (2002 16 November).
Suggested Reading
Cooper, T., and Collmann, J. (2005) Managing Information Security and Privacy in Health Care Data Mining. In, Advances in Medical Informatics: Knowledge Management and Data Mining in Biomedicine, New York, NY: Springer Science; pp. 95–137.
Collmann, J., and Cooper, T. Breaching the Security of the Kaiser Permanente Internet Patient Portal: The Organizational Foundations of Information Security. Journal of the American Medical Informatics Association 14 (2007 Mar), 239–43.
Cooper, T., Collmann, J., and Neidermeier, H. Organizational repertoires and rites in health information security. Cambridge Quarterly of Healthcare Ethics, in press.
Department of Health and Human Services; Office of the Secretary. (2003). Final rule. 45 CFR Part 160, 162, and 164, security standards. Federal Register 68, no. 34 (20 February), 8333–8381.
Department of Health and Human Services. (2003). Protecting personal health information in research: understanding the HIPAA privacy rule. NIH publication no. 03–5388.
Odom, W.E. (2003) Fixing Intelligence for a More Secure America. New Haven, CT:Yale University Press.
Sweeney, L. ed. (2003). Navigating computer science research through waves of privacy concerns. Carnegie Mellon University, School of Computer Science, Pittsburgh, Technical report, CMU CS 03–165, CMU-ISRI-03–102.
Taipale, K. Data mining and domestic security: connecting the dots to make sense ofdata. The Columbia Science and Technology Law Review 5 (2003) 5–83.
Online Resources
US Fair Trade Commission, Fair Information Practice Principles, http://www.ftc.gov/reports/privacy3/fairinfo.shtm
US Department of Commerce, Safe Harbor, http://www.export.gov/safeharbor/sh_overview.html
Health Information Management System Society, HIMSS Privacy and Security Toolkit http://www.himss.org/ASP/privacySecurityTree.asp?faid=78&tid=4#PSToolkit#PSToolkit
US Department of Health and Human Service, HIPAA Privacy Support, http://www.hhs.gov/ocr/hipaa/
US Department of Health and Human Service, HPAA Privacy and Security Rules,http://aspe.hhs.gov/ADMNSIMP/
Caralli, R.A., Stevens, J.F., Wallen, CM., White, D.W., Wilson, W.R., and Young, L.R.Introducing the CERT Resiliency Engineering Framework: Improving the Security and Sustainability Processes, Software Engineering Institute, http://www.sei.cmu.edu/publications/documents/07.reports/07tr009.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Collmann, J., Robinson, A. (2011). Designing Ethical Practice in Biosurveillance. In: Castillo-Chavez, C., Chen, H., Lober, W., Thurmond, M., Zeng, D. (eds) Infectious Disease Informatics and Biosurveillance. Integrated Series in Information Systems, vol 27. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-6892-0_2
Download citation
DOI: https://doi.org/10.1007/978-1-4419-6892-0_2
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-6891-3
Online ISBN: 978-1-4419-6892-0
eBook Packages: MedicineMedicine (R0)