New HIPAA rules on health data, Belgian bank wins AI case, and UK in hot water
By Robert Bateman and Privado.ai
In this week’s Privacy Corner Newsletter:
New HIPAA guidance: Don’t disclose health data via trackers
The Office for Civil Rights (OCR) has revised its guidance on using tracking technologies under the Health Insurance Portability and Accountability Act (HIPAA).
⇒ Is it possible to use tracking technologies without violating HIPAA?
The OCR doesn’t rule out all uses of tracking tech. This latest guidance explains what is and is not allowed under HIPAA.
The guidance is nuanced and distinguishes several types of tracking scenarios. However, one statement is particularly clear:
“...disclosures of PHI to tracking technology vendors for marketing purposes, without individuals’ HIPAA-compliant authorizations, would constitute impermissible disclosures.
⇒ What constitutes a disclosure of PHI?
That’s where the guidance gets more complicated. The OCR distinguishes several tracking use cases, each with different compliance obligations. We’ll focus on these two scenarios:
⇒ Tracking on user-authenticated webpages
“User-authenticated webpages” require users to log in prior to access. The OCR’s guidance is strictest in this context because, in the regulator’s view, using tracking technologies on authenticated webpages can lead to the disclosure of PHI.
The OCR says tracking technologies can access PHI on user-authenticated webpages, including:
Because the user has logged in, it’s easier for vendors to link their identities with information about their health conditions.
As such, if you’re using tracking tech on a user-authenticated webpage, you must meet HIPAA requirements (we’ll look at these below).
⇒ Tracking on unauthenticated webpages
Unlike user-authenticated webpages, people don’t sign into unauthenticated webpages.
The OCR says that tracking technologies on “many” unauthenticated webpages do not have access to PHI. But they might—and if they do, HIPAA applies.
The important thing is whether the information disclosed to vendors (e.g., Facebook or Google) is related to an individual’s “past, present, or future health, health care, or payment for health care.”
For example:
⇒ How am I supposed to know whether the user is a student or a cancer patient?
While the OCR doesn’t say this outright, you probably can’t distinguish what types of people are visiting your unauthenticated webpages without tracking them.
That’s why covered entities should exercise caution when using tracking technologies.
If a webpage simply displays your facility’s opening hours, it’s unlikely that trackers would disclose PHI to vendors. But if a webpage displays more sensitive information about specific health conditions, consider whether PHI might be involved.
If there’s a risk of PHI disclosures, HIPAA compliance kicks in, which means (among other things):
Given how often the OCR has talked about tracking technologies over the past 12 months, we might expect some enforcement in this area soon.
Belgian DPA greenlights bank’s AI model training under ‘legitimate interests’
The Belgian Data Protection Authority (DPA) has found that a bank was justified in relying on “legitimate interests” to train AI models on customers’ transaction data without consent.
Recommended by LinkedIn
⇒ What are the facts of the case?
Please bear in mind that this analysis is based on an automated translation of this case provided by the good people at DeepL. The original is available here.
There are two parties to this case:
Y Bank runs a program offering personalized discounts based on people’s transaction data. Mr X gave his consent to participate in the program.
Y Bank also uses the transaction data to train its AI model. The bank claims that this processing is for “research or statistical purposes” and is compatible with the purpose for which it collected the information.
Mr X withdrew his consent from the discount program and objected to the use of his transaction data to train the AI model.
Y Bank complied with Mr X’s request after one month. In the meantime, the bank was allegedly using Mr X’s transaction data to train its AI model.
Mr X said that this meant it was “de facto impossible” to object to the processing of his transaction data, as the purpose of the processing (training the AI model) had already been achieved by the time his request was fulfilled.
⇒ What did the Belgian DPA say?
The Belgian DPA considered whether training the AI model was compatible with the original purpose.
The DPA found that training the AI mode was not a “statistical or research purpose” as there was no link to any scientific, historical, or statistical goal.
Therefore, the DPA found that Y Bank required a separate legal basis for this processing.
So, the DPA considered whether relying on “legitimate interests” is a suitable legal basis for this activity and concluded that it is.
Here’s how the Belgian approach the “legitimate interests assessment” on the bank’s behalf:
In its analysis of the “balancing test”, the Belgian DPA noted that
As such, the Belgian DPA found that Y Bank could rely on “legitimate interests” to train its models on the transaction data collected via its discounts program.
UK government receives GDPR warning and enforcement notice over ankle-tagging immigration program
The UK’s Information Commissioner’s Office (ICO) has issued a warning and an enforcement notice to a government department, the Home Office, following a scheme that involved the GPS-tracking of migrants.
⇒ What’s the background to this case?
The Home Office was running a pilot scheme intended to reduce the number of people it detained for entering the UK via dangerous routes (for example, on “small boats” across the English Channel).
Under the pilot, people would be offered immigration bail if they agreed to wear ankle tags to track their location via GPS.
The ICO did not find that the scheme was illegal but found that the Home Office had failed to carry out a proper DPIA.
⇒ What were the issues with the Home Office’s DPIA?
The ICO found that the Home Office’s DPIA:
The ICO found that a warning and an enforcement notice were the correct remedies in this situation and has given the Home Office 28 days to submit revised documentation.
What We’re Reading