Skip to main content

Introduction to Data Privacy

·16 mins

Every architectural decision I make in healthcare IT runs through a privacy filter. Get it wrong, and you’re not just facing fines—you’re eroding patient trust. And trust matters in healthcare.

I’ve been dealing with this topic for years, and wanted to share what I have learned as it may benefit others.

First let me share this introduction. Then in a follow up I will share the pains and challenges I’ve encountered building a global clinical decision support system that processes patient data, and how I’ve approached these challenges. That is going to be a proper deep dive.

Now let’s get started.

Data Privacy is about an individual’s right to control their personal information. It is the “how” of data protection, the traffic rules for how organizations collect, store, use, and share data that belongs to an individual person.

Why is this such a critical topic in business and technology today?

Because data is the fuel of the modern economy. At the same time, massive data breaches, corporate scandals, and the rise of powerful AI have eroded public trust. Data privacy laws are the world’s attempt to build a framework for trust, giving individuals control while holding organizations accountable.

This introduction focuses on the two main philosophical and legal frameworks that dominate this space: the United States and the European Union.

The Two Worlds of Privacy
#

The US and the EU have fundamentally different philosophies on privacy. This difference dictates the rest, from the laws they write to the penalties they enforce.

The EU “Fortress”: A Comprehensive, Rights-Based Model
#

  • Philosophy: In the EU, data privacy is considered a fundamental human right, enshrined in the EU Charter. It is not a consumer good to be bought or sold; it is an inalienable right, on par with freedom of speech. This philosophy shapes every interpretation of the law.

  • Legislation: The EU philosophy is embodied in a single, comprehensive “omnibus” law: the General Data Protection Regulation (GDPR): a massive, powerful, far-reaching regulation that applies to all sectors and all types of personal data, from a customer’s name to their IP address.

  • Scope: The GDPR has powerful “extraterritorial” scope. It doesn’t matter where your company is based. If you are a US-based e-commerce site with no office in Europe, but you market and sell your products to people in Germany, you must comply with the GDPR regarding that data. This also applies to “monitoring behavior” that includes common activities like using advertising cookies.

  • Approach: It is generally an “opt-in” model. Companies must have a specific, lawful basis (like explicit consent) before collecting or processing data. The burden of proof is on the company to justify why it needs the data.

  • Key Features:

    • Heavy Fines: This is what got the world’s attention. Non-compliance can result in fines of up to €20 million or 4% of a company’s total global annual revenue, whichever is higher.

    • Data Protection Officer (DPO): Many organizations that process large amounts of data must appoint a DPO, a quasi-independent role responsible for overseeing privacy compliance.

The US “Patchwork”: A Sectoral, Market-Based Model
#

  • Philosophy: In the US, privacy is seen more as a consumer protection issue. The approach is more reactive and market-driven, focusing on preventing specific harms (like identity theft or financial fraud) rather than establishing a broad fundamental right. This approach is heavily influenced by a desire for “business-friendly” regulation and strong industry lobbying.

  • Legislation: There is no single, federal law that covers all data privacy. Instead, the US has a “patchwork” of regulations that overlap and sometimes conflict:

    • Sector-Specific Federal Laws: These apply only to certain industries and data types. Examples include HIPAA (Health Insurance Portability and Accountability Act) for healthcare data, COPPA (Children’s Online Privacy Protection Act) for data from children under 13, and GLBA (Gramm-Leach-Bliley Act) for financial information.

    • State-Level Laws: This is where the most recent action is. With no federal law, states have become the de facto privacy regulators.

      • California has led the way with the California Consumer Privacy Act (CCPA), now significantly expanded by the California Privacy Rights Act (CPRA).

      • Many other states (like Virginia, Colorado, Utah, and Connecticut) have followed, creating a fragmented landscape of different rules. This is a compliance headache for businesses, as they must now track and adhere to multiple different state laws.

  • Approach: It is generally an “opt-out” model. Companies can often collect data by default, as long as they disclose it in a (often lengthy) privacy policy. The burden is on the consumer to find the “opt-out” link or setting to stop certain uses, particularly the “sale” or “sharing” of their information for advertising purposes.

And this is just the EU and the US. Add a few more countries, like Japan, South Korea or China, and things get even more interesting.

Key Concepts You Need to Know
#

  • Personal Data (GDPR) vs. PII (US): “Personal Data” (EU) is an extremely broad term. It’s any information that can be used to identify a person, directly or indirectly. This includes the obvious (name, email) and the less-obvious (an IP address, cookie ID, location data, a device’s advertising ID, biometric data). It even includes inferred data, like an algorithm’s assessment that you are “likely to be pregnant.” The traditional US concept of “Personally Identifiable Information” (PII) is often narrower, though new state laws are adopting broader, GDPR-like definitions. Both frameworks give special, higher protection to sensitive data like health information (see the Healthcare section).

  • Controller vs. Processor (EU) / Business vs. Service Provider (US): This is a critical distinction that defines your legal responsibilities.

    • Controller / Business: The entity that determines the “why” and “how” of data processing. This is the organization that decides to collect the data and what to do with it (e.g., the e-commerce company, the hospital, the social media app). They bear the primary responsibility for compliance.

    • Processor / Service Provider: The vendor that processes data on behalf of a controller (e.g., a cloud provider like AWS, an email marketing tool, a cloud based clinical decision support system). They must follow the controller’s instructions and have a legal contract, like a Data Processing Agreement (DPA) or Business Associate Agreement (BAA), in place.

  • Data Subject Rights: These are the rights that regulations grant to individuals. They are the core of “control.” While the specifics vary, they generally include:

    • The Right to Know/Access: What specific pieces of data do you have about me?

    • The Right to Rectification: Fix my incorrect data.

    • The Right to Erasure (or “Right to be Forgotten”): Delete my data. (This is a powerful right, but it has exceptions, like legal or financial record-keeping).

    • The Right to Data Portability: Give me my data in a usable, machine-readable format.

    • The Right to Opt-Out: Stop selling or sharing my data (a key US right).

    • The Right to Limit Use of Sensitive Personal Information: (A key CPRA right) Stop using my sensitive data (like health info, geolocation, or race) for purposes other than what’s strictly necessary.

    • The Right not to be subject to Automated Decision-Making: (A key GDPR right) Give me the right to have a human review a decision made only by an algorithm that has a significant effect on me (like being denied a loan).

  • Lawful Basis for Processing (GDPR): In the EU, you can’t just process data. You must have a valid legal reason, and you must document it. The most common are:

    1. Consent: The person gave you clear, explicit permission. This must be “freely given, specific, informed, and unambiguous”—you can’t use a pre-ticked box.

    2. Contract: You need the data to fulfill a contract with the person (e.g., their address to ship a product to).

    3. Legitimate Interest: You have a valid business reason (like fraud prevention) that you have balanced against the individual’s rights and determined that it doesn’t override them.

    4. Legal Obligation: You are required by another law to process the data (e.g., anti-money-laundering checks).

    5. Vital Interest: You need the data to save someone’s life.

    6. Public Task: The processing is for a task in the public interest.

  • Privacy by Design & by Default: This is a core GDPR principle.

    • Privacy by Design: The idea that privacy should be built into the foundation of any new product, service, or business process. Example: When building a new social media app, you must think about privacy controls from day one, not as an afterthought.

    • Privacy by Default: Settings must be at their most private by default. Example: A new feature’s visibility should be set to “Friends Only” or “Just Me,” not “Public,” and the user must actively choose to share more.

Legal contracts like the DPA or BAA are typically written by lawyers that don’t know the details of the system. They depend on information coming from architects. Typically, in the form of a Data Protection Impact Assessment (DPIA). For a moderately complex system this may quickly turn into a 100 page document, with a lot of details, including data flows, primary and secondary purposes and privacy controls.

Special Considerations for Healthcare
#

Both the US and the EU agree that health information is one of the most sensitive types of personal data. They give it special, elevated protection but do so in very different ways.

1. In the United States: HIPAA
#

In the US, the primary law for healthcare is the Health Insurance Portability and Accountability Act (HIPAA). This federal law predates all the new state privacy laws and generally takes precedence.

  • What it Protects: HIPAA protects Protected Health Information (PHI). PHI is any identifiable information (name, social security number, address, etc.) that is held by a healthcare provider, health plan, or their partners and relates to an individual’s past, present, or future physical or mental health.

  • Who it Applies To: This is the most critical part. HIPAA only applies to two groups:

    1. Covered Entities: These are your frontline healthcare organizations—doctors’ offices, hospitals, clinics, health insurance providers, and pharmacies.

    2. Business Associates: These are the vendors and service providers that handle PHI on behalf of a Covered Entity. This includes EMR/EHR software providers, medical billing companies, cloud storage providers, data analytics firms, and of course, your company if you process data on behalf of a healthcare provider.

  • Key Rules & Considerations:

    • Business Associate Agreements (BAAs): A Covered Entity must have a specific legal contract, a BAA, with every vendor that will touch PHI. This contract obligates the vendor to follow all the same security and privacy rules as the hospital itself.

    • The Privacy Rule: This rule defines how PHI can be used and disclosed. It permits disclosure for “Treatment, Payment, and Operations” (TPO) without the patient’s explicit authorization for each use.

    • The Security Rule: This rule is more prescriptive than the state laws. It mandates specific administrative, physical, and technical safeguards to protect electronic PHI (e-PHI), including access controls, encryption, and audit logs.

    • The “HIPAA Gap”: The biggest consideration in the US is what HIPAA doesn’t cover. If you use a wellness app, a diet tracker, or a consumer health website, that company is not a Covered Entity. The data you provide is not PHI and is not protected by HIPAA. This “HIPAA gap” is where the new state laws (like California’s CPRA, with its “Sensitive Personal Information” category) are starting to step in.

2. In the European Union: GDPR Article 9
#

In the EU, there is no “HIPAA.” Instead, the GDPR is the single law for everyone, but it has a “second level” of extremely high protection for sensitive data.

  • What it Protects: Health data is classified under Article 9 as “Special Categories of Personal Data.” This includes genetic data, biometric data, and data concerning a person’s sex life or sexual orientation.

  • Who it Applies To: Anyone. Unlike HIPAA, it doesn’t matter if you are a hospital, an insurance company, or a simple wellness app. If you process data “concerning health” from an EU resident, you must comply with Article 9. This closes the “HIPAA gap” in the US.

  • Key Rules & Considerations:

    • Prohibited by Default: The default rule in Article 9 is that processing special category data is prohibited.

    • Strict Exceptions: You can only process health data if you meet one of ten very specific exceptions. The most common ones for healthcare are:

      1. (a) Explicit Consent: The person must give clear, specific, and unambiguous opt-in consent for each specific purpose.

      2. (h) Medical Diagnosis/Provision of Care: Processing is necessary for medical diagnosis, the provision of health or social care, or treatment. This must be done by (or under the responsibility of) a professional subject to an obligation of professional secrecy.

      3. (i) Public Health: Processing is necessary for reasons of public interest in the area of public health (e.g., tracking a pandemic).

    • No “Legitimate Interest”: You cannot use “legitimate interest” as your legal basis for processing health data, which is a common basis for non-sensitive data (like marketing).

    • Data Protection Impact Assessment (DPIA): If you are processing health data on a large scale, you are almost always required to conduct a DPIA, which is a formal risk assessment to identify and mitigate privacy risks before you start.

Key Takeaway for Healthcare
#

Both regions treat health data with the highest level of care. The main difference is the model:

  • The US uses a sector-specific law (HIPAA) that applies only to specific healthcare entities, creating a gap for consumer health tech.

  • The EU uses a risk-based general law (GDPR) that applies to everyone and triggers its highest level of protection (Article 9) for anyone who touches health data.

Other countries have their own specifics. Even the UK’s GDPR differs from the EU one. They are close, but there are subtle differences. And if you think that the EU is at least standardized, you have another surprise coming. Not only are there differences between countries, even the individual states in Germany do not agree on everything.

Practical Do’s and Don’ts
#

Here are some best practices that align with the direction privacy laws are heading globally.

DO:
#

  • ✅ DO Practice Data Minimization: Don’t collect data you don’t need. If a newsletter sign-up form only needs an email, don’t also ask for a name, phone number, and birth date. If you don’t have the data, it can’t be breached, and you won’t be fined for misusing it.

  • ✅ DO Be Radically Transparent: Write your privacy policy in plain, human-readable language. Use “just-in-time” notices (e.g., a pop-up that explains why you need location data when you ask for it). Tell people exactly what you’re collecting, why, who you share it with, and how long you keep it.

  • ✅ DO Enforce Strict Access Controls: This is non-negotiable for sensitive data. Ensure that only employees who absolutely need to see personal data (especially health data) to perform their jobs can access it. This is the “need-to-know” principle and a core part of security.

  • ✅ DO Implement “Privacy by Design” & “By Default”: Ask the privacy question at the beginning of every project. It’s much harder and more expensive to fix a privacy flaw after a product has been built.

  • ✅ DO Have a Data Retention Policy: Don’t keep data forever. This is a legal requirement under GDPR and a best practice everywhere. Define how long you actually need each data type and then have a process to securely delete or anonymize it.

  • ✅ DO Use Strong Security (Especially Encryption): Privacy and security are not the same, but you cannot have privacy without security. Security is the wall that protects the data; privacy is the policy that governs who can access it and what they can do. Use both, with a strong emphasis on encrypting data at rest (in your database) and in transit (over the internet).

  • ✅ DO Manage Your Vendors: You are responsible for what your third-party partners (e.g., marketing tools, cloud providers) do with your users’ data. You must have legal agreements, called Data Processing Agreements (DPAs) under GDPR or Business Associate Agreements (BAAs) under HIPAA, in place.

  • ✅ DO Train Your Team Continuously: Every employee who handles personal data is a potential risk. Regular training on privacy policies, security procedures, and how to spot a phishing attack is a legal requirement (HIPAA) and a core part of accountability (GDPR).

DON’T:
#

  • ❌ DON’T Hoard Data: This makes you a prime target for breaches and dramatically increases your liability. See “Data Minimization” and “Data Retention.”

  • ❌ DON’T Use “Dark Patterns”: Don’t use confusing website designs or tricky language to trick users into giving consent. Example: A cookie banner where the “Accept All” button is large and green, but the “Reject” link is tiny gray text hidden in a paragraph. Regulators are actively fining for this!

  • ❌ DON’T Ignore User Rights Requests: If a user asks to delete their data, you must have a process to do so (and to verify their identity). Most laws require you to respond within a specific timeframe (e.g., 30-45 days). This is a huge operational challenge, as one user’s data may be in 10+ different systems (CRM, email, analytics, backups etc.).

  • ❌ DON’T Delay Breach Notifications: Both HIPAA and GDPR have strict, mandatory timelines for reporting data breaches to regulators (e.g., within 72 hours for GDPR) and affected individuals. Have an incident response plan ready before a breach happens.

  • ❌ DON’T Use Non-Compliant Vendors: Never send personal data (especially PHI) to a vendor until you have a signed BAA or DPA. If they won’t sign one, you can’t use them. The liability for their breach can become your liability.

  • ❌ DON’T Think You’re Too Small to Matter: The GDPR and CCPA apply based on who you process data for and how much data you process, not just your revenue. A solo blogger who uses analytics cookies and has visitors from the EU is technically subject to the GDPR.

  • ❌ DON’T Forget Employee Privacy: Your employees have privacy rights too. Privacy laws apply to HR data, including recruiting information, performance reviews, and employee monitoring.

Resources to Go Deeper
#

This is a field where you can keep learning. It is complex and the laws change constantly.

1. Official Regulatory Bodies (Primary Sources)
#

  • EU: European Data Protection Board (EDPB): The official body that provides guidance on how to interpret and apply the GDPR. Their guidelines are essential reading for professionals.

  • UK: Information Commissioner’s Office (ICO): Even post-Brexit, the ICO is one of the most practical and influential regulators. Their guidance is often easier to understand than the EDPB’s.

  • US (Federal) - HHS & FTC:

    • HHS - Office for Civil Rights (OCR): This is the primary enforcement agency for HIPAA. Their website, guidance, and published enforcement actions (“the wall of shame”) are the single most important primary source for US health privacy.

    • Federal Trade Commission (FTC): The de facto general privacy regulator in the US. Reading their enforcement actions (complaints) is a great way to see what not to do, especially in the “HIPAA gap” for consumer health apps.

  • US (State): California Privacy Protection Agency (CPPA): The first dedicated privacy enforcement agency in the US, responsible for the CCPA/CPRA. Keep an eye on them, as they set the trend for the rest of the country.

2. Foundational Books
#

  • Privacy Law Fundamentals by Daniel J. Solove and Paul M. Schwartz: The essential textbook for understanding the legal landscape, updated regularly to reflect new state laws.

  • The Age of Surveillance Capitalism by Shoshana Zuboff: A landmark (and large) book that explains the business model of the modern internet. It’s the ‘Why’ behind the ‘What’ of privacy law—it explains the economic incentives that make privacy such a battleground.

  • Weapons of Math Destruction by Cathy O’Neil: Explains the real-world impact of algorithms and data-driven decisions. This is crucial for understanding algorithmic fairness, data-driven bias, and the “automated decision-making” part of privacy.