Data Protocol Docs Logo
0/

guide

Are You Protecting Health Data Privacy?

5 min read

Share this doc:


Considering the implications of what data you collect and how you use it helps prevent your users from being exploited. To determine your preparedness to protect your users' health data privacy, first evaluate your current processes and systems. Then, prioritize the gaps you've identified.

lightbulb icon

Ask at least one other colleague to complete this evaluation and compare your responses.

Consent

Respond to each of the following to the best of your ability:

We collect express, informed consent from our users before collecting, processing, and/or sharing any data.

When it comes to consent management, we default to opt-in collection and processing. The box to consent is unchecked by default and requires users to make an intentional choice to allow us to collect and process their data.

Our consent process is clear and easy for users to navigate. We don't present users with a wall of text that is overwhelming to read or understand.

Resources to Learn More

Minimization

Respond to each of the following to the best of your ability:

We only collect the data that is absolutely necessary for our product to function.

Whenever possible, we use privacy enhancing techniques (PETs) like anonymization or tokenization to make user data less specific and identifiable.

We take steps to measure the effectiveness of our efforts by using techniques like K-Anonymity or L-Diversity.

Governance

Respond to each of the following to the best of your ability:

We classify data according to risk.

We leverage automation to protect data at scale based on our classification and categorization.

We maintain an up-to-date and detailed data map.

Resources to Learn More

Storage & Protection

Respond to each of the following to the best of your ability:

We have a process to audit our storage databases and processes to ensure our users' personal data isn't linked with other sensitive information.

We store individualized data separately from aggregated data.

We encrypt data at all stages: at rest AND in motion.

We delete data whenever a user revokes consent, when the retention period has expired, or when its original purpose has been fulfilled.

Resources to Learn More

Access

Respond to each of the following to the best of your ability:

We operate under a least privilege model for accessing sensitive data.

We require multi-factor authentication to access sensitive data.

We monitor logs to determine who is accessing sensitive data.

Resources to Learn More

Diligence

Respond to each of the following to the best of your ability:

Before we partner with any third parties, we conduct a privacy and security review to ensure our partners protect data at least to the same standard that we do.

Our privacy policy outlines exactly what data we collect, how and why we process it, and any third parties we share or sell data to.

Our privacy policy is written in clear language, not legalese.

We are prepared to respond to official inquiries for user data from law enforcement.

We have formalized and documented our process for responding to demands from law enforcement for access to user data.

Next Steps

With an understanding of where your current tools and/or processes might fall short of protecting your users' health data privacy, create an actionable plan. Start with these three steps:

1.

Make a list of gaps to address in order of priority.

2.

Identify the person, team, or leader best suited to address each gap.

3.

Make a plan with trackable, time-based goals to mitigate these gaps.

For more on this topic, take the Course:


Data Protocol Course

Health Data Privacy

This course covers the increasingly broad scope of what sensitive health data entails. Learn how to apply tools and techniques to proactively protect sensitive health data, win user trust, and stay ahead of the regulatory curve.

Share this doc:


Your privacy matters.

By clicking "Accept All", you are agreeing to Data Protocol's Cookie Policy.