Reychele’s Blog
Just another WordPress.com weblog

Apr
17

Chapter Title: Workplace Surveillance, Privacy, and Distributive Justice

Name of the Book: Cyber Ethics

Library Reference: N/A

Amazon Link:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

Quote:

“Employers have considerable latitude in making new monitoring technologies; they have generally been considerable merely extensions of traditional management prerogatives.”

Learning Expectations:

1. To know what does this chapter talks about
2. To know why Privacy as a Matter of Justice
3. To know what is Resisting Workplace Surveillance
4. To know hat is Distributive Justice.
5. To know the connection between Workplace Surveillance, Privacy and Distributive Justice.

Review:

According to this chapter Surveillance has become a central issue in our late modern society. The surveillance of the public spaces by closed circuit television, the surveillance of consumers through consumers surveys and point of sale technology, and workplace surveillance, to name but a few. And so as surveillance increases, more and more questions are being raised about its legitimacy. Surveillance often functions as resource for the execution off power, and power is the most effective when it hides itself.

The lack of legislation in other countries would also indicate that it would be reasonable to conclude that workplace monitoring is still largely viewed as a right of employers with the burden of proof in the employee to show that it is invasive, unfair and stressful. It would seem that a legal correction in the imbalance of power is not likely to be forthcoming in the near future. There is also accumulating evidence that surveillance of individuals lead to stress, a lost of sense of dignity and a general environment of mistrust. Surveillance is no longer an ambiguous tool for control and social certainty, not it is merely a weight that weighs down on the employee rather it’s logic and its effects has become increasingly difficult to see clearly and distinctly. Surveillance, with modernity has lost its shine.

In this chapter also, has a view or related privacy which states that privacy is no means an uncontroversial issue; we have to select what to survey and most importantly, we have to select how to value what we find in our surveillance.

Learning’s/Insights:

• This states that privacy is no means an uncontroversial issue.
• Every judgment implies interests.
• Surveillance technology is becoming cheap, silent and diffused.
• Surveillance has become a central issue in our late modern society.
• Surveillance is no longer an ambiguous tool for control and social certainty, not it is merely a weight that weighs down on the employee rather it’s logic and its effects has become increasingly difficult to see clearly and distinctly.
• The collective needs to use data collected to coordinate and control the activities of the individuals for the good of the collective.
• Self-interested individuals would not always to use resources, allocated by the collective, for the sole purpose of furthering the aims and objectives of the collective.
Integrative Questions:

1. What is Workplace Surveillance?
2. What is Distributive Justice?
3. What is Privacy as a matter of justice?
4. What are the two major trends to create the background for our contemporary discussion of workplace surveillance?
5. Why Surveillance become the central issue in our late modern society?

Apr
17

Chapter Title: Data Mining and Privacy

Name of the Book: Cyber Ethics

Library Reference: N/A

Amazon Link:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

Quote:

“Devised by computer scientist David Chaum, these techniques prevent the dossier society in which computers could be used to infer individuals’ life styles, habits, whereabouts, and associations from data collected in ordinary consumer transactions can have a chilling effect causing the people to alter their observable activities.”

Learning Expectations:

1. To know more about Data Mining.
2. To learn more about Knowledge Discovery.
3. To know Issues about this chapter.
4. To know analysis conducted about this chapter.
5. To know who is David Chaum.

Review:

Knowledge Discovery using data mining techniques differs from ordinary information retrieval in that what is sought and extracted mined – from the data is not explicit in the database. Data Mining is most easily accomplished when the data are highly structured and available in many different forms at many different levels in what are known as data warehouse. The data warehouse contains integrated data, both detailed and summarized data, historical data, and metadata.

According also to this chapter much of the current concerns about privacy arise because of data mining and more generally, knowledge discovery. In traditional computer science terms, data is uninterrupted, while knowledge has a semantics that gives it meaning. While the data stored in databases are not truly uninterrupted, the old legal rule that anything put by a person in the public domain is not legally protected served well when the data was not mined so as to produced classifications, clustering, summaries and profiles, dependencies and links and other patterns.

And so non of the cases according to this book involved technology, but sifting through a stack of magazines, an archives, or a stack of letters to find associations between two data and an individual are all pre-technological forms of data mining, and they are all improper. Technology cannot make right what is otherwise wrong, so such data mining is indeed, a violation of privacy; if data about the individual is mined and implicit knowledge about him is discovered, an appropriation occurred, and further disclosure should not be permitted.

Learning’s/Insights:

• Knowledge Discovery using data mining techniques differs from ordinary information retrieval in that what is sought and extracted mined – from the data is not explicit in the database.
• Data Mining is most easily accomplished when the data are highly structured and available in many different forms at many different levels in what are known as data warehouse.
• The data warehouse contains integrated data, both detailed and summarized data, historical data, and metadata.
• Technology cannot make right what is otherwise wrong, so such data mining is indeed, a violation of privacy.
• Much of the current concerns about privacy arise because of data mining and more generally, knowledge discovery. In traditional computer science terms, data is uninterrupted, while knowledge has a semantics that gives it meaning.
Integrative Questions:

1. What is Data Mining?
2. What are the Issues about Data Mining?
3. What is the Analysis about Data Mining?
4. What are the benefits of Data Mining?
5. What is the connection between Data Mining and Privacy?

Apr
17

Chapter Title: KDD, Privacy, Individuality, and Fairness

Name of the Book: Cyber Ethics

Library Reference: N/A

Amazon Link:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

Quote:

“On the protection of the individuals with regard to the processing of personal data and on the free movement of such data..”
Learning Expectations:

1. To know how Personal Data, Law and Ethics related to one another.
2. To know more about Social Consequences.
3. To know what is Categorical Privacy.
4. To define KDD, Privacy, Individuality and Fairness.
5. To know the connection of above terms from one another.

Review:

Personal data is often considered to be the exclusive kind of data eligible for protection by privacy law and privacy norms. Personal data is commonly defined as data and information relating to unidentifiable person; on the protection of the individuals with regard to the processing of personal data and on the free movement of such data. Personal data should only be collected for specified, explicit, legitimate purposes and should not be further processed in away incompatible with these purposes. No excessive data should be collected, relative to the purpose for which the data is collected. Moreover the data should be accurate and, if applicable, kept up to date. Every reasonable step must be taken to ensure that inaccurate or incomplete data is either rectified or erased. Also, a personal data should be kept in a form that permits identification or data subjects for no longer than is necessary for the purpose for which the data were collected.

Applying the narrow definition of personal data and the protective measures connected to that definition of KDD process is not without difficulties. Of course, as long as the process involves personal data in the strict sense of data relating to an identified or identifiable individual, the principles applying without reservation; once the data has become anonymous, or has been processed and generalized, an individual cannot exert any influence on the processing of data at all. The rights and requirements make no sense regarding anonymous data and group profile.

The data used and the profiles created do not always qualify as personal data. Nevertheless, the ways in which the profiles are applied may have a serous impact on the persons from whom the data was originally taken or, even more for the matter to whom the profiles are eventually applied.

Learning’s/Insights:

• Distributive data are put in the form of down to earth, matter to fact statements.
• No distributive data are framed in terms of the probabilities and averages and medians or significant deviance from other groups.
• Individual is judged and treated on the basis of his, coincidently, belonging to the wrong category of persons.
• Data can be processed and profiles can be produced.
• Categorical privacy is strongly connected with individual privacy.
• Most conceptions of individual privacy currently put forward in law and ethical debate have on feature in common.
Integrative Questions:

1. What is KDD?
2. What is Personal Data, law and Ethics?
3. What is Categorical Privacy?
4. What are Social Consequences?
5. What are the Solutions according to this chapter?

Apr
17

Chapter Title: Toward an Approach to Privacy in Public: Challenges of Information Technology

Name of the Book: Cyber Ethics

Library Reference: N/A

Amazon Link:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

Quote:

“At the heart of the concern to protect ‘privacy’ lies a conception of the individual and his or her relationship with society. The idea of private and public spheres or activity assumes a community in which not only does such a division make sense, but the institutional and structural agreements that facilitate an organic representation of this kind are present. ”

Learning Expectations:

• To know Privacy and the Personal Realm Background
• To know how Privacy is being violated in public.
• To know the Two Misleading Assumptions.
• To know the Implication for a Theory of Privacy.
• To know and analyzed the case study about Lotus Marketplace.

Review:

This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Many influential approaches to privacy emphasize the role of privacy in safe guarding a personal intimate realm where people may escape the prying and interference of others.

The idea that privacy functions to protect the integrity of a private or intimate real spans scholarly work in many disciplines, including legal, political and philosophical discussion of privacy. Privacy is important because it renders possible important human relationships. Privacy provides the necessary context for relationship which we could hardly be human if we had to do without-the relationships of love, friendship and trust. Privacy as control over all information about oneself, according to Fried defended a moral and legal right to privacy that extends only over the far more limited domain of intimate or personal information.

The danger of extending control over too broad spectrum of information is privacy may then interfere with other social and legal values. According to Fried the important thing is that there is some information which is protected, namely information about the personal and intimate aspects of life. According also to him, the precise content of the class of protected information will be determined largely by social and cultural convention. Prevailing social order designates certain areas, intrinsically no more private that other areas, as symbolic of the whole institution of privacy, and thus deserving of protection beyond their particular importance.

Intimacy simply could not exist unless people had the opportunity for privacy. Excluding outsiders and resenting their uninvited intrusions are essential parts of having an intimate relationship.
Learning’s/Insights:

• Privacy is the condition of not having undocumented personal knowledge about one possessed by others.
• Parent means fact which most person in a given society choose not to reveal about them or facts about which a particular individual is acutely sensitive.
• A person’s right to privacy restricts access by others to this sphere of personal, undocumented information unless, in any given case, there are other moral rights that clearly out weight privacy.
• Comes not from the concept of meagerness but form its amplitude, for it has a protean capacity to be all things to all the lawyers.
• Just because something happens in public does not mean it becomes a public fact: The central park rape occurred in public as did the trial of the accused, but the victim maintains a measure of privacy as to her identity. In less dramatic notion of civil an intention directs us to the same realization.
Integrative Questions:

1. What is Privacy and Personal Real Background?
2. What are the Two Misleading Assumptions?
3. What is the view of Schoeman, Fried and Gertein?
4. Who is Raymong Wak?
5. Explain what is the Case of Lotus Marketplace is all about?

Apr
17

Chapter Title: Privacy Protection, Control of Information, and Privacy-Enhancing Technologies

Name of the Book: Cyber Ethics

Library Reference: N/A

Amazon Link:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

Quote:

“There is, intuitively a big difference between the situation where your privacy is violated, say your phone tapped, and the situation where you tell your friend an intimate secret. ”

Learning Expectations:

1. To know more the Theory of Privacy.
2. To know the Role of Control in the Theory of Privacy.
3. To know the similarities and difference about the Normative Privacy and the Restricted Access Theory.
4. To know how to use the Control in the Justification and Management Privacy.
5. To know Privacy in enhancing Technology.

Review:

In our private lives we wish to control information about ourselves. We wish to control information that might be embarrassing or harm us. And we wish to control information that might increase our opportunities and allow us to advance our projects. The notion of privacy and the notion of control fit together. Privacy is the main claim of the individuals, groups or institutions to determine for themselves when, how to what extent information about them is communicated to others. According to the book to have a personal view about personal property is to have the ability to consent to the dissemination of personal information.

Control of personal information is extremely important as, of course is privacy. But these concepts according to the book are more useful when treated as separable, mutually supporting concepts than as one. Individual control of personal information on the other hand is part of the justification of privacy and plays a role in the management of privacy. Privacy and control do fit together naturally, just not in the way people often state.

Virtually all societies establish normatively private situations, zones of privacy, which limits access to people or aspects about them under certain conditions. The details of these normatively private situations vary somewhat from cultures but they are intended to protect individuals and foster social relationships whether the individuals have control in the situations or not. Normative privacy needs to be distinguished from natural or descriptive privacy. Simply being alone doesn’t provide sufficient claim to right to privacy anymore than having the right to privacy can guarantee privacy as matter of fact.

Learning’s/Insights:

• The restricted access model provides a framework for discussing privacy on the internet in a way in which a control theory of privacy does not.
• The privacy of medical information in a modern hospital represents a good example for the complexity of the restrictions that must be placed on the privacy situations.
• The adequacy of PETS can be challenged in terms of their technological effectiveness or on the basis of their security and public policy implications.
• PETS provide users with control over their own information.
• PETS offer users choices about what information they wish to release.
• PETS give us increased control but it remains an open question whether privacy is increased.

Integrative Questions:

1. What is the Role of Control in the Theory of Privacy?
2. What is Normative Privacy?
3. What is Restricted Access Theory?
4. What exactly are PETS?
5. Why are PETS appealing?

Apr
17

Chapter Title: The Structure of Rights in Directive 95 46 EC

Name of the Book: Cyber Ethics

Library Reference: N/A

Amazon Link:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

Quote:

“Personal data must be collected for specified, explicit and legitimate purposes and not further processed in a way that it is incompatible with those purposes.”
Learning Expectations:

1. To know the directives on the question of further processing of personal data.
2. To know how to use personal data for a different purpose.
3. To know data protection and the philosophy of privacy.
4. To know the channels for the flow of personal information.
5. To know as well the structures of rights in directives…

Review:
The central concept of in the directive is that of processing of personal data. While earlier pieces of legislation are focused on the recording data, this directive is organized around the much broader notion of processing of personal data. The recording of the information is here only a special kind of processing of personal data. Processing personal data is defined as any operation or set of operations which is performed upon personal data, weather or not by automatic means, such as collection, recording, organization, storage adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination, or otherwise making available alignment or combination, blocking erasure or destruction.

According also to this chapter data must be accurate and kept updated, and they must not be kept longer than necessary for the purpose for which they were collected. Importantly, it is stated that it is the responsibility of the controller of the processing to se to it that these requirements are met.

The notion of further processing of data in a way that it is incompatible with the purpose for which it was collected is a difficult one to interpret. The purpose with which the data subject gave up information about himself could be different from the purpose for which the data was collected. This chapter looks at some plausible candidates for an explication of the notion of incompatibility. Firstly, incompatibility cannot mean logical consistency. Secondly, incompatible cannot mean that the purposes are practically inconsistent. Thirdly, incompatible cannot mean simply that the two purposes are different. Further more on this interpretation, compatible with is to be distinguished from not incompatible with because expectation is an intentional notion.

Learning’s/Insights:

• The basic idea of the restricted access account is that in its most suggestive sense privacy is a limitation of others access to the individual.
• Privacy a descriptive neutral concept denoting conditions that are neither always desirable and praise worthy, nor always undesirable and upraise worthy.
• Privacy is not simply an absence of information about us in the minds of the other, rather it is the control we have over the information about ourselves.
• In accordance with the directive, member states shall protect the fundamental rights and freedom of neutral persons and in particular right to privacy with respect to the processing of personal data.
• Different channels are characterized by different sets of restrictions on the flow of such information.
Integrative Questions:

1. Under what conditions is it legitimate to process personal data are collected from the different purposes?
2. What is Data Protection?
3. What is the Philosophy of Privacy?
4. What it is about the Channels for the flow of the personal information?
5. What is Data Quality?

Apr
17

Chapter Title: Towards A Theory of Privacy for the Information Age

Name of the Book: Cyber Ethics

Library Reference: N/A

Amazon Link:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

Quote:
“An individual or group has normative privacy in a situation with regards to others if and only if that situation the individual or group is normatively protected from intrusion, interference, and information accessed by others [Culver, Moor, et al.,1994,p6 ]”

Learning Expectations:

• To know hat is Greased Data.
• To know what is Grounding Privacy.
• To know and learn the nature of Privacy.
• To know the setting and adjusting policies fro private situations.
• To learn more the theory of privacy for the information age.

Review:

Ethical problems involving computing, probably none is more paradigmatic than the issue of privacy. It is true enough that most individual appreciate the easy access of computerized data when making reservations, using automatic teller machines, buying new products to the web, or investigating topics in computer databases. Because we all know that when information is computerized, it is greased to slide easily and quickly to many ports of call. This makes information retrieval quick and convenient. But legitimate concerns about privacy arise when this speed and convenience lead to improper exposure of information. Greased information is information that moves like lightning and is hard to hold on to.

The greasing information makes information so easy to access that it can be used again and again. Computers have elephant memories – big, accurate, and long term. The ability of computers to remember so well for so long undercuts a human frailty that assists privacy. We humans forget most things. Most short term memories don’t even make it to long term memory.

Once information is being captured for whatever purpose, it is greased and ready to go for any purpose. In computerized world we leave electronic foot prints everywhere, and data collected for one purpose can be resurrected and use elsewhere. The problem of the computer privacy is to keep proper vigilance on where such information can and should go.

For the most part the need for privacy is like good art, you know it when you see it. But sometimes our institutions can be misleading and It is important to become as clear as possible what privacy is, how it is justified, and how it is applied in ethical situations.

Learning’s/Insights:

• From the view point of ethical theory, privacy is curious value.
• The concept of privacy has distinct cultural aspect that goes beyond the core values.
• Some cultures may value privacy and some may not.
• The transmission of knowledge is essential for the survival of every culture, but it is not the same knowledge that must be transmitted.
• The core values allow us to make trans-cultural judgment.
• The core values are the values we have in common as human beings.
Integrative Questions:

1. What is Greased data?
2. What is Grounding Privacy?
3. What is the nature of Privacy?
4. What is the adjustment privacy?
5. What are Publicity principles?

Apr
17

Chapter Title: Privacy in Cyber Space

Name of the Book: Cyber Ethics

Library Reference: N/A

Amazon Link:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

Quote:

“Privacy is a concept that neither understood nor clearly and easily defined.”
Learning Expectations:

• To know what is Privacy in Cyber Space is all about.
• To know what is Personal privacy.
• To know the theory of privacy.
• To know what is data mining.
• To know knowledge and discovery process.
Review:

Privacy is a concept that neither understood nor clearly and easily defined. Privacy is something that one either has (totally) or does not have. Privacy is also something that can be diminished. As for privacy in terms of a spatial metaphor such as a zone that can be introduced upon or invaded by individuals and organizations. And privacy in terms of confidentiality that can be violated or trust that can be breach; According to this chapter privacy is more useful to view as either as presumed or stipulated interest that individuals have with respect to the protecting personal information, personal property, or personal space than to think about privacy as a moral and legal right. Personal privacy be viewed in terms of an economic interest, and that information about individuals can be thought of in terms of personal property that could be bought and sold in commercial sphere.

James Moor, in the first reading in this chapter, points out that in United States the concept of privacy has evolved from, one concerned primarily with intrusion into one’s personal space to; one concerned with interference an individual personal affairs to, one that is currently concerned primarily with personal information and access to personal information.

This chapter emphasized on privacy issues that fall under the category of informational privacy. This discussed about the control theory and restricted access theory. Control theory, one has privacy if and only if one has control over information about oneself. Restricted Access theory, privacy that consist in the condition of having access information about one self limited or restricted in certain context.

This relatively new technique of information gathering is called knowledge discovery in Database but is referred commonly as data mining. This answers about the concerns related to the amount of data that now can be collected, the speed at which that data can be transferred, and the indefinite duration of which the data can be stored have all contributed to the concerns for personal privacy that far exceeded the concerns that individuals may have had about their privacy.
Learning’s/Insights:

• Privacy is a concept that neither understood nor clearly and easily defined.
• Control theory, one has privacy if and only if one has control over information about oneself.
• Restricted Access theory, privacy that consist in the condition of having access information about one self limited or restricted in certain context.
• This relatively new technique of information gathering is called knowledge discovery in database but is referred commonly as data mining.
• Protected personal information that is computerized typically exists in the form of explicit electronic records that resides in the database.
• So called informational workers have perhaps been the group that thus far been most vulnerable to this relatively new form of workplace surveillance.

Integrative Questions:

1. What is Privacy?
2. What is Personal property?
3. Who is James Moor?
4. What is the theory of privacy?
5. What is Data Mining?

Apr
17

Chapter Title: Written on the body: Biometrics and identity

Name of the Book: Cyberehtics

Amazon Link:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

Quote:

“Biometrics is turning the human body into the universal ID card of the future.”

Expectations:

1. To know what really Biometric is?
2. To know identity of Biometrics.
3. To know Virtual Identities of Biometrics.
4. To know why they are questioning the biometric body.
5. To know different buyers of biometrics.

Review:

Generally speaking, biometric technology involves the collection with a censoring device of digital representations of physical features unique to an individual, like a fingerprint, pattern of the iris, the retina, the veins of the hand, physiognomic features, shape of the hand, or voice patterns, it may also include typical behavioral patterns like typing or writing a signature. If a matching template is found, the person presenting themselves is recognized and counts as known to the system.

Major buyers of biometrics technology can be found in the private sector, particularly among corporations with high security interest and/or limited access areas like banks and nuclear plants, but an important impetus comes from governments and government-related departments and services catering to client populations of thousands, often millions of people. Public institution concerned with the distribution of welfare and child benefits, immigration and applications for political asylum, or the issue of passports and car licenses and increasingly looking towards biometrics in order to improve what are perceived as system threatening levels of fraud. Also, employers interested in keeping track of the whereabouts and activities of their employees, hospitals and insurance companies in the process of introducing electronic patient records are among the many interested parties.

Moreover, with so many forces joining in a coordinated effort to make it succeed, biometrics can be expected to become one of the dominant ways for bodies and information systems to connect. In the process, the very notion of identity is being reconstructed in ways that are highly relevant for the contemporary philosophical debate on the relation between the body, identity, and information technology. Whereas the first suffices for, say, biometrically secured ATM’s where the client simultaneously presents the requested body part and a smart card on, which biometric data are stored comparison, it will not do for systems that are used for detection of double dippers, many biometrics systems in social service are introduced precisely to prevent or catch people using fake identities in order to receive more benefits or welfare payments. These systems are designed to check an applicant’s identity against already enrolled client population, which necessitates the identity check of the one to many kinds.

Learning’s/Insights:

• If a matching template is found, the person presenting themselves is recognized and counts as known to the system.
• Biometrics is often described as the next big thing in information technology.
• Biometrics requires a theory of identity that, unlike much of the available literature, takes the body and the embodied nature of subjectivity fully into account.
• We need to investigate what kind of body is, by researching the practices and informational configurations of which the readable biometric body becomes part.
• Only the former maybe at stake in biometrics, while the latter is taken to refer to something both authors perceive as true identity.
• The biometrics is not just about as narrow an identity check as some authors maintain.

Integrative Questions:

1. What is Biometrics?
2. What is the Identity of Biometrics?
3. What is the Virtual Identity of Biometric?
4. Who are the major buyers of biometric?
5. Why are they questioning Biometric Body?

Apr
17

Chapter Title: Double Encryption of Anonymized Electronic Data Interchange.

Name of the Book: Cyberehtics

Amazon Link:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

Quote:

“Crime in electronic data interchange will increase as fast as the use of it.”

Expectations:

1. To know what is Double Encryption.
2. To know what does the title of this chapter implies.
3. To know and learn more about Anonymity.
4. To know what is the two main problems that need to solve in order to keep GP as a sender anonymized.
5. To know what happen to Erasmus University.

Review:

We cut his electronic head by creating a Gatekeeper postbox that forwards all the incoming electronic data, thereby replacing the doctor’s address with its own address. Furthermore, collecting medical data electronically require, according to our moral institutions, some kind of encryption. To be sure that data are really sent by the sender and received by the receiver meant by the sender, the double encryption protocol is suitable and widely used. However, double encryption needs the sender identification in order to decrypt the message to the sender’s public key, but the sender’s identification was anonymized by the Gatekeeper postbox. To use double encryption for anonymized electronic communication, new requirements must be specified.
Our main data sources are therefore the persons who prescribe drugs. Using this post marketing surveillance as scientific method, we distinguish between two phases, the generation of a hypothesis and the evaluation of the hypothesis. The assistant of the GP will make notes of the referrals to a specialist and of the treatment summary of the specialist in the patient record of the GP. In the Netherlands, the number of GP’s using Electronic Patient Records was growing rapidly from 1988. The central role of the Dutch GP enables us to follow individual patient. In order to transmit the data from the GP to the central database of IPCI, we use the edifact standard for electronic messages. Anonymization of the GP means only a randomized number and profession type are transmitted.
The problem of replacing a sender’s identity can be done very easily by introducing an electronic postbox of the Gatekeeper. Instead of transmitting the messages from the GP to the ICPI postbox directly, the messages are now sent to the Gatekeeper’s postbox has only one function, forward every incoming message to the ICPI postbox so that the original sender is replaced by the new sender, the Gatekeepers identity. To encrypt an electronic message we chose a double encryption program with a secret and a public key. Instead of one key, used to encrypt and decrypt a message, two different keys are generated so that a message encrypted with one key is decrypted only with the other key and vice versa. We conclude that it is possible to automatically anonymize an electronic sender by the introduction of a Gatekeeper’s postbox. The possibilities of double encryption programs are demonstrated as a way to be sure about sender and receiver
Learning’s/Insights:

• Anonymization of the GP means only a randomized number and profession type are transmitted.
• As soon as data are sent electronically, the sender’s identification is automatically added to the message. To anonymized the sender, an automatic process of replacing this identification must be implemented.
• To decrypt an encrypted message, one must know the decryption key of the sender. However, when the sender is anonymized, it is impossible to select the right key. An automatic process of key-handling and decryption must also be implemented.
• The Gatekeeper’s postbox intercepts the message, the sender identification is used to select the sender’s public key, and only then remove it from the message.

Integrative Questions:

1. What is ICPI?
2. What is GP?
3. What is ERP?
4. What is Meduer format?
5. What is SOAP?