Feeds

NHS enables Facebook to track surfers on health info website

Privacy experts say 'ick, germs'

SANS - Survey on application security programs

We’re keen to allay any fears...

Facebook said Garlik and Watson had misunderstood the purpose of the tie-up, which allows users to more easily share information about disease prevention with their contacts on Facebook. In a prepared statement, Facebook also said it didn't share the data from social plugin partner sites such as NHS Choices with third parties.

Medical privacy is a crucial issue and following Mischa’s post we’re keen to allay any fears people might have around Facebook’s use of data associated with the Like button, which the NHS Choices website has chosen to adopt.

The Like button allows people to share information that is important to them with their friends. It appears that Mischa is concerned with what Facebook could potentially do with the data we use to make this experience work. Facebook does not share your data with third parties. It is against Facebook’s terms to use this data for any purpose other than to create a more personalised experience on the web.  In the same way that the NHS would not share you data, Facebook would not either.

On the NHS website, people are opting to raise awareness around illnesses that affect all of us and the Facebook Like button is a great way to help people spread the NHS’s education messages about early detection and prevention of such illnesses to their friends on Facebook.

When a person is logged into Facebook and visits a partner site that is using a social plugin, such as NHS Choices, Facebook can see technical information such as a person’s User ID, IP address and operating system. This is industry standard data that helps us customize the experience on the partner site for the person, such as showing what friends have liked or recommended. Our highest priority is to keep people in control of their information on Facebook. If a person decides they do not want a personalised experience on a partner site, they can log out of Facebook and we will not receive their User ID. We also delete this technical impression data within 90 days of receiving it, which is consistent with standard industry practice.

David Harley, senior research fellow at net security firm Eset, and a former NHS IT manager for five years, was unimpressed by these arguments, adding he could see no good reason for an NHS-produced medical information page to have a Like button. "I'd have thought there were ways of capturing hit data that don't involve Facebook at all, let alone risk allowing it pre-anonymized ID data," he said.

"While the actual risks may not be huge, the breach of principle is major. There is no reason I can see why the NHS, which is bound (or should be) by data legislation that's specific to UK healthcare as well as the more obvious legislation like the Data Protection Act, should have gone into reverse and exposed its customers to the attentions of a company which is obsessed with sharing information rather than protecting it.

Of course there are occasions where healthcare-related data, should be shared, but only with parties who have a right to it. Why does Facebook qualify, however trivial the data?"

"It may not be interested in a young mother's bingo addiction, but I have yet to see any proof that it can be trusted to protect data relating to access to a healthcare site from inappropriate sharing." ®

Bootnote

1Facebook confirmed Garlik's contention that it gets data on users visiting NHS Choices even if they are not logged into Facebook at the time.

"When a person is logged into Facebook and visits a partner site that is using a social plugin, Facebook can see technical information such as a person’s User ID, IP address and operating system. Note: we will still receive their IP address, operating system even if the user is logged out; we just won’t know their User ID," it said.

Users concerned about this on NHS Choices, or other Facebook partner sites, need to opt out of viewing social plugins, a feature that is enabled by default.

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.