Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Need For Better Data Management: PPC Issues Report On Data Processing From Surgical Videos

Published January 20, 2023
Author

Muhammad Faisal Sattar

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/Asia

Listen to the content

This post is also available in: Brazilian Portuguese

On November 2, 2022, the Personal Information Protection Commission (PPC) in Japan issued a report on Star Japan LLC's handling, storage, sharing, and overall management of personal information derived from surgical videos. Following discrepancies in their practices, the body conducted a similar review of 60 other medical institutions' practices related to surgical videos.

Star Japan's employees have contractual obligations to acquire surgical videos. These surgical videos are supposed to be received without including information that could identify individuals. Due to several factors, such as the lack of internal notifications and a dedicated management plan for appropriately handling such videos, patients' personal data, such as their names, was released. Medical institutions that offer surgical videos include those that handle them as personal data and those that do not, thereby managing the videos as personal information without building a database.

More importantly, patients' explicit consent had not been gained before making such videos highlighting the overall lack of appropriate safety management measures. Additionally, doctors (who were employees of each medical institution) provided surgical videos to Star Japan LLC without the permission of the medical institution that held the patient's personal data.

The following guidelines were issued to Star Japan following the identification of the aforementioned issue:

  • Going forward, before collecting users' personal data, they must specify the purpose of their collection, potential uses, and appropriately notify the users when sharing any data with third parties;
  • When users' data is being shared with third parties, the organization must ensure the implementation of an appropriate system design and determine whether the data being shared contains any personal data. If so, any sharing of such data must comply with the requirements set per the Act on the Protection of Personal Information 2020 (APPI).

Major Implications For Other Institutions

Following its instructions to Star Japan, the PPC Notification also contains general recommendations and guidelines 7 medical institutions that manage surgical videos as part of their users' collected personal data:

  • Proper consent of the users must be gained before an organization can share such data with a third party and establish appropriate systems to obtain that consent;
  • Employees of the medical institutions (doctors, nurses, etc.) must not share personal data with third parties without the permission of the institution;
  • Organizations must ensure adequate safety control measures to supervise employees appropriately and make relevant changes in their employee training programs to educate new employees accordingly.

The other medical institutions were also warned that the agency would conduct a stricter investigation in the future and collect all necessary information with appropriate actions to follow. It advises medical institutions to take steps to establish a data management system that creates a proper catalog of what data is being collected and in what form.

How Can Securiti Help

A major reason why Star Japan and other medical institutions found themselves in such a situation is the lack of a proper data management infrastructure. They were collecting data that had a category of personal data without even realizing it.

That problem is further exacerbated by the volume of data as hundreds of such videos were made and stored without any proper internal notifications or management system related to their storage and use that would comply with the APPI.

Securiti is a leader in providing data compliance and governance solutions that can help organizations effectively comply with the data obligations placed on them by APPI. With products such as sensitive data intelligence and asset & data discovery, organizations can not only find personal and sensitive data in structured and unstructured data systems but also gain insights related to who has had access to this data with the option to set up policies that curate access privileges to such data.

Request a demo today and learn more about how Securiti can help you comply with APPI and any other global data regulation.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:38

Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines

Sanofi Thumbnail
Watch Now View
Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View

Latest

Pete Angstadt joins Securiti View More

Why I joined Securiti

I’m thrilled to be joining Securiti as they embark on their next phase of growth. Why did I decide to join? In short -...

AI System Observability: Go Beyond Model Governance View More

AI System Observability: Go Beyond Model Governance

Across industries, AI systems are no longer just tools acting on human prompts. The AI landscape is evolving rapidly, and AI systems are gaining...

Top Data Security Challenges & How to Solve Them View More

Top Data Security Challenges & How to Solve Them

Learn the top data security challenges organizations face today. Learn about the challenge and its solution. Enhance your data security posture today.

View More

What is Enterprise Data Security?

Get comprehensive insights into enterprise data security, what it is, its importance, key components, and how Securiti helps ensure the utmost enterprise data security.

Mastering Cookie Consent: Global Compliance & Customer Trust View More

Mastering Cookie Consent: Global Compliance & Customer Trust

Discover how to master cookie consent with strategies for global compliance and building customer trust while aligning with key data privacy regulations.

Why Data Access Is Your Weakest Link—And How DSPM Fixes It View More

Why Data Access Is Your Weakest Link—And How DSPM Fixes It

Learn how DSPM provides unified Data+AI Access governance, offering contextual data intelligence, automated controls, safe AI+data access, and consistent least-privilege enforcement.

The European Health Data Space Regulation View More

The European Health Data Space Regulation: A Legislative Timeline and Implementation Roadmap

Download the infographic on the European Health Data Space Regulation, which features a clear timeline and roadmap highlighting key legislative milestones, implementation phases, and...

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New