Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Need For Better Data Management: PPC Issues Report On Data Processing From Surgical Videos

Published January 20, 2023
Author

Muhammad Faisal Sattar

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/Asia

Listen to the content

On November 2, 2022, the Personal Information Protection Commission (PPC) in Japan issued a report on Star Japan LLC's handling, storage, sharing, and overall management of personal information derived from surgical videos. Following discrepancies in their practices, the body conducted a similar review of 60 other medical institutions' practices related to surgical videos.

Star Japan's employees have contractual obligations to acquire surgical videos. These surgical videos are supposed to be received without including information that could identify individuals. Due to several factors, such as the lack of internal notifications and a dedicated management plan for appropriately handling such videos, patients' personal data, such as their names, was released. Medical institutions that offer surgical videos include those that handle them as personal data and those that do not, thereby managing the videos as personal information without building a database.

More importantly, patients' explicit consent had not been gained before making such videos highlighting the overall lack of appropriate safety management measures. Additionally, doctors (who were employees of each medical institution) provided surgical videos to Star Japan LLC without the permission of the medical institution that held the patient's personal data.

The following guidelines were issued to Star Japan following the identification of the aforementioned issue:

  • Going forward, before collecting users' personal data, they must specify the purpose of their collection, potential uses, and appropriately notify the users when sharing any data with third parties;
  • When users' data is being shared with third parties, the organization must ensure the implementation of an appropriate system design and determine whether the data being shared contains any personal data. If so, any sharing of such data must comply with the requirements set per the Act on the Protection of Personal Information 2020 (APPI).

Major Implications For Other Institutions

Following its instructions to Star Japan, the PPC Notification also contains general recommendations and guidelines 7 medical institutions that manage surgical videos as part of their users' collected personal data:

  • Proper consent of the users must be gained before an organization can share such data with a third party and establish appropriate systems to obtain that consent;
  • Employees of the medical institutions (doctors, nurses, etc.) must not share personal data with third parties without the permission of the institution;
  • Organizations must ensure adequate safety control measures to supervise employees appropriately and make relevant changes in their employee training programs to educate new employees accordingly.

The other medical institutions were also warned that the agency would conduct a stricter investigation in the future and collect all necessary information with appropriate actions to follow. It advises medical institutions to take steps to establish a data management system that creates a proper catalog of what data is being collected and in what form.

How Can Securiti Help

A major reason why Star Japan and other medical institutions found themselves in such a situation is the lack of a proper data management infrastructure. They were collecting data that had a category of personal data without even realizing it.

That problem is further exacerbated by the volume of data as hundreds of such videos were made and stored without any proper internal notifications or management system related to their storage and use that would comply with the APPI.

Securiti is a leader in providing data compliance and governance solutions that can help organizations effectively comply with the data obligations placed on them by APPI. With products such as sensitive data intelligence and asset & data discovery, organizations can not only find personal and sensitive data in structured and unstructured data systems but also gain insights related to who has had access to this data with the option to set up policies that curate access privileges to such data.

Request a demo today and learn more about how Securiti can help you comply with APPI and any other global data regulation.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View

Latest

View More

From Trial to Trusted: Securely Scaling Microsoft Copilot in the Enterprise

AI copilots and agents embedded in SaaS are rapidly reshaping how enterprises work. Business leaders and IT teams see them as a gateway to...

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

Data Security Governance View More

Data Security Governance: Key Principles and Best Practices for Protection

Learn about Data Security Governance, its importance in protecting sensitive data, ensuring compliance, and managing risks. Best practices for securing data.

AI TRiSM View More

What is AI TRiSM and Why It’s Essential in the Era of GenAI

The launch of ChatGPT in late 2022 was a watershed moment for AI, introducing the world to the possibilities of GenAI. After OpenAI made...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

View More

Top 10 Privacy Milestones That Defined 2024

Discover the top 10 privacy milestones that defined 2024. Learn how privacy evolved in 2024, including key legislations enacted, data breaches, and AI milestones.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New