SAĞLIK HİZMETLERİNDE BİYOMETRİK KİMLİK DOĞRULAMA: TÜRKİYE’DE BİYOMETRİK GÖZETİMİN BİR UYGULAMASI

Biyometrik yöntemlerle kişilerin kimliğinin tespiti veya doğrulanması, güvenlik nedenlerine bağlı olarak özellikle sınırlarda yaygın olarak kullanılmaktadır. Sosyal Güvenlik Kurumu, biyometrik kimlik doğrulama uygulamasını özel ve üniversite hastaneleri tarafından sunulan sağlık hizmetlerine taşımıştır. Sistemin kişisel bilgilerin mahremiyeti açısından riskler barındırdığı tartışma konusudur. Sosyal Güvenlik Kurumu’nun uygulamaya ilişkin kılavuz ve duyuruları ile veri paylaşımı ve güvenliği konusundaki mevzuatı mevcutsa da, ulusal bir veri koruma kanununun hazırlanmamış olması güvenlik boşluklarına neden olmaktadır. 

BIOMETRIC IDENTITY VERIFICATION IN HEALTH SERVICES: A BIOMETRIC SURVEILLANCE PRACTICE IN TURKEY

Determination or verification of identity with biometric methods has a widespread use especially at borders for security reasons. Social Security Institution transferred the biometric identity verification practice to health sercives that are provided by private and university hospitals. The risks of the new system considering the privacy of personal data are under debate. Although there are announcements or manuals of Social Security Institution regarding the implementation and legislation for data sharing and security exists, lack of a national data protection law brings with it security gaps. 

___

  • Alterman, A. (2003), ‘A piece of yourself’’: Ethical issues in biometric identification’. Ethics and Information Technology 5: 139–150.
  • Amoore, L. “Governing By Identity”. In Playing the ID card: Surveillance, security and identity in global perspective, edited by Colin Bennett and David Lyon, 21-36. London: Routledge, 2008.
  • Bauer, S. and J.E. Olsén (2009), ‘Observing the Others, Watching Over Oneself: Themes of Medical Surveillance in Society’. Surveillance&Society 6(2): 116-127.
  • Bowyer, K. W. (2004), ‘Face Recognition Technology and the Security Versus Privacy Tradeoff’. IEEE Technology and Society, Spring 2004, 9-20.
  • Breckenridge, Keith. “The Elusive Panopticon: The HANIS Project and the Politics of Standards in South Africa.” In Playing the ID card: Surveillance, security and identity in global perspective, edited by Colin Bennett and David Lyon, 39-56. London: Routledge, 2008.
  • Bright, J. (2011), ‘Building Biometrics: Knowledge Construction in the Democratic Control of Surveillance Technology’. Surveillance&Society 9(1/2): 233-247.
  • Constitutional Court (2014), ‘Turkish Constitution’ (Turkish).
  • Çavlin Bozbeyoğlu, A. (2011), ‘Citizenship rights in a surveillance society: The case of the electronic ID card in Turkey’. Surveillance&Society 9(1/2): 64-79.
  • European Commission (1995), ‘Official Journal L 281 , 23/11/1995 P. 0031 – 0050’. Internet: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri =CELEX:31995L0046:en:HTML. Last visited on June 11, 2014
  • European Commission (2013), Turkey 2013 Progress Report-SWD(2013) 417 final.
  • Graham, S. and D. Wood (2003), ‘Digitizing Surveillance: Categorization, Space, Inequality’. Critical Social Policy 23(2), 227-248.
  • Higgs, Edward (2001), “The Rise of the Information State: the Development of Central State Surveillance of the Citizen in England, 1500-2000”, Journal of Historical Society, Vol. 14 No.2.
  • Internet: http://www.anayasa.gov.tr/Mevzuat/Anayasa1982/. Last visited on June 9, 2014.
  • Karake-Shalhoub, Z. “Population ID card systems in the Middle East: The cas of the UAE”. In Playing the ID card: Surveillance, security and identity in global perspective, edited by Colin Bennett and David Lyon, 128-141. London: Routledge, 2008.
  • Ketizmen, M. and Ç. Ülküderner (2007), “E-Devlet Uygulamalarında Kişisel Verinin Korunma(ma)sı”, XII. Türkiye’de İnternet Konferansı, 8-10 Kasım 2007, Ankara: İnternet Teknolojileri Derneği. Internet: http://inet-tr. org.tr/inetconf12/bildiri/2.pdf. Last visited on June 13, 2014.
  • Krasmann, S. and S. Kühne (2014), ‘‘My fingerprint on Osama’s cup’. On objectivity and the role of the fictive regarding the acceptance of a biometric technology’. Surveillance&Society 12(1): 1-14.
  • Lyon, D. and C.J. Bennett (2008), “Playing the ID card: Understanding the significance of identity card systems”. In Playing the ID card: Surveillance, security and identity in global perspective, edited by Colin Bennett and David Lyon, 3-20. London: Routledge, 2008.
  • Prime Ministry (2014), ‘Prime Ministry-Legislation Information System: e-legislation’ (Turkish). Internet: http://www.mevzuat.gov.tr/Kanunlar. aspx. Last visited on June 9, 2014.
  • SSI (2013), ‘Manual for Identity Verification with Biometric Methods’ (Turkish). Internet: http://www.sgk.gov.tr/wps/portal/tr/e_sgk/diger_ uygulamalar/duyurular. Last visited on June 1, 2014.
  • SSI (2013a), ‘Announcement of 27/11/2013’ (Turkish). Internet: http:// www.sgk.gov.tr/wps/portal/tr/e_sgk/diger_uygulamalar/duyurular. Last visited on June 6, 2014.
  • SSI (2013b), ‘Announcement of 10/1/2014’ (Turkish). Internet: http://www. sgk.gov.tr/wps/portal/tr/e_sgk/diger_uygulamalar/duyurular. visited on June 8, 2014. Last
  • SSI (2013c), ‘Announcement of 22/3/2013’ (Turkish). Internet: http://www. sgk.gov.tr/wps/portal/tr/e_sgk/diger_uygulamalar/duyurular. visited on June 9, 2014. Last
  • SSI (2013d), ‘Announcement of 25/11/2013’ (Turkish). Internet: http:// www.sgk.gov.tr/wps/portal/tr/e_sgk/diger_uygulamalar/duyurular. Last visited on June 9, 2014.
  • SSI (2013e), ‘Announcement of 20/9/2013’ (Turkish). Internet: http://www. sgk.gov.tr/wps/portal/tr/e_sgk/diger_uygulamalar/duyurular. visited on June 10, 2014. Last
  • Torpey, J. (1997), ‘Coming and Going: On the State Monopolization of the Legitimate “Means of Movement”’. Sociological