Search for authorsSearch for similar articles
33
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: not found

      A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers

      research-article
      1 ,
      BMC Medical Research Methodology
      BioMed Central

      Read this article at

      ScienceOpenPublisherPMC
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Background

          Disease registers aim to collect information about all instances of a disease or condition in a defined population of individuals. Traditionally methods of operating disease registers have required that notifications of cases be identified by unique identifiers such as social security number or national identification number, or by ensembles of non-unique identifying data items, such as name, sex and date of birth. However, growing concern over the privacy and confidentiality aspects of disease registers may hinder their future operation. Technical solutions to these legitimate concerns are needed.

          Discussion

          An alternative method of operation is proposed which involves splitting the personal identifiers from the medical details at the source of notification, and separately encrypting each part using asymmetrical (public key) cryptographic methods. The identifying information is sent to a single Population Register, and the medical details to the relevant disease register. The Population Register uses probabilistic record linkage to assign a unique personal identification (UPI) number to each person notified to it, although not necessarily everyone in the entire population. This UPI is shared only with a single trusted third party whose sole function is to translate between this UPI and separate series of personal identification numbers which are specific to each disease register.

          Summary

          The system proposed would significantly improve the protection of privacy and confidentiality, while still allowing the efficient linkage of records between disease registers, under the control and supervision of the trusted third party and independent ethics committees. The proposed architecture could accommodate genetic databases and tissue banks as well as a wide range of other health and social data collections. It is important that proposals such as this are subject to widespread scrutiny by information security experts, researchers and interested members of the general public, alike.

          Related collections

          Most cited references36

          • Record: found
          • Abstract: found
          • Article: not found

          Research use of linked health data--a best practice protocol.

          This article outlines a protocol for facilitating access to administrative data for the purpose of health services research, when these data are sourced from multiple organisations. This approach is designed to promote confidence in the community and among data custodians that there are benefits of linked health information being used and that individual privacy is being rigorously protected. Linked health administration data can provide an unparalleled resource for the monitoring and evaluation of health care services. However, for a number of reasons, these data have not been readily available to researchers. In Australia, an additional barrier to research is the result of health data sets being collected by different levels of government - thus all are not available to any one authority. To improve this situation, a practical blue-print for the conduct of data linkage is proposed. This should provide an approach suitable for most projects that draw large volumes of information from multiple sources, especially when this includes organisations in different jurisdictions. Health data, although widely and diligently collected, continue to be under-utilised for research and evaluation in most countries. This protocol aims to make these data more easily available to researchers by providing a controlled and secure mechanism that guarantees privacy protection.
            Bookmark
            • Record: found
            • Abstract: not found
            • Book: not found

            Applied cryptography

              Bookmark
              • Record: found
              • Abstract: found
              • Article: not found

              DNA databanks and consent: A suggested policy option involving an authorization model

              Background Genetic databases are becoming increasingly common as a means of determining the relationship between lifestyle, environmental exposures and genetic diseases. These databases rely on large numbers of research subjects contributing their genetic material to successfully explore the genetic basis of disease. However, as all possible research questions that can be posed of the data are unknown, an unresolved ethical issue is the status of informed consent for future research uses of genetic material. Discussion In this paper, we discuss the difficulties of an informed consent model for future ineffable uses of genetic data. We argue that variations on consent, such as presumed consent, blanket consent or constructed consent fail to meet the standards required by current informed consent doctrine and are distortions of the original concept. In this paper, we propose the concept of an authorization model whereby participants in genetic data banks are able to exercise a certain amount of control over future uses of genetic data. We argue this preserves the autonomy of individuals at the same time as allowing them to give permission and discretion to researchers for certain types of research. Summary The authorization model represents a step forward in the debate about informed consent in genetic databases. The move towards an authorization model would require changes in the regulatory and legislative environments. Additionally, empirical support of the utility and acceptability of authorization is required.
                Bookmark

                Author and article information

                Journal
                BMC Med Res Methodol
                BMC Medical Research Methodology
                BioMed Central (London )
                1471-2288
                2003
                6 January 2003
                : 3
                : 1
                Affiliations
                [1 ]Centre for Epidemiology and Research, New South Wales Department of Health, Locked Mail Bag 961, North Sydney NSW 2059, Australia
                Article
                1471-2288-3-1
                10.1186/1471-2288-3-1
                140307
                12515580
                9972a852-7fab-427d-a2ff-4c0ab66bc4d9
                Copyright © 2003 Churches; licensee BioMed Central Ltd. This is an Open Access article: verbatim copying and redistribution of this article are permitted in all media for any purpose, provided this notice is preserved along with the article's original URL.
                History
                : 21 November 2002
                : 6 January 2003
                Categories
                Debate

                Medicine
                Medicine

                Comments

                Comment on this article