Literature DB >> 12869330

Learning from experience: privacy and the secondary use of data in health research.

William Lowrance.   

Abstract

Health services research must continually address the question: Under what conditions may data not collected specifically for research, such as primary medical data, be re-used for research without compromising the privacy of the data-subjects? For secondary use of data in research there are basically three options. Option A: Use personal data with consent or other assent from the data-subjects. To make this both fairer and more practical, in many circumstances broader construals of consent, or permission or approval, need to be explored and instituted. Option B: Anonymise the data, then use them. For many studies, this is the most practical and desirable option. The craft of anonymisation, including reversible anonymisation, or key-coding, needs to be developed and more fully supported under law. Option C: Use personal data without explicit consent, under a public interest mandate. Whether and how the data should be anonymised will depend on the situation. Public health mandates and protections deserve to be clarified, strengthened and extended for a variety of surveillance, registration, clinical audit, health services research and other types of investigation. Safeguards are an integral part of the research promise to the public, offer crucial reassurance and should be emphasised. For health services research, databases are core resources, and their stewardship must be cultivated.

Mesh:

Year:  2003        PMID: 12869330     DOI: 10.1258/135581903766468800

Source DB:  PubMed          Journal:  J Health Serv Res Policy        ISSN: 1355-8196


  18 in total

1.  Security and access of health research data.

Authors:  Willy Susilo; Khin Than Win
Journal:  J Med Syst       Date:  2007-04       Impact factor: 4.460

2.  Maximising research opportunities of new NHS information systems.

Authors:  Nick Black
Journal:  BMJ       Date:  2008-01-19

3.  Assuring the confidentiality of shared electronic health records.

Authors:  Mark McGilchrist; Frank Sullivan; Dipak Kalra
Journal:  BMJ       Date:  2007-12-15

4.  A globally optimal k-anonymity method for the de-identification of health data.

Authors:  Khaled El Emam; Fida Kamal Dankar; Romeo Issa; Elizabeth Jonker; Daniel Amyot; Elise Cogo; Jean-Pierre Corriveau; Mark Walker; Sadrul Chowdhury; Regis Vaillancourt; Tyson Roffey; Jim Bottomley
Journal:  J Am Med Inform Assoc       Date:  2009-06-30       Impact factor: 4.497

5.  Joint replacement recipients' views about health information privacy.

Authors:  Amanda L Terry; Bert M Chesworth; Robert B Bourne; Paul Stolee; Mark Speechley
Journal:  Health Expect       Date:  2013-10-01       Impact factor: 3.377

Review 6.  Confidentiality of personal health information used for research.

Authors:  Dipak Kalra; Renate Gertz; Peter Singleton; Hazel M Inskip
Journal:  BMJ       Date:  2006-07-22

7.  Towards Principles-Based Approaches to Governance of Health-related Research using Personal Data.

Authors:  Graeme Laurie; Nayha Sethi
Journal:  Eur J Risk Regul       Date:  2013-01-01

8.  Methods for the de-identification of electronic health records for genomic research.

Authors:  Khaled El Emam
Journal:  Genome Med       Date:  2011-04-27       Impact factor: 11.117

9.  The re-identification risk of Canadians from longitudinal demographics.

Authors:  Khaled El Emam; David Buckeridge; Robyn Tamblyn; Angelica Neisa; Elizabeth Jonker; Aman Verma
Journal:  BMC Med Inform Decis Mak       Date:  2011-06-22       Impact factor: 2.796

Review 10.  Views of healthcare professionals to linkage of routinely collected healthcare data: a systematic literature review.

Authors:  Y M Hopf; C Bond; J Francis; J Haughney; P J Helms
Journal:  J Am Med Inform Assoc       Date:  2013-05-28       Impact factor: 4.497

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.