| Literature DB >> 26040848 |
Martin Bialke1, Peter Penndorf2,3, Tim Wegner4, Thomas Bahls5,6, Christoph Havemann7, Jens Piegsa8, Wolfgang Hoffmann9,10.
Abstract
BACKGROUND: Cohort studies and registries rely on massive amounts of personal medical data. Therefore, data protection and information security as well as ethical aspects gain in importance and need to be considered as early as possible during the establishment of a study. Resulting legal and ethical obligations require a precise implementation of appropriate technical and organisational measures for a Trusted Third Party.Entities:
Mesh:
Year: 2015 PMID: 26040848 PMCID: PMC4467617 DOI: 10.1186/s12967-015-0545-6
Source DB: PubMed Journal: J Transl Med ISSN: 1479-5876 Impact factor: 5.531
Figure 1The Trusted Third Party (TTP) is a core element in a research data management infrastructure: After provision of a system-wide unique identifier for the study participant (identity management), the TTP stores the Informed Consent Document (IC) and provides the required pseudonyms (PSN) for data capture. The participants identifying data (IDAT) is stored within the TTP. Pseudonymised medical data (MDAT) and related metadata are stored in the research platform. The usage of (pseudonymised) medical data typically includes quality assurance, reporting and analysis. If the participant consented to the secondary use of his medical data, data may be provided for further research projects via a separate transfer unit.
Figure 2Component Overview of the Trusted Third Party (TPP) Dispatcher: Composing functionalities from independent service modules (E-PIX Identity Management, gICS Informed Consent Management, gPAS Pseudonym Management).
Overview of basic Trusted Third Party workflows
| Workflow | Description |
|---|---|
| get_mpi | Generate MPI ID for given IDAT using E-PIX-service |
| check_patient_exists | Check if a participant with given IDAT already exists in the E-PIX-database |
| get_id_from_id | Get a pseudonym for a given identifier (e.g. MPI ID) and vice versa using the gPAS-service |
| add_consent | Add a new informed consent (based on a template containing several modules and policies) for the given identifier using the gICS-service |
| check_consent_exists | Check if an informed consent for the given identifier exists in the gICS-database |
| query_consent | Query a list of policies and their consented state for a given informed consent identifier using the gICS-service |
| add_scan | Add a document scan to a previously defined informed consent using the gICS-service |
| update_participant | Update a participants IDAT already existing in the E-PIX-database |
| get_participant_by_mpi_id | Retrieve a participants IDAT from the E-PIX database identified by its MPI ID |
| add_participant_get_psn | Sequential workflow combining get_mpi and get_id_from_id |
| get_participant_by_psn | Sequential workflow combining get_id_from_id and get_participant_by_mpi_id |
Figure 3Example: defining the individual workflow “Create Participant” for the DZHK required only a subset of basic workflows.
Advantages and disadvantages of the developed Trusted Third Party Dispatcher
| Advantages | Disadvantages |
|---|---|
| Support for automation reduces susceptibility to errors and accelerates internal TTP processes | Initial configuration of the TTP Dispatcher requires professional IT support to set up mandatory databases and the application server |
| Integrated audit-and-trail-mechanisms ensure traceability and transparency of participating systems | Changes and updates in TTP Dispatcher core functions involve a determined update management including tests in the respective project, study or registry |
| Modular and adaptable workflows improve portability and re-usability | |
| Multi-client capability to manage large multi-site projects | |
| Interoperability of service components |