| Literature DB >> 29149267 |
Jui-Chu Lin1, Chien-Te Fan2, Chia-Cheng Liao3, Yao-Sheng Chen1.
Abstract
The Taiwan Biobank (TWB) is a biomedical research database of biopsy data from 200 000 participants. Access to this database has been granted to research communities taking part in the development of precision medicines; however, this has raised issues surrounding TWB's access to electronic medical records (EMRs). The Personal Data Protection Act of Taiwan restricts access to EMRs for purposes not covered by patients' original consent. This commentary explores possible legal solutions to help ensure that the access TWB has to EMR abides with legal obligations, and with governance frameworks associated with ethical, legal, and social implications. We suggest utilizing "hash function" algorithms to create nonretrospective, anonymized data for the purpose of cross-transmission and/or linkage with EMR.Entities:
Keywords: EMR; biobank; linkage; precision medicine
Mesh:
Year: 2018 PMID: 29149267 PMCID: PMC5774504 DOI: 10.1093/gigascience/gix110
Source DB: PubMed Journal: Gigascience ISSN: 2047-217X Impact factor: 6.524
Figure 1:Flowchart of the BIIP. There are 6 featured policy aspects of the BIIP: talent recruitment, amendments of the law, increased access to electronic medical records and the Taiwan Biobank, development of intellectual property rights, providing financial support, and market and product development. By implementing these 6 policies, the BIIP aims to establish a biomedical corridor that extends from north to south, with 3 major biomedical centers that will be hubs for the development of Taiwan's biomedical industry. Under such a framework, a translational medical platform based on the integration of EMR and the Biobank will be the backbone for streamlining biomedical research. IP: intellectual property.
Article 6 of the PDPA
|
Personal information of medical records, medical treatment, genetic information, sexual life, health examination, and criminal records should not be collected, processed, or used. However, the following situations are not subject to the limits set in the preceding sentence:
when in accordance with law; when it is necessary for a government agency to perform its legal duties or for a nongovernment agency to fulfill its legal obligation, and proper security measures are adopted prior or subsequent to such collection, processing, or use; when the Party has made public such information by himself, or when the information concerned has been publicized legally; where it is necessary to perform statistical or other academic research, a government agency or an academic research institution collects, processes, or uses personal information for the purpose of medical treatment, public health, or crime prevention; the information may not lead to the identification of a specific person after its processing by the provider, or from the disclosure by the collector; where it is necessary to assist a government agency in performing its legal duties or a nongovernment agency in fulfilling its legal obligations, and proper security measures are adopted prior or subsequent to such collection, processing, or use; where the Party has consented in writing, unless such consent exceeds the necessary scope of the specific purpose; the collection, processing or use merely with the consent of the Party is prohibited by other statutes; or such consent is against the Party's will. |
Personal information like medical records, medical treatment, genetic information, sexual life, health examination, and criminal records, etc., is sensitive in nature. Article 6 of PDPA provides that such information, in general, shall not be collected, processed, or used. Article 6 of PDPA enlists 6 exceptions to this restriction.
Figure 2:Flowchart describing the hash function framework. One of the key features of hash function algorithms is that they transform identifiable personal data into a unique 128-character code. The Taiwan Biobank will develop and enter into a protocol with the NHID and adopt a hash function framework. When it is necessary to access EMRs in the NHID, all identifiable data processed will be replaced by hash values returned by a hash function, so access to EMRs will proceed in an anonymous manner.