| Literature DB >> 34095532 |
Jack Teng1, Colene Bentley2, Michael M Burgess3, Kieran C O'Doherty4, Kimberlyn M McGrail1,5.
Abstract
INTRODUCTION: Research using linked data sets can lead to new insights and discoveries that positively impact society. However, the use of linked data raises concerns relating to illegitimate use, privacy, and security (e.g., identity theft, marginalization of some groups). It is increasingly recognized that the public needs to be consulted to develop data access systems that consider both the potential benefits and risks of research. Indeed, there are examples of data sharing projects being derailed because of backlash in the absence of adequate consultation. (e.g., care.data in the UK). OBJECTIVES AND METHODS: This paper describes the results of a public deliberation event held in April 2018 in Vancouver, British Columbia. The purpose of this event was to develop informed and civic-minded public advice regarding the use and the sharing of linked data for research with a focus on the processes and regulations employed to release data. The event brought together 23 members of the public over two weekends.Entities:
Year: 2019 PMID: 34095532 PMCID: PMC8142623 DOI: 10.23889/ijpds.v4i1.1103
Source DB: PubMed Journal: Int J Popul Data Sci ISSN: 2399-4908
Figure 1: Timeline of public deliberation event and preparations| Statements and recommendations – governance of linked data sets | Y | N | A |
|---|---|---|---|
| 1. Develop a plan to make the data linkage approval process more efficient, without compromising the evaluation process. | 19 | 0 | 4 |
| 2. It is important to invest in a collection of linked data sets to promote efficient research while enhancing privacy protection. | 16 | 2 | 4 |
| 3. Policy makers should establish categories that identify requests that require different paths or speed for review, e.g., fast-track for urgent research priorities. | 14 | 8 | 1 |
| 4. If a commercial entity funds research with linked data, it should not be involved in the production and review of that research. | 9 | 0 | 14 |
5. There should be a committee or governing body with authority to: Provide oversight and investigation for breaches and/or harms Apply penalties or other consequences Develop policies to mitigate the potential for future breaches and/or harms Intervene when data stewards disagree Develop and operate an appeals process Provide certification for data stewards | 8 | 7 | 8 |
| Statements and recommendations – Security and review process for releasing linked data sets | Y | N | A |
|---|---|---|---|
| 6. Scientific review of the research proposal should be performed by an independent party. | 23 | 0 | 0 |
| 7. There should be best practices and guidelines for secure storage and access to linked data. | 23 | 0 | 0 |
| 8. Results and publications of linked data research must be reviewed to ensure that they are justified by the analysis of the data. | 21 | 2 | 0 |
| 9. The proposed research and data access should be reviewed by an independent ethics committee to ensure benefits outweigh potential harms (e.g. potential for re-identification, stigma). | 15 | 0 | 8 |
| 10. Research results should be reviewed by a qualified independent party to reaffirm the original purpose of the research. | 6 | 17 | 0 |
| 11. An independent party should assess requests for data to be sure that the data are necessary to conduct the research. | 4 | 7 | 12 |
| Statements and recommendations – Data steward responsibilities | Y | N | A |
|---|---|---|---|
| 12. Data stewards should have standard training or certification to ensure appropriate expertise for their role. | 19 | 0 | 4 |
| 13. Data stewards should have standard policies and procedures to guide their work and there should be a certifying body to maintain them. | 18 | 4 | 1 |
| 14. Research using linked data must be monitored by data stewards to ensure data are used in accordance with the original request. | 8 | 13 | 2 |
| Statements and recommendations – Researcher responsibilities | Y | N | A |
|---|---|---|---|
| 15. Researchers have some responsibility to vulnerable populations they study or identify as vulnerable in their research. | 23 | 0 | 0 |
| 16. Anyone seeking access to linked data must sign a standardized contract outlining confidentiality requirements and further dissemination of data. | 19 | 0 | 4 |
| 17. Data security certificate program should be established and it should be mandatory for people who are using linked data. | 18 | 3 | 2 |
| Statements – Involvement of the public | Y | N | A |
|---|---|---|---|
| 18. There should be public disclosure (e.g. on a website) of requests for access to data. This should include approvals, denials, and reasons for those decisions. | 14 | 2 | 7 |
| 19. Transparency and disclosure of research requests is sufficient as a form of public consultation | 16 | 1 | 6 |