Skip to main content
Top
Published in: BMC Medical Informatics and Decision Making 1/2016

Open Access 01-12-2016 | Research article

Legal assessment tool (LAT): an interactive tool to address privacy and data protection issues for data sharing

Authors: Wolfgang Kuchinke, Christian Krauth, René Bergmann, Töresin Karakoyun, Astrid Woollard, Irene Schluender, Benjamin Braasch, Martin Eckert, Christian Ohmann

Published in: BMC Medical Informatics and Decision Making | Issue 1/2016

Login to get access

Abstract

Background

In an unprecedented rate data in the life sciences is generated and stored in many different databases. An ever increasing part of this data is human health data and therefore falls under data protected by legal regulations. As part of the BioMedBridges project, which created infrastructures that connect more than 10 ESFRI research infrastructures (RI), the legal and ethical prerequisites of data sharing were examined employing a novel and pragmatic approach.

Methods

We employed concepts from computer science to create legal requirement clusters that enable legal interoperability between databases for the areas of data protection, data security, Intellectual Property (IP) and security of biosample data. We analysed and extracted access rules and constraints from all data providers (databases) involved in the building of data bridges covering many of Europe’s most important databases. These requirement clusters were applied to five usage scenarios representing the data flow in different data bridges: Image bridge, Phenotype data bridge, Personalised medicine data bridge, Structural data bridge, and Biosample data bridge. A matrix was built to relate the important concepts from data protection regulations (e.g. pseudonymisation, identifyability, access control, consent management) with the results of the requirement clusters. An interactive user interface for querying the matrix for requirements necessary for compliant data sharing was created.

Results

To guide researchers without the need for legal expert knowledge through legal requirements, an interactive tool, the Legal Assessment Tool (LAT), was developed. LAT provides researchers interactively with a selection process to characterise the involved types of data and databases and provides suitable requirements and recommendations for concrete data access and sharing situations. The results provided by LAT are based on an analysis of the data access and sharing conditions for different kinds of data of major databases in Europe.

Conclusions

Data sharing for research purposes must be opened for human health data and LAT is one of the means to achieve this aim. In summary, LAT provides requirements in an interactive way for compliant data access and sharing with appropriate safeguards, restrictions and responsibilities by introducing a culture of responsibility and data governance when dealing with human data.
Appendix
Available only for authorised users
Literature
2.
go back to reference van Panhuis WG, Paul P, Emerson C, Grefenstette J, Wilder R, Herbst AJ. Heymann D and Donald S Burke. A systematic review of barriers to data sharing in public health. BMC Public Health. 2014;14:1144–53.CrossRefPubMedPubMedCentral van Panhuis WG, Paul P, Emerson C, Grefenstette J, Wilder R, Herbst AJ. Heymann D and Donald S Burke. A systematic review of barriers to data sharing in public health. BMC Public Health. 2014;14:1144–53.CrossRefPubMedPubMedCentral
3.
go back to reference Lee LM, Gostin LO. Ethical collection, storage, and use of public health data: a proposal for a national privacy protection. JAMA. 2009;302(1):82–4.CrossRefPubMed Lee LM, Gostin LO. Ethical collection, storage, and use of public health data: a proposal for a national privacy protection. JAMA. 2009;302(1):82–4.CrossRefPubMed
5.
go back to reference Goodman KW, Adams S, Berner ES, Embi PJ, Hsiung R, et al. AMIA’s code of professional and ethical conduct. JAMIA. 2013;20:141–3.PubMedPubMedCentral Goodman KW, Adams S, Berner ES, Embi PJ, Hsiung R, et al. AMIA’s code of professional and ethical conduct. JAMIA. 2013;20:141–3.PubMedPubMedCentral
7.
go back to reference Knoppers BM, Harris JR, Budin-Ljøsne I, Dove ES. A human rights approach to an international code of conduct for genomic and clinical data sharing. Hum Genet. 2014;133:895–903.CrossRefPubMedPubMedCentral Knoppers BM, Harris JR, Budin-Ljøsne I, Dove ES. A human rights approach to an international code of conduct for genomic and clinical data sharing. Hum Genet. 2014;133:895–903.CrossRefPubMedPubMedCentral
8.
go back to reference Malin B, Karp D, Scheuermann RH. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research. J Investig Med. 2010;58(1):11–8.CrossRefPubMedPubMedCentral Malin B, Karp D, Scheuermann RH. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research. J Investig Med. 2010;58(1):11–8.CrossRefPubMedPubMedCentral
9.
go back to reference Yu F, Ji Z. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge. BMC Med Inform Decis Mak. 2014;14 Suppl 1:S3–11.CrossRefPubMedPubMedCentral Yu F, Ji Z. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge. BMC Med Inform Decis Mak. 2014;14 Suppl 1:S3–11.CrossRefPubMedPubMedCentral
10.
go back to reference Jiang X, Zhao Y, Wang X, Malin B, Wang S, Ohno-Machado L, Tang H. A community assessment of privacy preserving techniques for human genomes. BMC Med Inform Decis Mak. 2014;14 Suppl 1:S1.CrossRefPubMedPubMedCentral Jiang X, Zhao Y, Wang X, Malin B, Wang S, Ohno-Machado L, Tang H. A community assessment of privacy preserving techniques for human genomes. BMC Med Inform Decis Mak. 2014;14 Suppl 1:S1.CrossRefPubMedPubMedCentral
15.
go back to reference Large human databases with human data have been created, like the Human Metabolome Database (HMDB), Immuno Polymorphism Database, 1000 Genomes Project, European Genome-phenome Archive. http://www.hmdb.ca/, https://www.ebi.ac.uk/ipd/. http://www.1000genomes.org/, https://www.ebi.ac.uk/ega/home. Accessed 27 Apr 2016. Large human databases with human data have been created, like the Human Metabolome Database (HMDB), Immuno Polymorphism Database, 1000 Genomes Project, European Genome-phenome Archive. http://​www.​hmdb.​ca/​, https://​www.​ebi.​ac.​uk/​ipd/​.​ http://www.1000genomes.org/, https://www.ebi.ac.uk/ega/home. Accessed 27 Apr 2016.
16.
go back to reference ESFRI. European Research Infrastructures with global impact. Brussels, Belgium: ESFRI brochure 113. SFRI Secretariat; 2013. ESFRI. European Research Infrastructures with global impact. Brussels, Belgium: ESFRI brochure 113. SFRI Secretariat; 2013.
17.
go back to reference e-IRG Report on Data Management. Data Management Task Force. Espoo, Finland: e-IRG secretariat; 2009. e-IRG Report on Data Management. Data Management Task Force. Espoo, Finland: e-IRG secretariat; 2009.
19.
go back to reference SMART2007/0059. Study on the legal framework for interoperable eHealth in Europe. Final report. Version 1.5. Brussels: European Commission (2009). SMART2007/0059. Study on the legal framework for interoperable eHealth in Europe. Final report. Version 1.5. Brussels: European Commission (2009).
20.
go back to reference Bartling S, Friesike S. Opening Science. Heidelberg, Germany: Springer One; 2014.CrossRef Bartling S, Friesike S. Opening Science. Heidelberg, Germany: Springer One; 2014.CrossRef
21.
go back to reference Pohl K. Requirements Engineering: An Overview. In: Encyclopedia of Computer Science and Technology, vol. 36. New York, USA: Marcel Dekker, Inc; 1997. Pohl K. Requirements Engineering: An Overview. In: Encyclopedia of Computer Science and Technology, vol. 36. New York, USA: Marcel Dekker, Inc; 1997.
22.
go back to reference Sutcliffe A. Scenario-based requirements engineering. Requirements Engineering Conference 2003. Proceedings. 11th IEEE International; 2003. 320–329. Sutcliffe A. Scenario-based requirements engineering. Requirements Engineering Conference 2003. Proceedings. 11th IEEE International; 2003. 320–329.
23.
go back to reference Ian A, Neil M. Scenarios, Stories, Use Cases. Through the systems development life-cycle. Chichester, England: John Wiley & Sons, Ltd; 2004. Ian A, Neil M. Scenarios, Stories, Use Cases. Through the systems development life-cycle. Chichester, England: John Wiley & Sons, Ltd; 2004.
25.
go back to reference Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995. No L 281/31. Luxembourg, Luxembourg; 1995. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995. No L 281/31. Luxembourg, Luxembourg; 1995.
26.
go back to reference Guideline for Good Clinical Practice E6(R1). ICH Expert Working Group; 1996. Guideline for Good Clinical Practice E6(R1). ICH Expert Working Group; 1996.
28.
go back to reference Boussi Rahmouni H, Solomonides T, Casassa Mont M, Shiu S, Rahmouni M. A model-driven privacy compliance decision support for medical data sharing in Europe. Methods Inf Med. 2011;50:326–36.CrossRefPubMed Boussi Rahmouni H, Solomonides T, Casassa Mont M, Shiu S, Rahmouni M. A model-driven privacy compliance decision support for medical data sharing in Europe. Methods Inf Med. 2011;50:326–36.CrossRefPubMed
29.
go back to reference Ramingwong L. A review of requirements engineering processes, problems and models. Int J Eng Sci Technol (IJEST). 2012;4(June):2997–3002. Ramingwong L. A review of requirements engineering processes, problems and models. Int J Eng Sci Technol (IJEST). 2012;4(June):2997–3002.
33.
go back to reference de Maat E, van Engers TM. Mission impossible? Automated norm analysis of legal texts. Legal Knowledge and Information systems, Jurix. 2003 (sixteenth Annual Conference); 2003. p.398. de Maat E, van Engers TM. Mission impossible? Automated norm analysis of legal texts. Legal Knowledge and Information systems, Jurix. 2003 (sixteenth Annual Conference); 2003. p.398.
35.
go back to reference Poulin D, Bratley P, Frémont J, Mackaay E. Legal interpretation in expert systems. In: Proceedings of the 4th international conference on Artificial intelligence and law. ACM; 1993. pp. 90–99. Poulin D, Bratley P, Frémont J, Mackaay E. Legal interpretation in expert systems. In: Proceedings of the 4th international conference on Artificial intelligence and law. ACM; 1993. pp. 90–99.
36.
go back to reference Grabmair M, Ashley KD. Towards Modeling Systematic Interpretation of Codified Law. In: Moens MF, Spyns P, editors. Legal Knowledge and Information Systems (JURIX 2005). Amsterdam: IOS Press; 2005. p. 107-8. Grabmair M, Ashley KD. Towards Modeling Systematic Interpretation of Codified Law. In: Moens MF, Spyns P, editors. Legal Knowledge and Information Systems (JURIX 2005). Amsterdam: IOS Press; 2005. p. 107-8.
37.
go back to reference Breaux TD, Vail MW, Antón A. Towards regulatory compliance: Extracting rights and obligations to align requirements with regulations. In: Requirements Engineering, 14th IEEE International Conference Proceedings (IEEE 2006, September); 2006:49–58. Breaux TD, Vail MW, Antón A. Towards regulatory compliance: Extracting rights and obligations to align requirements with regulations. In: Requirements Engineering, 14th IEEE International Conference Proceedings (IEEE 2006, September); 2006:49–58.
38.
go back to reference Casellas N, Nieto JE, Meroño A, et al. Ontological Semantics for Data Privacy Compliance: The NEURONA Project. Palo Alto, California: 2010 AAAI Spring Symposium Series; 2010. Casellas N, Nieto JE, Meroño A, et al. Ontological Semantics for Data Privacy Compliance: The NEURONA Project. Palo Alto, California: 2010 AAAI Spring Symposium Series; 2010.
42.
go back to reference McCallister E, Grance T, Scarfone K. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). NIST, Special Publication 800–122. Gaithersburg, USA: National Institute of Standards and Technology; 2010. McCallister E, Grance T, Scarfone K. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). NIST, Special Publication 800–122. Gaithersburg, USA: National Institute of Standards and Technology; 2010.
43.
go back to reference Rahmouni HB, Solomonides T, Mont MC, Shiu S. Privacy compliance in European healthgrid domains: an ontology-based approach. In: Proc. 22nd IEEE Int. Symp. Albuquerque, NM: On Computer-Based Medical Systems, CBMS 2009; 2009. Rahmouni HB, Solomonides T, Mont MC, Shiu S. Privacy compliance in European healthgrid domains: an ontology-based approach. In: Proc. 22nd IEEE Int. Symp. Albuquerque, NM: On Computer-Based Medical Systems, CBMS 2009; 2009.
47.
go back to reference Kuchinke W, Ohmann C, Verheij RA, van Veen EB, Arvanitis TN, Taweel A, Delaney BC. A standardised graphic method for describing data privacy frameworks in primary care research using a flexible zone model. Int J Med Inform. 2014;83(12):941–57.CrossRefPubMed Kuchinke W, Ohmann C, Verheij RA, van Veen EB, Arvanitis TN, Taweel A, Delaney BC. A standardised graphic method for describing data privacy frameworks in primary care research using a flexible zone model. Int J Med Inform. 2014;83(12):941–57.CrossRefPubMed
60.
go back to reference The International Policy interoperability and data Access Clearinghouse (IPAC) provides a “one stop” screening service for policy interoperability and access authorization. http://www.p3g.org/ipac. Accessed 28 Apr 2016. The International Policy interoperability and data Access Clearinghouse (IPAC) provides a “one stop” screening service for policy interoperability and access authorization. http://​www.​p3g.​org/​ipac. Accessed 28 Apr 2016.
65.
go back to reference Brittain J, Darwin IF. Tomcat: The Definitive Guide. Boston, MA, USA: O’Reilly Media, Inc; 2007. Brittain J, Darwin IF. Tomcat: The Definitive Guide. Boston, MA, USA: O’Reilly Media, Inc; 2007.
66.
go back to reference Lindholm T, Yellin F. Java Virtual Machine Specification. 2nd ed. Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc; 1999. Lindholm T, Yellin F. Java Virtual Machine Specification. 2nd ed. Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc; 1999.
Metadata
Title
Legal assessment tool (LAT): an interactive tool to address privacy and data protection issues for data sharing
Authors
Wolfgang Kuchinke
Christian Krauth
René Bergmann
Töresin Karakoyun
Astrid Woollard
Irene Schluender
Benjamin Braasch
Martin Eckert
Christian Ohmann
Publication date
01-12-2016
Publisher
BioMed Central
Published in
BMC Medical Informatics and Decision Making / Issue 1/2016
Electronic ISSN: 1472-6947
DOI
https://doi.org/10.1186/s12911-016-0325-0

Other articles of this Issue 1/2016

BMC Medical Informatics and Decision Making 1/2016 Go to the issue