Data Governance in Large-scale Biomedical Research: Tools, Methods and Policy Goals
|
|
- Leo Watkins
- 8 years ago
- Views:
Transcription
1 Data Governance in Large-scale Biomedical Research: Tools, Methods and Policy Goals Pilar N. Ossorio, Ph.D., JD University of Wisconsin Morgridge Institute for Research
2 Road Map What is governance? From the specific to the general Specific: sharing sensitive human data through controlled access repositories General: some observations on the future of governing human data in biomedical research
3 Governance A Very Brief Introduction
4 What is governance? Processes and interactions through which a collection of actors seeking to solve a problem or operate an institution generate, reinforce, revise, and enforce rules, policies, and norms of behavior.
5 Governance Values To achieve legitimacy (for all public gov systems) Institutions and rules should be: fair, efficient, effective, well-reasoned, responsive, justified, locally-informed, adaptive (problem solving) Processes should be: deliberative, inclusive and participatory, transparent, and reasonable Decision makers should have accountability Identify other values specific to biomedical research and health care and Goal: Simulatanousely advance as many values as possible; prioritize, balance, or trade-off as necessary.
6 Biomed Research & Data Governance Privacy and Respect Advance scientific knowledge Promote Human Flourishing Improve healthcare systems, improve health Achieve a politically and socially functional set of power relations in society
7 Governance Tools Statutes & Regulations Contracts (i.e., data user agreements) Professional and institutional policies and norms Reputational incentives Citizen monitoring Market mechanisms Certifications, insurance, other??? Technical infrastructure
8 The Particular Controlled Access Data Sharing
9 Sharing Human Data Fundamental tension: Promote science through sharing while protecting the interests of people whose data are in the repositories. Minimize informational harm and ensure that risks are justified. Respect & promise keeping Advancing science
10 Resolving the Tension Open Access Controlled Access
11
12
13 Repository Governance at a Glance Data deposition agreements and rules; IRB review Data use agreements and rules Data Producers Repository/NIH Data Users Data curation, quality control, policies for data access and use, DACs, compliance assessments
14 Reporting on data accessed up to Dec. 1, studies had deposited datasets 2221 investigators had accessed at least one data set 924 publications cited a dataset from dbgap
15 GWAS/GDS Data Access & Use Different datasets have different data use restrictions because: The came from studies with different consent processes and promises to participants; Different ICs have slightly different policies for accessing data for which they are responsible; Large, multisite studies and common fund projects can have their own specific data sharing policies, particularly for prepublication data sharing.
16 The Project Interviewed 30 dbgap users between 2009 and Additional background interviews w DAC members. Total Data Users 30 Gender Female 11 Male 19 Prof. Affiliation Biomedical 17 Computational 11 Other 2 Institution University 25 Firm 5
17 Research Questions Do data users think controlled access strikes a reasonable balance between promoting science and protecting/respecting data sources? Do data users know the use restrictions on dbgap data generally, and on their data in particular? What factors influence users willingness or ability to follow the rules? What steps do researchers take to assure compliance?
18 One Key Finding V. Biomedical scientists and data scientists had very different experiences with and views of the controlled access process!
19 I think the burdensomeness [of controlled access] is not necessarily a bad thing. It s, it s a filter... And so, so people have to show a commitment to being serious about the data, which probably is correlative with being serious about its protection. And you also, usually, have to have time and money to be able to do this. So, grant and teaching release, and so other people have said, Yes, you are a credible researcher in order to be able to go through this process.
20 Even if the mechanism for allowing controlled access seems great on paper, the implementation is complicated... This was the NIH people reviewing our requests and for reasons that are beyond me turning us down. I don t have time for this! And so it was a real turn down. And, it sounds like why... from my point of view it s why, why, why should I be denied access to this data!
21 Bioscientists vs Data Scientists Bioscientists are accustomed to other oversight regimes that impose delays on research while data scientists are much less familiar with such oversight. Bioscientists are more likely to plan research with delays in mind. Bioscientists are more likely to have expertise at navigating oversight processes, or they have somebody with such knowledge in their local professional networks.
22 Bioscientists vs Data Scientists Bioscientists are more likely to have a commitment to studying one particular disease... They may need fewer datasets, and even if they access many, those datasets are often overseen by the same data access committee. A bioscientist s longstanding commitment to studying a particular disease might make her/him more willing to persevere in the face of obstacles to data access.
23 Different Professional Networks! M.E.J. Newman (2004) PNAS, 101 (Supp.1):
24 Bioscientists vs Data Scientists Different professional networks! Bioscientists have someone they can call when things go wrong, NIH is not a bunch of faceless bureaucrats to them. Bioscientists are more likely to know someone who played a role in developing the policy. A bioscientist who spends months getting access to the data in dbgap has a competitive advantage over her peers, whereas a data scientist may be a professional disadvantage when compared to peers who work on completely open data.
25
26 Compliance and Professionalism Why do people comply with data use restrictions? Serious bioscientists do not violate participant trust or poison the well for their peers, so they follow the rules for protecting participants. Serious data scientists do not permit breaches of data security or data use restrictions. Biomedical Compliance Behavior Serious Scientist Computational
27 Two Lesson s Learned Inclusiveness, participation, and transparency matter in research data governance! Inattention by the designers of the GWAS/GDS policy to the networked/nodal nature of data governance has led to some of the most significant delays in data access.
28 Broadening the Vision: Data Governance Going Forward
29 dbgap is so 2014!
30 Going Forward There will be increasing complexity and pluralism with respect to: The types of data used in biomedical research; The routes by which researchers will access data; The types of actors who will be involved in data governance; The computational approaches to sharing and analyzing data; Size of studies and complexity of study design.
31 Complexity and Governance Hierarchical, integrated, comprehensive governance regimes with extensive formal law networked, departure from hierarchy, more public-private partnerships, fewer formal and enforceable rules and more soft law experimentalist governance
32 Experimentalist Governance Openness to participation by a very broad range of actors or potential actors; Extensive deliberation; Broadly agreed common problem and articulation of a framework setting forth open ended goals; Implementation by actors with local or contextual knowledge; Continuous feedback, data collection or reporting, and monitoring of progress/effectiveness; Evolution of rules.
33 Tailor Data Governance to Fit
34 Conceptualizing the Enterprise Frame the problem carefully: Privacy v. utility OR proper channeling of the right kind and amt of data to the right people? Who owns the data? OR who controls its collection, use, and redistribution, and how do we make that decision?
35 Legal Complexities of Research Data Governance U.S. Federal Law HIPAA, FCRA, GINA COPPA, Privacy Act, Federal Trade Comm. Act, IP Law State medical info privacy law, other state law, and state regulations U.S. Regulations Common Rule, HIPAA Privacy Rule, HIPAA Security Rule, FDA medical device regulations, FDA Health IT regs
36 Law How can compliance with a patchwork of sector-specific laws be simplified? Do we need some harmonization? Are there conflicts among the applicable laws? Do we need special data use authority for health care researchers or the health care industry? If so, who would receive such authorities? Office of the President, Big Data: Seizing Opportunities, Preserving Values, at ig_data_privacy_report_may_1_2014.pdf
37 Law Or, do we need uniform (not sector-specific), but very flexible, data use and privacy laws? To what extent do or should fair information practices principles undergird all data use? Notice/Awareness Choice/Consent Access (my access to info about me) Integrity/security Enforcement/redress
38 Aknowledgements Michael Kloman transcriptions Yao Zhou and Audrey Tluczek coding Sara Heyn research The Data Discussion Group Center for Predictive Computational Phenotyping Interviews supported by NIH R03HG from NHGRI.
39
Summary of Responses to the Request for Information (RFI): Input on Development of a NIH Data Catalog (NOT-HG-13-011)
Summary of Responses to the Request for Information (RFI): Input on Development of a NIH Data Catalog (NOT-HG-13-011) Key Dates Release Date: June 6, 2013 Response Date: June 25, 2013 Purpose This Request
More informationWorkshop on Establishing a Central Resource of Data from Genome Sequencing Projects
Report on the Workshop on Establishing a Central Resource of Data from Genome Sequencing Projects Background and Goals of the Workshop June 5 6, 2012 The use of genome sequencing in human research is growing
More informationDRAFT BILL PROPOSITION
DRAFT BILL PROPOSITION Establishes principles, guarantees, rights and obligations related to the use of the Internet in Brazil. THE NATIONAL CONGRESS decrees: CHAPTER I PRELIMINAR PROVISIONS Article 1.
More informationInternational Open Data Charter
International Open Data Charter September 2015 INTERNATIONAL OPEN DATA CHARTER Open data is digital data that is made available with the technical and legal characteristics necessary for it to be freely
More informationTestimony of Marjorie A. Speers, Ph.D. Executive Director Association for the Accreditation of Human Research Protection Programs, Inc. Former Acting Executive Director National Bioethics Advisory Commission
More informationGuidance for Sponsors, Investigators, and Institutional Review Boards. Questions and Answers on Informed Consent Elements, 21 CFR 50.
Guidance for Sponsors, Investigators, and Institutional Review Boards Questions and Answers on Informed Consent Elements, 21 CFR 50.25(c) (Small Entity Compliance Guide) U.S. Department of Health and Human
More informationIssues with Tissues. Bertha delanda Celia Molvin/Kevin Murphy Research Compliance Office Stanford University
Issues with Tissues Bertha delanda Celia Molvin/Kevin Murphy Office Stanford University What are Tissues? Organic material removed from a living individual. Including biological samples For example, Blood
More informationFinding the Right People for Your Program Evaluation Team: Evaluator and Planning Team Job Descriptions
: Evaluator and Planning Team Job Descriptions I. Overview II. Sample Evaluator Job Description III. Evaluator Competencies IV. Recruiting members of your strategic evaluation planning team V. Recruiting
More informationHow To Respond To The Nti'S Request For Comment On Big Data And Privacy
Submission to the National Telecommunications and Information Administration (NTIA), U.S. Department of Commerce Docket No. 140514424 4424 01 RIN 0660 XC010 Comments of the Information Technology Industry
More informationC H A MB E R O F C O M ME R C E O F T H E U N IT E D S T A T E S OF A M E R IC A
C H A MB E R O F C O M ME R C E O F T H E U N IT E D S T A T E S OF A M E R IC A W I L L I A M L. K O V A C S S E N I O R V I C E P R E S I D E N T E N V I R O N M E N T, T E C H N O L O G Y & R E G U
More informationPrivacy Law Basics and Best Practices
Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff sskaff@fbm.com What Is Information Privacy? Your name? Your phone number or home address? Your email address?
More informationOnline Lead Generation: Data Security Best Practices
Online Lead Generation: Data Security Best Practices Released September 2009 The IAB Online Lead Generation Committee has developed these Best Practices. About the IAB Online Lead Generation Committee:
More informationThe Enterprise Project Management Office
The Enterprise Project Management Office A Conceptual Review Dick Patterson dpatterson@intelcheck.ca 1 Report Overview Almost all enterprises are confronted by accelerating change. An effective, Enterprise
More informationIntroduction to Research Data Management. Tom Melvin, Anita Schwartz, and Jessica Cote April 13, 2016
Introduction to Research Data Management Tom Melvin, Anita Schwartz, and Jessica Cote April 13, 2016 What Will We Cover? Why is managing data important? Organizing and storing research data Sharing and
More informationRe: Big Data: A Tool for Inclusion or Exclusion? Workshop Project No. P145406
October 30, 2014 Federal Trade Commission Office of the Secretary Room H 113 (Annex X) 600 Pennsylvania Avenue NW Washington, DC 20580 Re: Big Data: A Tool for Inclusion or Exclusion? Workshop Project
More informationHow Accelerated Nursing Students Learn
How Accelerated Nursing Students Learn A Comparative Case Study of the Facilitators, Barriers, Learning Strategies, Challenges and Obstacles of students in an Accelerated Nursing Program Background and
More informationYale University Open Data Access (YODA) Project Procedures to Guide External Investigator Access to Clinical Trial Data Last Updated August 2015
OVERVIEW Yale University Open Data Access (YODA) Project These procedures support the YODA Project Data Release Policy and more fully describe the process by which clinical trial data held by a third party,
More informationThe Challenge of Implementing Interoperable Electronic Medical Records
Annals of Health Law Volume 19 Issue 1 Special Edition 2010 Article 37 2010 The Challenge of Implementing Interoperable Electronic Medical Records James C. Dechene Follow this and additional works at:
More informationAAMC Project to Document the Effects of HIPAA on Research
AAMC Project to Document the Effects of HIPAA on Research Susan H. Ehringhaus, J.D. Associate General Counsel Association of American Medical Colleges ACE Annual Meeting, Sept. 13, 2004 AAMC HIPAA Survey
More informationI. INTRODUCTION DEFINITIONS AND GENERAL PRINCIPLE
Final: Approved by Partners Professional and Institutional Conduct Committee 8/11/04 Policy on Transfers to Third Parties Of Tissues, Other Specimens, and Data Obtained by Partners-Affiliated Providers
More informationSynapse Privacy Policy
Synapse Privacy Policy Last updated: April 10, 2014 Introduction Sage Bionetworks is driving a systems change in data-intensive healthcare research by enabling a collective approach to information sharing
More informationNIH s Genomic Data Sharing Policy
NIH s Genomic Data Sharing Policy 2 Benefits of Data Sharing Enables data generated from one study to be used to explore a wide range of additional research questions Increases statistical power and scientific
More informationDelivery date: 18 October 2014
Genomic and Clinical Data Sharing Policy Questions with Technology and Security Implications: Consensus s from the Data Safe Havens Task Team Delivery date: 18 October 2014 When the Security Working Group
More informationIf you are signing for a minor child, you refers to your child throughout the consent document.
CONSENT TO PARTICIPATE IN A CLINICAL RESEARCH STUDY Adult Patient or Parent, for Minor Patient INSTITUTE: National Cancer Institute PRINCIPAL INVESTIGATOR: Raffit Hassan, M.D. STUDY TITLE: Tissue Procurement
More informationDirect Marketing, Mobile Phones, and Consumer Privacy
Direct Marketing, Mobile Phones, and Consumer Privacy James Nehf* Professor King rightly observes that protecting consumer privacy in the United States is largely the responsibility of individuals. Although
More informationHuman Subjects Research (HSR) Series
Human Subjects Research (HSR) Series CITI Program s HSR series consists of modules from two basic tracks, Biomedical (Biomed) and Social- Behavioral- Educational (SBE), and a set of Additional Modules
More informationNSF Data Management Plan Template Duke University Libraries Data and GIS Services
NSF Data Management Plan Template Duke University Libraries Data and GIS Services NSF Data Management Plan Requirement Overview The Data Management Plan (DMP) should be a supplementary document of no more
More informationAnnex 1. Call for proposals EACEA No 34/2015 Erasmus+ Key Action 3: Support for policy reform - Initiatives for policy innovation
Annex 1 Call for proposals EACEA No 34/2015 Erasmus+ Key Action 3: Support for policy reform - Initiatives for policy innovation European policy experimentations in the fields of Education, Training and
More informationState of Compliance 2014 Healthcare provider industry brief
Delve into the full analysis of the 2014 State of Compliance Survey at: pwc.com/us/ stateofcompliance State of Compliance 2014 Healthcare provider industry brief Introduction The healthcare provider industry
More informationAccountability: Data Governance for the Evolving Digital Marketplace 1
Accountability: Data Governance for the Evolving Digital Marketplace 1 1 For the past three years, the Centre for Information Policy Leadership at Hunton & Williams LLP has served as secretariat for the
More informationBeyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research
Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research Committee Charge To investigate the effects of the HIPAA Privacy Rule on health research: Examining a range of research
More informationIdentity Theft Prevention Policy. Effective Date: January 1, 2011. Policy Statement
Identity Theft Prevention Policy Effective Date: January 1, 2011 Policy Statement Identity Theft is a crime in which an individual wrongfully obtains and uses another person's personal data, usually for
More informationBOSTON UNIVERSITY SCHOOL OF PUBLIC HEALTH PUBLIC HEALTH COMPETENCIES
BOSTON UNIVERSITY SCHOOL OF PUBLIC HEALTH PUBLIC HEALTH COMPETENCIES Competency-based education focuses on what students need to know and be able to do in varying and complex situations. These competencies
More informationManaging Research Compliance Risks
Managing Research Compliance Risks James Moran, J.D., CPA Executive Director of Compliance, University of Pennsylvania School of Medicine Rick Rohrbach, MBA, CPA Senior Manager, Healthcare Consulting Practice
More informationA Privacy and Data Security Checklist for All
July 2015 Many companies know they have to follow privacy and data security rules. Companies in the health care industry know about Health Insurance Portability and Accountability Act (HIPAA). Financial
More informationExperimental Design, Methods and Data Analysis Techniques to Address Sex as a Biological Variable in Preclinical Research
Experimental Design, Methods and Data Analysis Techniques to Address Sex as a Biological Variable in Preclinical Research NIH Campus, Porter Neuroscience Center April 10, 2015 Current efforts related to
More informationIPCE Institute for Policy and Civic Engagement http://www.uic.edu/cuppa/ipce/
IPCE Institute for Policy and Civic Engagement http://www.uic.edu/cuppa/ipce/ TRANSPARENCY, CIVIC ENGAGEMENT, AND TECHNOLOGY USE IN LOCAL GOVERNMENT AGENCIES: FINDINGS FROM A NATIONAL SURVEY April 2011
More informationC H A MB E R O F C O M ME R C E O F T H E U N IT E D S T A T E S OF A M E R IC A
C H A MB E R O F C O M ME R C E O F T H E U N IT E D S T A T E S OF A M E R IC A W I L L I A M L. K O V A C S S E N I O R V I C E P R E S I D E N T E N V I R O N M E N T, T E C H N O L O G Y & R E G U
More informationHIPAA Privacy Policies & Procedures
HIPAA Privacy Policies & Procedures This sample HIPAA Privacy Policies & Procedures document will help you with your HIPAA Privacy compliance efforts. This document addresses the basics of HIPAA Privacy
More informationCHAPTER 5 STAKEHOLDERS: THEIR INTERESTS, CONCERNS, AND RESPONSIBILITIES
CHAPTER 5 STAKEHOLDERS: THEIR INTERESTS, CONCERNS, AND RESPONSIBILITIES Key Points: Each worker study involves multiple stakeholders in addition to the researcher and worker. Stakeholders interests in
More informationThe problem of cloud data governance
The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in
More informationFebruary 22, 2013 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES
February 22, 2013 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES FROM: SUBJECT: John P. Holdren Director Increasing Access to the Results of Federally Funded Scientific Research 1. Policy
More informationNorth Florida Medical Centers, Inc. Notice of Information Practices
North Florida Medical Centers, Inc. Notice of Information Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE
More informationInternational Trade and Corporate Social Responsibility
International Trade and Corporate Social Responsibility Professor Kevin Kolben Rutgers Business School, Newark and New Brunswick, New Jersey, USA Testimony Before the Committee on International Trade European
More informationHEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association DISCLAIMER This general information fact sheet is made available
More information-1- PERSONNEL CERTIFIED / NON-CERTIFIED 4112.61/4212.61
-1- HIPAA Privacy Policies The Wallingford Board of Education ("the Board" or the "Plan Sponsor") sponsors a group health plan that provides medical and dental benefits (the "Plan"). These Privacy Policies
More informationWhat s Next for Data Sharing: Insight from the NIH Experience
What s Next for Data Sharing: Insight from the NIH Experience Jerry Sheehan Assistant Director for Policy Development National Library of Medicine National Institutes of Health SHARE In-Person Meeting
More informationP3G$MODEL$FRAMEWORK$FOR$BIOBANK$GOVERNANCE$(2013)$
P3GMODELFRAMEWORKFORBIOBANKGOVERNANCE(2013) ArianeMallette,AnneMarieTassé&BarthaMariaKnoppers I. BACKGROUND Inordertofurtheritsmissiontolead,catalyzeandcoordinateinternationaleffortstooptimize theuseofbiobanks,thepublicpopulationprojectingenomicsandsociety(p
More informationWhat is Covered under the Privacy Rule? Protected Health Information (PHI)
HIPAA & RESEARCH What is Covered under the Privacy Rule? Protected Health Information (PHI) Health information + Identifier = PHI Transmitted or maintained in any form (paper, electronic, forms, web-based,
More informationNATIONAL CYBERSECURITY PROTECTION ACT OF 2014
PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128
More informationHIPAA Basics for Clinical Research
HIPAA Basics for Clinical Research Audio options: Built-in audio on your computer OR Separate audio dial-in: 415-930-5229 Toll-free: 1-877-309-2074 Access Code: 960-353-248 Audio PIN: Shown after joining
More informationSharing Data from Large-scale Biological Research Projects: A System of Tripartite Responsibility
Sharing Data from Large-scale Biological Research Projects: A System of Tripartite Responsibility Report of a meeting organized by the Wellcome Trust and held on 14 15 January 2003 at Fort Lauderdale,
More informationChapter 8: Establishing and adjusting appropriate management levels. Lynn Huntsinger
Chapter 8: Establishing and adjusting appropriate management levels Lynn Huntsinger Outline Charge Tools Setting Tools for stakeholder involvement Conclusions Charge Address divergent and conflicting perspectives
More informationAddressing Privacy and Security Concerns in Health Data Analytics. Deven McGraw, JD, MPH, LLM Partner Manatt, Phelps & Phillips, LLP
Addressing Privacy and Security Concerns in Health Data Analytics Deven McGraw, JD, MPH, LLM Partner Manatt, Phelps & Phillips, LLP June 8, 2014 Health Big Data Data analytics conducted by traditional
More informationSIREN event report STRATEGIC INFORMATION RESPONSE NETWORK United Nations Inter-Agency Project on Human Trafficking (UNIAP): Phase III
SIREN event report STRATEGIC INFORMATION RESPONSE NETWORK United Nations Inter-Agency Project on Human Trafficking (UNIAP): Phase III BANGKOK, THAILAND 20 June 2011 GMS-09 THE STATE OF COUNTER-TRAFFICKING
More informationWeathering the Perfect Legal Storm. Martin Shain, S.J.D. A Bird s Eye View. Great-West Life
Weathering the Perfect Legal Storm A Bird s Eye View Great-West Life Martin Shain, S.J.D. Weathering the Perfect Legal Storm: Navigating requirements of the emerging duty to provide a psychologically safe
More information(2) The neurological surgeon shall not participate in any activity, which is not in the best interest of the patient.
AANS Code of Ethics a) General Statement of Purpose The American Association of Neurological Surgeons has established a Code of Ethics for neurological surgeons as guidelines in medical, social, and professional
More informationEnterprise Risk Management: Taking the First Steps
Enterprise Risk Management: Taking the First Steps TN PRIMA, 2012 DOROTHY GJERDRUM, ARM, CIRM NOVEMBER 15, 2012 Agenda Goal: To understand how to begin to implement a broader approach to risk management
More informationEthical Principles in Clinical Research. Christine Grady Department of Bioethics NIH Clinical Center
Ethical Principles in Clinical Research Christine Grady Department of Bioethics NIH Clinical Center 1 Ethical principles Are these studies ethical? How do we know? Ethics of clinical research The goal
More informationE-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY
E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY Oana Dolea 7 th Annual Leg@l.IT Conference March 26th, 2013 Montreal, Canada INTRODUCTION Mobile e-commerce vs. E-commerce Mobile e-commerce:
More informationOnline Privacy Agreements, is it Informed Consent?
Online Privacy Agreements, is it Informed Consent? Masooda Bashir, Assistant Professor, Graduate School of Information Science/CSL Jay Kesan, Professor, College of Law Carol Mullins, Research Associate,
More informationA Policy Framework for Canadian Digital Infrastructure 1
A Policy Framework for Canadian Digital Infrastructure 1 Introduction and Context The Canadian advanced digital infrastructure (DI) ecosystem is the facilities, services and capacities that provide the
More information1 Data Protection Principles
Today, our personal information is being collected, shared, stored and analysed everywhere. Whether you are browsing the internet, talking to a friend or making an online purchase, personal data collection
More informationNursing s Social Policy Statement
CHAPTER 1 Nursing s Social Policy Statement Catherine E. Neuman, MSN, RN, NEA-BC Overview Nursing is a part of the society from which it grew and continues to evolve. As a profession, nursing is valued
More informationThe Ethics of Research with Stored Samples and Data
The Ethics of Research with Stored Samples and Data Sara Chandros Hull, Ph.D. Office of the Clinical Director, NHGRI and Department of Bioethics National Institutes of Health Disclaimers/Disclosures No
More informationROLE SPECIFICATION. The American College of Greece Athens, Greece. Director of Marketing
ROLE SPECIFICATION The American College of Greece Athens, Greece Director of Marketing The American College of Greece. The American College of Greece (ACG), founded in 1875, is the oldest and largest comprehensive
More informationApril 3, 2015. Re: Request for Comment: ONC Interoperability Roadmap. Dear Dr. DeSalvo:
Karen DeSalvo, M.D., M.P.H., M.Sc. Acting Assistant Secretary for Health National Coordinator for Health Information Technology U.S. Department of Health and Human Services 200 Independence Avenue, S.W.,
More informationHuman Research Protection Program Good Clinical Practice Guidance for Investigators Investigator & Research Staff Responsibilities
This Guidance Document is to ensure that investigators and research personnel recognize their responsibilities associated with the conduct of human subject research by outlining their responsibilities,
More information11. Extension Potential Financial Benefits
11. Extension Potential Financial Benefits Estimating the financial value of using electronic health records (EHR) for clinical research is fraught with difficulties for a number of reasons, some of which
More informationUnderstanding Your Health Record Information
Associated Retina Consultant s, Ltd. Notice of Information Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE
More informationProfits and poverty: The economics of forced labour
US$150,000,000,000 Profits and poverty: The economics of forced labour The global integration of economies, including labour markets, has brought many opportunities for workers and businesses and has spurred
More informationABOM Business Associate Agreement
ABOM Business Associate Agreement This agreement ( Agreement ) is between the American Board of Obesity Medicine ( ABOM ), as the Business Associate, and the Covered Entity (individually a Party and collectively
More informationCenter for Creative Leadership Emerging Leaders Research Survey Summary Report
Center for Creative Leadership Emerging Leaders Research Survey Summary Report Executive Summary Despite what is seen on television, heard on radio, and written in newspapers, magazines, books, the differences
More informationHIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets
HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets FULL POLICY CONTENTS Scope Policy Statement Reason for Policy Definitions ADDITIONAL DETAILS Web Address Forms Related Information
More informationPRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
More informationPrivacy in the Cloud A Microsoft Perspective
A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft
More informationESRC Research Data Policy
ESRC Research Data Policy Introduction... 2 Definitions... 2 ESRC Research Data Policy Principles... 3 Principle 1... 3 Principle 2... 3 Principle 3... 3 Principle 4... 3 Principle 5... 3 Principle 6...
More informationTable of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise
Best practices in open source governance Managing the selection and proliferation of open source software across your enterprise Table of contents The importance of open source governance... 2 Executive
More informationPanel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state
More informationPPRN Meeting Norfolk 2014. Prof. dr. Michaël Dooms Michael.Dooms@vub.ac.be
Integrating triple P bottom line performance and local community perception on the license to operate : towards new partnerships between port cluster stakeholders PPRN Meeting Norfolk 2014 Prof. dr. Michaël
More informationCybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
More informationArizona State University. HIPAA Compliance. Audit Report Number 15-08. May 7, 2015
This page left blank intentionally. Summary The Health Insurance Portability and Accountability Act of 1996 (HIPAA) audit was included on the Arizona State University (ASU) FY 2015 annual audit plan approved
More informationA structured task-centered framework for online collaboration
Master Thesis - Final Presentation A structured task-centered framework for online collaboration Ph.D. Yolanda Gil University of Southern California Information Sciences Institute Supervisor January 19th,
More informationGrant Applications and Data Management Plans. Jonathan Newman Director, School of Environmental Sciences
Grant Applications and Data Management Plans Jonathan Newman Director, School of Environmental Sciences My plans are still in embryo, a town on the edge of wishful thinking. Groucho Marx A goal without
More informationPrincipled Performance & GRC
part of GRC Fundamentals Principled Performance & GRC How principled performance is the new normal and the imperative for integrating governance, performance, risk, internal control and compliance management
More informationHow To Protect Your Health Information Under Hiopaa
Towards Unified Data Security Requirements for Human Research Susan Bouregy, Ph.D., CIP Chief HIPAA Privacy Officer Vice Chair, Human Subjects Committee Yale University susan.bouregy@yale.edu March 21,
More informationA s a covered entity or business associate, you have
Health IT Law & Industry Report VOL. 7, NO. 19 MAY 11, 2015 Reproduced with permission from Health IT Law & Industry Report, 07 HITR, 5/11/15. Copyright 2015 by The Bureau of National Affairs, Inc. (800-372-1033)
More information12. Governance and Management
12. Governance and Management Principles and Norms DEFINITIONS 12.1 Governance concerns the structures, functions, processes, and organizational traditions that have been put in place within the context
More informationThis chapter examines an essential element of a
Business Ethics Infrastructure 6 This chapter examines an essential element of a business ethics program: business ethics infrastructure the structures and systems that help enterprise owners and managers
More informationGuidance on the Genetic Information Nondiscrimination Act: Implications for Investigators and Institutional Review Boards
Office for Human Research Protections (OHRP) Department of Health and Human Services (HHS) Guidance on the Genetic Information Nondiscrimination Act: Implications for Investigators and Institutional Review
More informationNew Momentum for Interoperable Health Information Technology
Health Information Technology August 2004 New Momentum for Interoperable Health Information Technology Recent events demonstrate that momentum is growing in both the public and private sectors toward the
More informationThe Future of Stakeholder Engagement
The Future of Stakeholder Engagement Views of Senior European Communicators on Current and Future Best Practice February 2013 Table of contents 3 4 6 11 18 25 28 29 Introduction Key findings The current
More informationA national online platform for STEM graduate student career exploration and professional development
A national online platform for STEM graduate student career exploration and professional development ISSUE The realities of STEM graduate student career outcomes must be addressed. While graduate programs
More informationDavid Salafsky, MPH Carlos Moll, MPH Peggy Glider, Ph.D. The University of Arizona
Comparison of an In-Class vs. Online Alcohol Diversion Program to Reduce Alcohol Consumption and Negative Consequences Among College Students: Findings from a 2-year study David Salafsky, MPH Carlos Moll,
More informationHealth Data Governance: Privacy, Monitoring and Research - Policy Brief
Health Data Governance: Privacy, Monitoring and Research - Policy Brief October 2015 www.oecd.org/health Highlights All countries can improve their health information systems and make better use of data
More informationFreedom of Expression Online The Role of Internet Intermediaries
Freedom of Expression Online The Role of Internet Intermediaries This summary describes a forthcoming report to be published jointly by UNESCO, the Internet Society, and the Open Society Foundations. It
More informationBusiness Associate Agreement
Business Associate Agreement This Business Associate Contract (Agreement) is entered into by and between, as a Covered Entity as defined in relevant federal and state law, and HMS Agency, Inc., as their
More informationPresented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com
Healthcare Compliance: How HiTECH May Affect Relationships with Business Associates Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com Legal Disclaimer This information
More informationCOMPARATIVE EFFECTIVENESS RESEARCH (CER) AND SOCIAL WORK: STRENGTHENING THE CONNECTION
COMPARATIVE EFFECTIVENESS RESEARCH (CER) AND SOCIAL WORK: STRENGTHENING THE CONNECTION EXECUTIVE SUMMARY FROM THE NOVEMBER 16, 2009 SWPI INAUGURAL SYMPOSIUM For a copy of the full report Comparative Effectiveness
More informationUse of Electronic Health Records in Clinical Research: Core Research Data Element Exchange Detailed Use Case April 23 rd, 2009
Use of Electronic Health Records in Clinical Research: Core Research Data Element Exchange Detailed Use Case April 23 rd, 2009 Table of Contents 1.0 Preface...4 2.0 Introduction and Scope...6 3.0 Use Case
More information