Your SlideShare is downloading. ×
Consenting to Research
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Consenting to Research

1,131
views

Published on

My presentation to the US Presidential Commission for the Study of Bioethical Issues, 2/2/2012.

My presentation to the US Presidential Commission for the Study of Bioethical Issues, 2/2/2012.

Published in: Technology, Education

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,131
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • control over informationhuman dignityintimacyrestricted accessharm preventionexploitationdiscrimination
  • Transcript

    • 1. consenting to researchpresentation to the Presidential Commission for the Study of Bioethical Issues San Francisco, CA USA 2/2/2012
    • 2. “Privacy is about context, socialsituations, and control.” - danah boyd
    • 3. 1. We are going to get our [genetic,health] data, one way or another.
    • 4. but we often lack agency to decide what is done with data about us…
    • 5. (we are also going to talk about it)
    • 6. in the future, anyone who wants acopy of your genome will probably beable to get it.
    • 7. 2. data > information > knowledge > wisdom
    • 8. how do we ensure our data getsturned into knowledge?
    • 9. 3. the infrastructure is just emerging.
    • 10. “technology doesn’t support patient engagement”
    • 11. my wish list• Remove uncertainty, create incentives, training• Safe harbor for IRB-approved experimentation with new models for consent (i.e. portable, fully identified, etc)• Clear guidelines that harm lies in the act of reidentification, not act of distributing data with risk of reidentification (as long as done under safe harbor with consent)• Matching grants for infrastructure (inarguable role for government)