SlideShare a Scribd company logo
1 of 12
Safe use of personal data
in research
Antti Pursula, CSC
2.9.2016
Health and well-being data in research
• Health and well-being data collected by individuals, healthcare, registers, …,
has great potential for advancing biomedical research
• Digital data collections in Nordics is dubbed as goldmine for research
o Biobanks, health registers, longitudinal data collections, nationwide studies, etc.
• Promises of biomedical research: Personalized medicine, cure of diseases,
improved life quality, …
o Society benefits when these data collections are made available for research!
• However…
Protect and empower the individual
• Health and well-being data collections are highly sensitive, personal data
o Even after deindentification of data it is possible to pinpoint individuals
• Research use of health data requires data protection, ethical considerations,
empowerment of data subjects, secure data transfer and secure analysis
possibilities
• Altogether enabling only authorized use of data while still utilizing it for the
benefit of society and individuals
Need for secure IT services
• To grasp the promise of accelerated research based on health data, and
simultaneously taking into account the limitations, we need IT solutions that
implement the necessary preconditions
• Need also legal and ethical and societal discussion and guidelines and
regulations
Possible use case
1. Data collecting organization offers health-related data for research
purposes (biobank, genome center, research institute, register-holding
organization, hospital, …)
2. Researchers can apply for access to data sets
o Review process takes place to decide on the application
3. For approved requests data set is prepared and moved in a secure server
where researchers can access it
4. Researchers perform the analysis
5. After the research project access to data is closed
Services from CSC
• CSC has developed secure IT services to realize MyData related workflows
for research use of personal data.
• Components to support the Use Case:
o Digital authorization management tool REMS
o Secure cloud infrastructure CSC ePouta
o Human-centric identity and access management Eduuni-ID
• Service components at CSC are developed according to national strategies,
and in the close relation to European and Global initiatives (like ELIXIR
research infrastructure and GA4GH)
Why services from CSC?
• CSC – IT Center of Science Ltd. is government owned non-profit
organization dedicated provide IT services to support research & education
in Finland
o Research Data. Cloud Infrastructure. Supercomputing. Network connections. Open
Science. Higher Education Data Management. Scientific Software.
• Why CSC:
o Data stays at CSC’s servers and storage within Finland (i.e. in EU, and not using
commercial providers)
o No commercial interest on the data (neutral player)
o Publicly owned
o Suited ideally as a “research data bank” or “secure analysis environment” or
“genome data platform”
Authorization management with REMS
• REMS provides
complete process
for managing
entitlements
• Demo available at
https://remsdemo.
csc.fi/
Principal
investigat
or
Applicant
Research group
Members of the
application
Metadata
on dataset
1&2
Dataset 1
Dataset 2
DAC 1
Approver
DAC 2
Approver
REMS
Workflo
w
Reports
Entitlement
s
IdP
IdP
IdP
SP
1. Apply
for
access
4. Approve
5. Access
3.
Circulate
to
approver
2. Commit to
licence terms
CSC ePouta
• Cloud computing environment
designed for processing
sensitive data.
• Closed environment that
meets elevated information
security regulations (VAHTI)
as defined by the
governmental authorities.
• The cloud resources are
accessed through a dedicated
secure connection.
Free your identity from silos
10
Organisational
Directories
Identity
Federations
User Directories of
cloud services
Consumer Services
and their identities- human-centric identity and access management
User Directory
11
Sign in methods
Organisational Personal
Services
Step Up Auth
ID: exxxxxxxxxPerson is not identified
- ID is given to a person e.g.
sequential number (mxxxxxxxxx).
One or more sign in methods can
be attached to it.
Person is identified
- Confirmed email or GSM is
attached to another ID e.g.
sequential number (exxxxxxxxx).
- mxxxxxxxxx is attached to one or
more exxxxxxxxx.
Person s profile
- Person can create and manage
profiles for services. Profiles can
be used by services with user s
consent. (My Data)
A)
B)
C)
Only organisational
sign in methods
ID: exxxxxxxxx
Only peronal sign in
methods
ID: exxxxxxxxx
User Profile
chosen by user
D) All sign in methods
ID: mxxxxxxxxxStep Up Authentication
(two-factor)
Summary – Data Platform
• The presented components are integral components of a Data Platform for
health data research
o Support data submission, archiving and sharing processes
o Integrated with secure cloud services for data processing
o Enables sharing of data to third parties who have the approriate access permissions.
• Providing such data platform is a collaborative effort between (at least) the data
collecting organization, IT infrastructure provider and research community
• Contacts:
o Antti.pursula@csc.fi
o Sami.saarikoski@csc.fi (Eduuni-ID)

More Related Content

What's hot

NordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeICNordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeICNordForsk
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governanceRobin Rice
 
Managing sensitive data at the University of Bristol
Managing sensitive data at the University of BristolManaging sensitive data at the University of Bristol
Managing sensitive data at the University of BristolJisc RDM
 
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group ReportTurning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Reportdri_ireland
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesLouise Corti
 
Creating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationCreating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationHistoric Environment Scotland
 
Data discovery and sharing at UCLH
Data discovery and sharing at UCLHData discovery and sharing at UCLH
Data discovery and sharing at UCLHJisc
 
PECAN Phase 2: Pilot for Ensuring Continuity of Access via Nesli2
PECAN Phase 2: Pilot for Ensuring Continuity of Access via Nesli2 PECAN Phase 2: Pilot for Ensuring Continuity of Access via Nesli2
PECAN Phase 2: Pilot for Ensuring Continuity of Access via Nesli2 EDINA, University of Edinburgh
 
C2 schenkolewski tractinski_interpares
C2 schenkolewski tractinski_interparesC2 schenkolewski tractinski_interpares
C2 schenkolewski tractinski_interparesevaminerva
 
C2 schenkolewski tractinski_interpares
C2 schenkolewski tractinski_interparesC2 schenkolewski tractinski_interpares
C2 schenkolewski tractinski_interparesevaminerva
 
What will global innovators do with the next Innovation Platform?
What will global innovators do with the next Innovation Platform?What will global innovators do with the next Innovation Platform?
What will global innovators do with the next Innovation Platform?Open Networking Summits
 
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedRob Daley
 
Complying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyComplying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyGarethKnight
 
December 9, 2015 NISO Webinar: Two-Part Webinar: Emerging Resource Types - Pa...
December 9, 2015 NISO Webinar: Two-Part Webinar: Emerging Resource Types - Pa...December 9, 2015 NISO Webinar: Two-Part Webinar: Emerging Resource Types - Pa...
December 9, 2015 NISO Webinar: Two-Part Webinar: Emerging Resource Types - Pa...DeVonne Parks, CEM
 

What's hot (20)

NordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeICNordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeIC
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governance
 
Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
 
Managing sensitive data at the University of Bristol
Managing sensitive data at the University of BristolManaging sensitive data at the University of Bristol
Managing sensitive data at the University of Bristol
 
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group ReportTurning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issues
 
Creating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationCreating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant Application
 
Data discovery and sharing at UCLH
Data discovery and sharing at UCLHData discovery and sharing at UCLH
Data discovery and sharing at UCLH
 
Security overview at Lancaster University
Security overview at Lancaster UniversitySecurity overview at Lancaster University
Security overview at Lancaster University
 
PECAN Phase 2: Pilot for Ensuring Continuity of Access via Nesli2
PECAN Phase 2: Pilot for Ensuring Continuity of Access via Nesli2 PECAN Phase 2: Pilot for Ensuring Continuity of Access via Nesli2
PECAN Phase 2: Pilot for Ensuring Continuity of Access via Nesli2
 
C2 schenkolewski tractinski_interpares
C2 schenkolewski tractinski_interparesC2 schenkolewski tractinski_interpares
C2 schenkolewski tractinski_interpares
 
C2 schenkolewski tractinski_interpares
C2 schenkolewski tractinski_interparesC2 schenkolewski tractinski_interpares
C2 schenkolewski tractinski_interpares
 
What will global innovators do with the next Innovation Platform?
What will global innovators do with the next Innovation Platform?What will global innovators do with the next Innovation Platform?
What will global innovators do with the next Innovation Platform?
 
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
 
Authentication Methods: Shibboleth
Authentication Methods: ShibbolethAuthentication Methods: Shibboleth
Authentication Methods: Shibboleth
 
Complying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyComplying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case study
 
ELIXIR
ELIXIRELIXIR
ELIXIR
 
December 9, 2015 NISO Webinar: Two-Part Webinar: Emerging Resource Types - Pa...
December 9, 2015 NISO Webinar: Two-Part Webinar: Emerging Resource Types - Pa...December 9, 2015 NISO Webinar: Two-Part Webinar: Emerging Resource Types - Pa...
December 9, 2015 NISO Webinar: Two-Part Webinar: Emerging Resource Types - Pa...
 
White Manipulating Metadata to Enhance Access
White Manipulating Metadata to Enhance AccessWhite Manipulating Metadata to Enhance Access
White Manipulating Metadata to Enhance Access
 
COBWEB, AIP-6, and Access Management Federations
COBWEB, AIP-6, and Access Management FederationsCOBWEB, AIP-6, and Access Management Federations
COBWEB, AIP-6, and Access Management Federations
 

Similar to Safe use of personal data in research

Accessing data for research: data publishing pathways and the Five Safes
Accessing data for research: data publishing pathways and the Five SafesAccessing data for research: data publishing pathways and the Five Safes
Accessing data for research: data publishing pathways and the Five SafesLouise Corti
 
From Data Sharing to Data Stewardship
From Data Sharing to Data StewardshipFrom Data Sharing to Data Stewardship
From Data Sharing to Data StewardshipICPSR
 
RDAP14 Poster: openICPSR: a public access repository for storing and sharing ...
RDAP14 Poster: openICPSR: a public access repository for storing and sharing ...RDAP14 Poster: openICPSR: a public access repository for storing and sharing ...
RDAP14 Poster: openICPSR: a public access repository for storing and sharing ...ASIS&T
 
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...ICPSR
 
DMP health sciences
DMP health sciencesDMP health sciences
DMP health sciencesSarah Jones
 
Meeting Federal Research Requirements
Meeting Federal Research RequirementsMeeting Federal Research Requirements
Meeting Federal Research RequirementsICPSR
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...acemindia
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...ICPSR
 
Service and Support for Science IT -Peter Kunzst, University of Zurich
Service and Support for Science IT-Peter Kunzst, University of ZurichService and Support for Science IT-Peter Kunzst, University of Zurich
Service and Support for Science IT -Peter Kunzst, University of ZurichMind the Byte
 
Parallel session: trust and identity
Parallel session: trust and identityParallel session: trust and identity
Parallel session: trust and identityJisc
 
20160523 23 Research Data Things
20160523 23 Research Data Things20160523 23 Research Data Things
20160523 23 Research Data ThingsKatina Toufexis
 
Knowing me, knowing you, knowing your disease
Knowing me, knowing you, knowing your diseaseKnowing me, knowing you, knowing your disease
Knowing me, knowing you, knowing your diseaseeHealth Forum
 
The art of depositing social science data: maximising quality and ensuring go...
The art of depositing social science data: maximising quality and ensuring go...The art of depositing social science data: maximising quality and ensuring go...
The art of depositing social science data: maximising quality and ensuring go...Louise Corti
 
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...Sirris
 
Open Science Globally: Some Developments/Dr Simon Hodson
Open Science Globally: Some Developments/Dr Simon HodsonOpen Science Globally: Some Developments/Dr Simon Hodson
Open Science Globally: Some Developments/Dr Simon HodsonAfrican Open Science Platform
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
 

Similar to Safe use of personal data in research (20)

Accessing data for research: data publishing pathways and the Five Safes
Accessing data for research: data publishing pathways and the Five SafesAccessing data for research: data publishing pathways and the Five Safes
Accessing data for research: data publishing pathways and the Five Safes
 
From Data Sharing to Data Stewardship
From Data Sharing to Data StewardshipFrom Data Sharing to Data Stewardship
From Data Sharing to Data Stewardship
 
RDAP14 Poster: openICPSR: a public access repository for storing and sharing ...
RDAP14 Poster: openICPSR: a public access repository for storing and sharing ...RDAP14 Poster: openICPSR: a public access repository for storing and sharing ...
RDAP14 Poster: openICPSR: a public access repository for storing and sharing ...
 
Preparing research data for sharing
Preparing research data for sharingPreparing research data for sharing
Preparing research data for sharing
 
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
 
DMP health sciences
DMP health sciencesDMP health sciences
DMP health sciences
 
Meeting Federal Research Requirements
Meeting Federal Research RequirementsMeeting Federal Research Requirements
Meeting Federal Research Requirements
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
 
Brokerage and market Platform
Brokerage and market PlatformBrokerage and market Platform
Brokerage and market Platform
 
Service and Support for Science IT -Peter Kunzst, University of Zurich
Service and Support for Science IT-Peter Kunzst, University of ZurichService and Support for Science IT-Peter Kunzst, University of Zurich
Service and Support for Science IT -Peter Kunzst, University of Zurich
 
Parallel session: trust and identity
Parallel session: trust and identityParallel session: trust and identity
Parallel session: trust and identity
 
20160523 23 Research Data Things
20160523 23 Research Data Things20160523 23 Research Data Things
20160523 23 Research Data Things
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
Knowing me, knowing you, knowing your disease
Knowing me, knowing you, knowing your diseaseKnowing me, knowing you, knowing your disease
Knowing me, knowing you, knowing your disease
 
The art of depositing social science data: maximising quality and ensuring go...
The art of depositing social science data: maximising quality and ensuring go...The art of depositing social science data: maximising quality and ensuring go...
The art of depositing social science data: maximising quality and ensuring go...
 
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
 
DIRISA for Open Data and Open Science/Anwar Vahed
DIRISA for Open Data and Open Science/Anwar VahedDIRISA for Open Data and Open Science/Anwar Vahed
DIRISA for Open Data and Open Science/Anwar Vahed
 
Open Science Globally: Some Developments/Dr Simon Hodson
Open Science Globally: Some Developments/Dr Simon HodsonOpen Science Globally: Some Developments/Dr Simon Hodson
Open Science Globally: Some Developments/Dr Simon Hodson
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 

Recently uploaded

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Safe use of personal data in research

  • 1. Safe use of personal data in research Antti Pursula, CSC 2.9.2016
  • 2. Health and well-being data in research • Health and well-being data collected by individuals, healthcare, registers, …, has great potential for advancing biomedical research • Digital data collections in Nordics is dubbed as goldmine for research o Biobanks, health registers, longitudinal data collections, nationwide studies, etc. • Promises of biomedical research: Personalized medicine, cure of diseases, improved life quality, … o Society benefits when these data collections are made available for research! • However…
  • 3. Protect and empower the individual • Health and well-being data collections are highly sensitive, personal data o Even after deindentification of data it is possible to pinpoint individuals • Research use of health data requires data protection, ethical considerations, empowerment of data subjects, secure data transfer and secure analysis possibilities • Altogether enabling only authorized use of data while still utilizing it for the benefit of society and individuals
  • 4. Need for secure IT services • To grasp the promise of accelerated research based on health data, and simultaneously taking into account the limitations, we need IT solutions that implement the necessary preconditions • Need also legal and ethical and societal discussion and guidelines and regulations
  • 5. Possible use case 1. Data collecting organization offers health-related data for research purposes (biobank, genome center, research institute, register-holding organization, hospital, …) 2. Researchers can apply for access to data sets o Review process takes place to decide on the application 3. For approved requests data set is prepared and moved in a secure server where researchers can access it 4. Researchers perform the analysis 5. After the research project access to data is closed
  • 6. Services from CSC • CSC has developed secure IT services to realize MyData related workflows for research use of personal data. • Components to support the Use Case: o Digital authorization management tool REMS o Secure cloud infrastructure CSC ePouta o Human-centric identity and access management Eduuni-ID • Service components at CSC are developed according to national strategies, and in the close relation to European and Global initiatives (like ELIXIR research infrastructure and GA4GH)
  • 7. Why services from CSC? • CSC – IT Center of Science Ltd. is government owned non-profit organization dedicated provide IT services to support research & education in Finland o Research Data. Cloud Infrastructure. Supercomputing. Network connections. Open Science. Higher Education Data Management. Scientific Software. • Why CSC: o Data stays at CSC’s servers and storage within Finland (i.e. in EU, and not using commercial providers) o No commercial interest on the data (neutral player) o Publicly owned o Suited ideally as a “research data bank” or “secure analysis environment” or “genome data platform”
  • 8. Authorization management with REMS • REMS provides complete process for managing entitlements • Demo available at https://remsdemo. csc.fi/ Principal investigat or Applicant Research group Members of the application Metadata on dataset 1&2 Dataset 1 Dataset 2 DAC 1 Approver DAC 2 Approver REMS Workflo w Reports Entitlement s IdP IdP IdP SP 1. Apply for access 4. Approve 5. Access 3. Circulate to approver 2. Commit to licence terms
  • 9. CSC ePouta • Cloud computing environment designed for processing sensitive data. • Closed environment that meets elevated information security regulations (VAHTI) as defined by the governmental authorities. • The cloud resources are accessed through a dedicated secure connection.
  • 10. Free your identity from silos 10 Organisational Directories Identity Federations User Directories of cloud services Consumer Services and their identities- human-centric identity and access management User Directory
  • 11. 11 Sign in methods Organisational Personal Services Step Up Auth ID: exxxxxxxxxPerson is not identified - ID is given to a person e.g. sequential number (mxxxxxxxxx). One or more sign in methods can be attached to it. Person is identified - Confirmed email or GSM is attached to another ID e.g. sequential number (exxxxxxxxx). - mxxxxxxxxx is attached to one or more exxxxxxxxx. Person s profile - Person can create and manage profiles for services. Profiles can be used by services with user s consent. (My Data) A) B) C) Only organisational sign in methods ID: exxxxxxxxx Only peronal sign in methods ID: exxxxxxxxx User Profile chosen by user D) All sign in methods ID: mxxxxxxxxxStep Up Authentication (two-factor)
  • 12. Summary – Data Platform • The presented components are integral components of a Data Platform for health data research o Support data submission, archiving and sharing processes o Integrated with secure cloud services for data processing o Enables sharing of data to third parties who have the approriate access permissions. • Providing such data platform is a collaborative effort between (at least) the data collecting organization, IT infrastructure provider and research community • Contacts: o Antti.pursula@csc.fi o Sami.saarikoski@csc.fi (Eduuni-ID)

Editor's Notes

  1. Optical Private Network (OPN) or Multiprotocol Label Switching (MPLS)
  2. Human-centric identity and access management
  3. Persons self create their digital identity. Profiles can be enriched with attributes. Implements identity management for MyData operator