SlideShare a Scribd company logo
1 of 49
Download to read offline
Enabling Secure Access to
Biomedical Data Sources
Pilot installation for legally compliant data
sharing in BioMedBridges
Seminar AGM Meeting in Munich, Germany
18 February 2016
Wolfgang Kuchinke
Aim
ā—‹ Comprehensive analysis of ethical, legal and
regulatory requirements and of data security
risks for data sharing between Research
Infrastructures
ā—‹ Development of a security framework to ensure
that data bridges of BioMedBridges are
compliant with regulations and protect privacy
and data security
ā—‹ Enable the sharing of sensitive, medical data for
clinical research at Research Infrastructures
W. Kuchinke (2016)
Background
ā—‹ Translational research is a promising approach to
improve the discovery of new therapies
ā—‹ Collaboration of biomedical researchers and clinical
practitioners is required
ā—‹ Translational research is data intensive and needs
support of information technology to enable
efficient data sharing, data linking and analysis
ā—‹ Access to data of clinical trials from diverse sources
can improve the discovery of benefits, but also of
unwanted effects of drugs and therapies
3
W. Kuchinke (2016)
BioMedBridges
ā—‹ BioMedBridges project is developing a pilot implementation
that integrates research data and clinical data resources
ā—‹ Aim is to enable data bridges for data sharing between
research infrastructures
ā—‹ Access to data is restricted by data access policies, rules and
regulations
ā—‹ Requirement of data access approvals and data
management plans
ā—‹ The pilot implementation can demonstrate that a secure
access to sensitive data for research purposes is possible
ā—‹ Access approvals can be automatised
ā—‹ Sophisticated identity and permissions management can be
realised and simplified by using well known Open Source
software components
4
W. Kuchinke (2016)
Data sharing between Research
Infrastructures
The role of Data Bridges
Data sharing between Research
Infrastructures
Find the data source and request access for data sharing by the Data Bridges
The project collaborators
EMBL EMBL-EBI ELIXIR
ErasmusMC Erasmus University Medical Center Rotterdam Euro-BioImaging
FVB Leibniz-Institut fĆ¼r Molekulare Pharmakologie EU-OPENSCREEN
HMGU Helmholtz Zentrum MĆ¼nchen BBMRI
Inserm Institut national de la santƩ et de la recherche
mƩdicale
STFC Science and Technology Facilities Council INSTRUCT
TMF Technologie- und Methodenplattform fĆ¼r die
vernetzte medizinische Forschung e.V.
TUM-MED Technische UniversitƤt MĆ¼nchen BBMRI
UDUS Heinrich Heine UniversitƤt DĆ¼sseldorf ECRIN
7
Project Plan
ā—‹ Development of a security framework
ā—‹ Work on WT1-7 has been finished
ā—‹ Identification of data security and privacy
requirements for data bridges
ā—‹ Results were compiled in ļƒ  D5.1 and D5.2
ā—‹ Support for the assessment of ethical and legal
requirements
ā—‹
Legal Assessment Tool (LAT)
ā—‹ Design of the security architecture and
authorisation framework
8
Roadmap
9
How are we meeting our
objectives?
ā—‹ Generation of security requirements for an e-
infrastructure based on use cases
ā—‹ Threat and risk analysis for sharing data
ā—‹ Development of threat mitigation strategy
ā—‹ Implementation of a pilot to verify the feasibility of
the security framework
ā—‹ Collaborative implementation of secure access to
sensitive, human data (example of biobank data)
involving ELIXIR and BBMRI
10
ļ‚”Risk analysis was conducted to identify
countermeasures against threats
ļ‚” Authentication, authorization, secure communication,
encryption of data, anonymization, pseudonymization,
auditing and data provenance
ļ‚” Deployment solutions for the mitigation of identified
risks
ļ‚”Specification of three access tiers
ļ‚” Open, restricted, and committee-controlled
ļ‚”Activity diagrams indicate required actions for data
sharing by secure data bridges
Security architecture - Overview
11
Elements of security architecture and
pilot implementation
ļ‚”Sensitive and confidential data can be safeguarded by
regulating or restricting the access and the usage of data
ļ‚”Access controls should always be proportionate to the
kind of data
ļ‚”Example:
ā— UK Data Service has three levels of access for data
ā— safeguarded data (data that contain no personal information, but the data owner
considers a risk of disclosure is possible by linkage to other data)
ā— controlled data - data that may be disclosive
ā— open data - data without personal information
ļ‚”Controlled data are only available to users who have been
trained and accredited and their data usage has been
approved by a relevant Data Access Committee (DAC)
Regulating access to data
13
W. Kuchinke (2016)
ļ‚”Example: The European Genome-phenome Archive (EGA)
ā— Services for archiving, processing and distribution for all types
of potentially identifiable genetic and phenotypic human data at
the European Bioinformatics Institute (EBI)
ļ‚”Controlled access data is defined by the original informed
consent agreements signed by the participants involved in the
study
ā— Controlled access data often consists of human data derived
from medical research
ā— All data submitted to the EGA must be subject to controlled
access
ā— Access to data is controlled by a Data Access Committee
(DAC), which must be registered as part of the submission
process
Regulating access to data
14
W. Kuchinke (2016)
ļ‚”BioSamples Database from ELIXIR
ļ‚”BBMRI catalogue (BBMRI Hub) extended with a
MIABIS layer and a data cube layer
ļ‚”Resource Entitlement Management System
ļ‚”Legal Assessment Tool
Infrastructure elements
15
W. Kuchinke (2016)
ļ‚”A body of one or more named individuals who are
responsible for data release to external requestors
based on consent and/or National Research
Ethics requirements
ļ‚”To establish a DAC at the EGA one must register
the details of your DAC during the submission
process via either Webin or DAC.xml
ļ‚”Each dataset that is submitted to EGA databases
must be linked to a Data Access Agreement
(DAA), which defines the terms and conditions of
using the dataset
Data Access Committee (DAC)
16
W. Kuchinke (2016)
ļ‚”The Resource Entitlement Management System
(REMS) is open source software
ļ‚”It manages policies for granting access to data
resources
ļ‚”For example:
ā— An application for access is required to get access to
clinical data from a web application like BBMRI Hub
ā— Information about the purpose of research, or needed types
of data access and data protection requirements have to be
provided by the applicant
ā— Approval is granted by a Data Access Committee (DAC)
Resource Entitlement Management
System
17
W. Kuchinke (2016)
ļ‚”REMS allows data managers to define for each data
source an authorisation workflow
ļ‚”This workflow can be employed by software systems
to ensure that users are entitled to access data
ļ‚”REMS manages agreements between multiple data
owners, data sets and data users
ļ‚”It delegates responsibilities to the DAC using data
access agreements
ļ‚”It is being successfully used by the European
Genome-phenome Archive
Resource Entitlement Management
System
18
ļ‚”Shibboleth is a single sign-on log-in system for computer
networks and the Internet
ļ‚”It is an open source implementation for identity management and
federated identity-based authentication and a authorization (or
access control) infrastructure
ļ‚”It is based on Security Assertion Markup Language (SAML)
ļ‚”Federated identities allow the sharing of information about users
from one security domain to another one
ļ‚”This allows for cross-domain single sign-on and removes the
need for content providers to maintain user names and
passwords
ļ‚”Identity providers (IdPs) supply user information, while service
providers (SPs) use this information to give access
Shibboleth Single Sign-on
19
ļ‚”Web-based technology that implements the HTTP/POST artifact and
attribute push profiles of SAML, including both Identity Provider (IdP)
and Service Provider (SP) components
ļ‚”SAML authentication assertion with a temporary "handle" contained
within it
ā—
This handle allows the IdP to recognize a request about a particular
user as corresponding to the principal that authenticated earlier
ļ‚”The SP can request a specific type of authentication from the IdP
ļ‚”Shibboleth 2.0 supports additional encryption capacity
ļ‚”Attributes
ā—
Access control is performed by matching attributes supplied by IdPs
against rules defined by SPs.
ļ‚”The SP makes an access decision based on the attributes
Shibboleth technology
20
Shibboleth Concept
SAML
ļ‚”The Security Assertion Markup Language is a standard for exchanging
authentication and authorization identities
ļ‚”SAML is an XML-based protocol that uses security tokens containing
assertions to pass information about a principal (end user) between a
SAML authority, named an Identity Provider (IP), and a SAML
consumer, named a Service Provider
ā— Enables web-based, cross-domain single sign-on (SSO)
ā— An assertion is a package of information that supplies statements
made by a SAML authority
ā— They are usually made about a subject, represented by the
<Subject> element
ļ‚”Authorization Decision Assertion is a request to allow the assertion
subject to access the specified resource has been granted or denied
ļ‚”An important type of SAML assertion is the so-called "bearer" assertion
used to facilitate Web Browser SSO
MIABIS
ļ‚”The Minimum Information About Biobank data Sharing (MIABIS)
standardizes the data elements used to describe biobanks,
research on samples and associated data
ļ‚”The MIABIS Community Standards have several granularity
levels
ā—
Support of interoperability between biobanks sharing their
data
ā—
General attributes to describe biobanks, sample collections
and studies at an aggregated/metadata level (MIABIS Core
2.0)
ā—
New MIABIS modules describe samples and sample donors
at individual level
23
BioSamples Database
ļ‚”BioSamples Database stores and supplies descriptions
and metadata about biological samples used in research
ļ‚”Sample data are from many sources (e.g.
1000Genomes, HipSci, FAANG) or have been used by
European Nucleotide Archive (ENA) or ArrayExpress
ļ‚”The BioSamples Database aggregates information for
reference samples, as well as samples for which data
exist in one of the EBIā€™s other data resources
ļ‚”All samples are described with annotations
ā—
These annotations can be linked to ontology or controlled vocabulary
24
Legal Assessment Tool (LAT)
ļ‚”We implemented an approach where relevant
concepts derived from computer science were
adapted to define legal requirements for data
bridges
ļ‚”ā€œLegal interoperabilityā€ as an extension of the
general interoperability concept for diverse
systems
ļ‚”Data flow descriptions are as basis for the
specification of legal and ethical requirement
clusters
25
Legal Assessment Tool (LAT)
ļ‚”Usage of LAT
ļ‚”Answering a short survey
ļ‚”LAT assesses the given answers and shows the
legal texts and rules / regulations, which are
relevant for the researcherā€™s situation
ļ‚”Availability:
http://hhu2.at.xencon.de/web/guest/assessmentto
ol
ļ‚”To provide guidance, a specific decision pathway
is followed
26
Survey of LAT to specify data access
27
Decision pathway of LAT
28
User specifies data
and provides
information
Final decision for
guidance to data
sharing is reached
Security architecture and framework
of the
pilot implementation
ļ‚” Demonstration of feasibility and usability of the security
architecture
ļ‚” Collaborative implementation of secure access
ļ‚” Based upon use case:
ā— Researcher wants to obtain data about biosamples, researcher searches
for a biobank harbouring data about disease group x, containing at least
y samples of material type z
ļ‚” Pilot will implement a complete workflow for data search
and data sharing
ā— Instantiating the security architecture with all access tiers
ā— Enabling queries and data sharing in a secure, privacy preserving,
legally and ethically sound manner
Pilot for security framework
30
W. Kuchinke (2016)
ļ‚”Use of popular identity federation standard SAML
ļ‚”Open source Shibboleth is available for many platforms and
applications
ļ‚”Shibboleth offers simple methods to wrap areas of web
applications (e.g., via URL patterns)
ā—
Therefore, before serving a web request, an unauthenticated
user can be forwarded to the login process
ā—
User can select an identity provider (IdP)
ļ‚”After authentication, Shibboleth creates a user session using
identity attributes, which are sent back to the original requester
ļ‚”The tool acting as a service provider (SP) can check the
existence of a session and the associated attributes
Identity Management via Shibboleth
31
ļ‚”The workflow supports the research use case where a user is
looking for samples data
ļ‚”EBIā€™s Biosamples Database is the starting point for the use case
ļ‚”Using LAT the researcher searching for specific data get legal /
ethical requirements to consider when accessing and sharing
human data
ļ‚”The BBMRI Hub provides summary information for the
requested dataset (makes the data findable)
ļ‚”It mediates the access to individual level data (e.g., anonymised
patient records)
ļ‚”The Hub checks that the requesting user has an associated
Shibboleth session
Pilot workflow process
32
ļ‚”If the user has no Shibboleth session, Shibboleth redirects the user
to a sign-on page
ļ‚”After successful authentication the request is sent back to the Hub,
where the user session is used to query REMS related attributes
ļ‚”These attributes contain the list of resource entitlements associated
to the user, such as for example database access rights
ļ‚”This information is obtained by coupling REMS with Shibbolethā€™s
Attribute Authority component
ļ‚”If the user does not have the rights to access the requested data,
the user is forwarded to REMS, to apply for such access
ļ‚”Approved applications are notified to the user via email, which is
also used to send a link to the user to continue with accessing the
protected database
Pilot workflow process
33
Workflow of pilot implementation: Authorisation
after request for data access
34
Progress of pilot implementation
ļ‚”Implementation of SSO using Shibboleth
ļ‚”Extension of the BBMRI catalogue (BBMRI Hub)
ļ‚”Integration of REMS in order to support
authorization
Remaining tasks:
ļ‚”Integration of (mockup) biobanks
ļ‚”Integration of the LAT
ļ‚”Sustainability of developed tools and framework
35
W. Kuchinke (2016)
Support for additional security and
data protection issues
ļ‚”Data access agreements provide a balance between the need of
access to medical data data and ELSI demands
ļ‚”It is important that the process of granting access to data and
monitoring the access once it is approved rely on efficient and robust
tools
ļ‚”All tools must operate within a secure and ethical framework
ļ‚”One can leverage systems like REMS to improve the workflow of
data access approval processes
ļ‚”Possibility for the extension of data access approvals to clinical trials
ā—
This can improve accountability and trust in the scientific
community
ā—
May help overcoming obstacles for the sharing of clinical study
data
W. Kuchinke (2016)
Impact and sustainability
of the
developed tools and framework
Impact
ā—‹ User and stakeholder feedback of LAT
ā—‹ The tool is publicly available, comments and suggestions were
gathered online
ā—‹ Presentation of LAT
ā—‹ BMB AGM (Florence), GMDS (Gƶttingen), Knowledge Exchange
workshop (Berlin), RDA
ā—‹ Comment of evaluators: ā€œThis is the tool we need!ā€
ā—‹ Comparison of LAT with tools of other initiatives
ā—‹ BBMRI legal WIKI, hSERN, IPAC
ā—‹ These tools complement each other
ā—‹ Security framework
ā—‹ Feasibility and utility of the security framework is demonstrated
by a pilot implementation
ā—‹ Example for building secure data bridges
38
Impact of the developments
ā—‹ The most significant (and lasting) impact?
ā—‹
Knowledge exchange workshop (30 June 2014, Berlin)
ā—‹
Possibilities were created to use a software tool for
legal and ethical interoperability
ā—‹ Additional opportunities with an strategic impact?
ā—‹
Collaboration with RDA / IPAC
ā—‹
Extension of LAT knowledge base with national
legislation and rules would be necessary
ā—‹
Incorporation of legal ontology into LAT
ā—‹
Employment by BBMRI
ā—‹
Employment by ECRIN
39
Sustainability of Legal Assessment
Tool
ā—‹Maintained and developed by ELIXIR, ECRIN
ā—‹Enabling legal and ethical interoperability when using / re-using
medical data for research purposes
ā—‹Plans for extension and sustainability exist
ā—‹Regular updates of the knowledge base
ā—‹Enlargement of ontology, development of a graphic wizard for
data entry, inclusion of examples from use cases
ā—‹
But knowledge not in place to maintain LAT beyond the
project?
ā—‹Source code is openly available, on a request base
ā—‹Decision on suitable Open Source licence
40
Sustainability of framework of pilot
ļ‚” Security framework
ļ‚” Blueprint for secure, privacy preserving, ethically and legally sound
data bridges between research infrastructures
ļ‚” Can educate users about risks and risk mitigation
ļ‚” BBMRI catalogue of pilot
ļ‚” Maintained and developed in BBMRI
ļ‚” The code is not openly available
ļ‚” BioSamples Database
ļ‚” Maintained by ELIXIR
ļ‚” Necessary knowledge is in place to maintain these resources
beyond the project
ļ‚” The future maintenance of the other tools is uncertain
Lessons learned and References
Lessons learned for the security and data
protection
ļ‚”Combination of Shibboleth and REMS limits efficiently
risks of the disclosure of confidential information to
unauthorised persons
ļ‚”REMS ensures that data access authorisation is
granted according to specific legal requirements
associated with a data sets (consideration of informed
consent given by the patient/ data provider)
ļ‚”The functionality of activity tracking allows that
evidence of compliance with regulations is controlled
and users and data managers can be held accountable
for their actions
43
Lessons learned from the pilot
ā—‹ What worked?
ā—‹
Collaboration within BioMedBridges was essential
ā—‹
Knowledge exchange with external stakeholders was decisive
ā—‹
Developing an interactive legal / ethical Web2.0 tool
ā—‹
Development of a complex security framework for tools
ā—‹ What did not work?
ā—‹
Initiate collaboration with external stakeholders and research
infrastructures
ā—‹
Maintenance and further development of the tool after the
projectā€™s end (sustainability question)
ā—‹
Development of a single and joint framework for secure, legally
and ethically compliant research by all research infrastructures
44
W. Kuchinke (2016)
Additional linked ethical and legal
governance tools
ļ‚”The Legal Assessment Tool (LAT) guides researchers with no legal knowledge
through relevant legal requirements for data sharing
ā— LAT provides researchers with an online, interactive selection process to
characterise the involved types of data and databases and provides suitable
requirements and recommendations for data sharing
ā— Links to the LAT were added to the BBMRI Hub
ā— Guide data managers when assessing data sharing policies
ļ‚”The Human Sample Exchange Regulation Navigator (hSERN) is a web
resource featuring legal aspects involved in the exchanging human information
ļ‚”The BBMRI Legal Wiki can provide useful information when data has to be
exchanged between EU member countries
ļ‚”The International Policy interoperability and data Access Clearinghouse (IPAC)
is a tool providing information about policy interoperability on international level
ā— It can provide direct help to the members of DACs who need to create forms
within REMS for users
45
W. Kuchinke (2016)
References
ā—‹ Legal Assessment Tool (LAT).
http://www.biomedbridges.eu/sharingsensitive-data
ā—‹ Human Sample Exchange Regulation Navigator
http://www.hsern.eu/
ā—‹ BBMRI Legal WIKI
http://www.bbmri-wp4.eu/wiki/index.php/Main_Page
ā—‹ IPAC
http://p3g.org/ipac
ā—‹ Brandizi, M., Melnichuk, O., Sarkans, U., Bild, R., Kohlmayer,
et.al. (2016, February 11). BioMedBridges: Implementation
of a pilot for the security framework. Zenodo.
http://doi.org/10.5281/zenodo.45927
ā—‹
46
W. Kuchinke (2016)
References
ā—‹ Kuchinke W, Krauth C, Bergmann R, Karakoyun T, Woollard
A, Schluender I, Braasch B, Eckert M, Ohmann C. Legal
assessment tool (LAT): an interactive tool to address
privacy and data protection issues for data sharing. BMC
Med Inform Decis Mak. 2016 Jul 7;16(1):81
ā—‹ Brandizi M, Melnichuk O, Bild R, Kohlmayer F, Rodriguez-
Castro B, Spengler H, Kuhn KA, Kuchinke W, Ohmann C,
Mustonen T, Linden M, Nyrƶnen T, Lappalainen I, Brazma A,
Sarkans U. Orchestrating differential data access for
translational research: a pilot implementation. BMC Med
Inform Decis Mak. 2017 Mar 23;17(1):30
47
W. Kuchinke (2016)
Contributions
ā—‹ Part of the presentation was presented earlier by Wolfgang
Kuchinke, Raffael Bild, Florian Kohlmayer, Klaus A. Kuhn
48
W. Kuchinke (2016)
Contact
Wolfgang Kuchinke
UDUS, Duesseldorf, Germany
wolfgang.kuchinke@uni-duesseldorf.de
This presentation contains additional explanatory material for a
workshop

More Related Content

What's hot

EUDAT Research Data Services for all | www.eudat.eu |
EUDAT Research Data Services for all | www.eudat.eu | EUDAT Research Data Services for all | www.eudat.eu |
EUDAT Research Data Services for all | www.eudat.eu | EUDAT
Ā 
HealthBlock: A Secured Healthcare Data using Blockchain
HealthBlock: A Secured Healthcare Data using BlockchainHealthBlock: A Secured Healthcare Data using Blockchain
HealthBlock: A Secured Healthcare Data using BlockchainMd. Mahfujur Rahman
Ā 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
Ā 
The Policy Framework: GDPR and all that
The Policy Framework: GDPR and all thatThe Policy Framework: GDPR and all that
The Policy Framework: GDPR and all thatEUDAT
Ā 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
Ā 
Data safe havens: A future EOSC service?
Data safe havens: A future EOSC service?Data safe havens: A future EOSC service?
Data safe havens: A future EOSC service?EUDAT
Ā 
Blockchain for Healthcare
Blockchain for HealthcareBlockchain for Healthcare
Blockchain for HealthcareCitiusTech
Ā 
GDPRov: provenance for GDPR
GDPRov: provenance for GDPR GDPRov: provenance for GDPR
GDPRov: provenance for GDPR vty
Ā 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...Ulf Mattsson
Ā 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
Ā 
170131 tryggve-at ssi-biobanks-ap
170131 tryggve-at ssi-biobanks-ap170131 tryggve-at ssi-biobanks-ap
170131 tryggve-at ssi-biobanks-apanttipursula
Ā 
Nordic Tryggve project
Nordic Tryggve projectNordic Tryggve project
Nordic Tryggve projectanttipursula
Ā 
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...EUDAT
Ā 

What's hot (20)

EUDAT Research Data Services for all | www.eudat.eu |
EUDAT Research Data Services for all | www.eudat.eu | EUDAT Research Data Services for all | www.eudat.eu |
EUDAT Research Data Services for all | www.eudat.eu |
Ā 
HealthBlock: A Secured Healthcare Data using Blockchain
HealthBlock: A Secured Healthcare Data using BlockchainHealthBlock: A Secured Healthcare Data using Blockchain
HealthBlock: A Secured Healthcare Data using Blockchain
Ā 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
Ā 
The Policy Framework: GDPR and all that
The Policy Framework: GDPR and all thatThe Policy Framework: GDPR and all that
The Policy Framework: GDPR and all that
Ā 
Paris wp5 pd-pb_d_case_study
Paris wp5 pd-pb_d_case_studyParis wp5 pd-pb_d_case_study
Paris wp5 pd-pb_d_case_study
Ā 
Wp4 tool demonstration_v1
Wp4 tool demonstration_v1Wp4 tool demonstration_v1
Wp4 tool demonstration_v1
Ā 
Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4
Ā 
Wp6 public
Wp6 publicWp6 public
Wp6 public
Ā 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
Ā 
Wp4 ws cea2020
Wp4 ws cea2020Wp4 ws cea2020
Wp4 ws cea2020
Ā 
Paris wp5 pd-pb_d
Paris wp5 pd-pb_dParis wp5 pd-pb_d
Paris wp5 pd-pb_d
Ā 
Data safe havens: A future EOSC service?
Data safe havens: A future EOSC service?Data safe havens: A future EOSC service?
Data safe havens: A future EOSC service?
Ā 
Beawre pitch
Beawre pitchBeawre pitch
Beawre pitch
Ā 
Blockchain for Healthcare
Blockchain for HealthcareBlockchain for Healthcare
Blockchain for Healthcare
Ā 
GDPRov: provenance for GDPR
GDPRov: provenance for GDPR GDPRov: provenance for GDPR
GDPRov: provenance for GDPR
Ā 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
Ā 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ā 
170131 tryggve-at ssi-biobanks-ap
170131 tryggve-at ssi-biobanks-ap170131 tryggve-at ssi-biobanks-ap
170131 tryggve-at ssi-biobanks-ap
Ā 
Nordic Tryggve project
Nordic Tryggve projectNordic Tryggve project
Nordic Tryggve project
Ā 
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Ā 

Similar to Secure access to biomedical data sources for legal data sharing-kuchinke

Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to dataRobin Rice
Ā 
Blockchain in Health Care
Blockchain in Health CareBlockchain in Health Care
Blockchain in Health CarePolsinelli PC
Ā 
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET Journal
Ā 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
Ā 
Blockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewBlockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewDebut Infotech
Ā 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016Elsa Prieto
Ā 
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...NAUMAN MUSHTAQ
Ā 
Privacy and Data Protection in Research
Privacy and Data Protection in ResearchPrivacy and Data Protection in Research
Privacy and Data Protection in ResearchMarlon Domingus
Ā 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management Von Welch
Ā 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governanceRobin Rice
Ā 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET Journal
Ā 
Safe use of personal data in research
Safe use of personal data in researchSafe use of personal data in research
Safe use of personal data in researchanttipursula
Ā 
Data Protection & Data Security in Clinical Trials
Data Protection & Data Security in Clinical TrialsData Protection & Data Security in Clinical Trials
Data Protection & Data Security in Clinical TrialsClinosolIndia
Ā 
Privacy on FHIR Demo at HIMSS!5
Privacy on FHIR Demo at HIMSS!5Privacy on FHIR Demo at HIMSS!5
Privacy on FHIR Demo at HIMSS!5agropper
Ā 
Clinical Data Models - The Hyve - Bio IT World April 2019
Clinical Data Models - The Hyve - Bio IT World April 2019Clinical Data Models - The Hyve - Bio IT World April 2019
Clinical Data Models - The Hyve - Bio IT World April 2019Kees van Bochove
Ā 
Evaluating How Blockchain Can Transform the Pharmaceutical and Healthcare Ind...
Evaluating How Blockchain Can Transform the Pharmaceutical and Healthcare Ind...Evaluating How Blockchain Can Transform the Pharmaceutical and Healthcare Ind...
Evaluating How Blockchain Can Transform the Pharmaceutical and Healthcare Ind...Kate Barlow
Ā 
HEALTHCHAIN: A Patient Centric Blockchain Based Web Application For Maintaini...
HEALTHCHAIN: A Patient Centric Blockchain Based Web Application For Maintaini...HEALTHCHAIN: A Patient Centric Blockchain Based Web Application For Maintaini...
HEALTHCHAIN: A Patient Centric Blockchain Based Web Application For Maintaini...IRJET Journal
Ā 
ICH-GCP guidelines.pptx
ICH-GCP guidelines.pptxICH-GCP guidelines.pptx
ICH-GCP guidelines.pptxAbishekarreddy
Ā 

Similar to Secure access to biomedical data sources for legal data sharing-kuchinke (20)

Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to data
Ā 
Blockchain in Health Care
Blockchain in Health CareBlockchain in Health Care
Blockchain in Health Care
Ā 
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare Records
Ā 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
Ā 
Blockchain in life sciences
Blockchain in life sciencesBlockchain in life sciences
Blockchain in life sciences
Ā 
Blockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewBlockchain in Healthcare: An Overview
Blockchain in Healthcare: An Overview
Ā 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
Ā 
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Ā 
Privacy and Data Protection in Research
Privacy and Data Protection in ResearchPrivacy and Data Protection in Research
Privacy and Data Protection in Research
Ā 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management
Ā 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governance
Ā 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
Ā 
Safe use of personal data in research
Safe use of personal data in researchSafe use of personal data in research
Safe use of personal data in research
Ā 
Data Protection & Data Security in Clinical Trials
Data Protection & Data Security in Clinical TrialsData Protection & Data Security in Clinical Trials
Data Protection & Data Security in Clinical Trials
Ā 
Privacy on FHIR Demo at HIMSS!5
Privacy on FHIR Demo at HIMSS!5Privacy on FHIR Demo at HIMSS!5
Privacy on FHIR Demo at HIMSS!5
Ā 
Clinical Data Models - The Hyve - Bio IT World April 2019
Clinical Data Models - The Hyve - Bio IT World April 2019Clinical Data Models - The Hyve - Bio IT World April 2019
Clinical Data Models - The Hyve - Bio IT World April 2019
Ā 
Evaluating How Blockchain Can Transform the Pharmaceutical and Healthcare Ind...
Evaluating How Blockchain Can Transform the Pharmaceutical and Healthcare Ind...Evaluating How Blockchain Can Transform the Pharmaceutical and Healthcare Ind...
Evaluating How Blockchain Can Transform the Pharmaceutical and Healthcare Ind...
Ā 
HEALTHCHAIN: A Patient Centric Blockchain Based Web Application For Maintaini...
HEALTHCHAIN: A Patient Centric Blockchain Based Web Application For Maintaini...HEALTHCHAIN: A Patient Centric Blockchain Based Web Application For Maintaini...
HEALTHCHAIN: A Patient Centric Blockchain Based Web Application For Maintaini...
Ā 
Barbara Bierer, "Clinical Trial Data Sharing"
Barbara Bierer, "Clinical Trial Data Sharing"Barbara Bierer, "Clinical Trial Data Sharing"
Barbara Bierer, "Clinical Trial Data Sharing"
Ā 
ICH-GCP guidelines.pptx
ICH-GCP guidelines.pptxICH-GCP guidelines.pptx
ICH-GCP guidelines.pptx
Ā 

More from Wolfgang Kuchinke

Temporal relations in queries of ehr data for research
Temporal relations in queries of ehr data for researchTemporal relations in queries of ehr data for research
Temporal relations in queries of ehr data for researchWolfgang Kuchinke
Ā 
Computer System Validation with privacy zones, e-source and clinical trials b...
Computer System Validation with privacy zones, e-source and clinical trials b...Computer System Validation with privacy zones, e-source and clinical trials b...
Computer System Validation with privacy zones, e-source and clinical trials b...Wolfgang Kuchinke
Ā 
Personalized medicine tools for clinical trials - kuchinke
Personalized medicine tools for clinical trials - kuchinkePersonalized medicine tools for clinical trials - kuchinke
Personalized medicine tools for clinical trials - kuchinkeWolfgang Kuchinke
Ā 
Computer System Validation - privacy zones, eSource and EHR data in clinical ...
Computer System Validation - privacy zones, eSource and EHR data in clinical ...Computer System Validation - privacy zones, eSource and EHR data in clinical ...
Computer System Validation - privacy zones, eSource and EHR data in clinical ...Wolfgang Kuchinke
Ā 
Use of personalized medicine tools for clinical research networks
Use of personalized medicine tools for clinical research networksUse of personalized medicine tools for clinical research networks
Use of personalized medicine tools for clinical research networksWolfgang Kuchinke
Ā 
Kuchinke - Learning Health System (LHS) in Europe - Introduction and meeting ...
Kuchinke - Learning Health System (LHS) in Europe - Introduction and meeting ...Kuchinke - Learning Health System (LHS) in Europe - Introduction and meeting ...
Kuchinke - Learning Health System (LHS) in Europe - Introduction and meeting ...Wolfgang Kuchinke
Ā 
Regulations, privacy, security for data bridges - Kuchinke
Regulations, privacy, security for data bridges - KuchinkeRegulations, privacy, security for data bridges - Kuchinke
Regulations, privacy, security for data bridges - KuchinkeWolfgang Kuchinke
Ā 
Agile Computer System Validation of software products
Agile Computer System Validation of software productsAgile Computer System Validation of software products
Agile Computer System Validation of software productsWolfgang Kuchinke
Ā 
Reverse Engineering of Clinical Trials to Improve Research
Reverse Engineering of Clinical Trials to Improve ResearchReverse Engineering of Clinical Trials to Improve Research
Reverse Engineering of Clinical Trials to Improve ResearchWolfgang Kuchinke
Ā 
Introduction to CTIM - the Clinical Trial Information Mediator
Introduction to CTIM - the Clinical Trial Information MediatorIntroduction to CTIM - the Clinical Trial Information Mediator
Introduction to CTIM - the Clinical Trial Information MediatorWolfgang Kuchinke
Ā 
Standard based Electronic Archiving for Clinical Trials
Standard based Electronic Archiving for Clinical TrialsStandard based Electronic Archiving for Clinical Trials
Standard based Electronic Archiving for Clinical TrialsWolfgang Kuchinke
Ā 
Increased Ethical Demands for Patient Empowerment in Personalised Medicine
Increased Ethical Demands for Patient Empowerment in Personalised MedicineIncreased Ethical Demands for Patient Empowerment in Personalised Medicine
Increased Ethical Demands for Patient Empowerment in Personalised MedicineWolfgang Kuchinke
Ā 
Ethical concerns caused by integrative patient empowerment services
Ethical concerns caused by integrative patient empowerment servicesEthical concerns caused by integrative patient empowerment services
Ethical concerns caused by integrative patient empowerment servicesWolfgang Kuchinke
Ā 
Regulations, privacy and security requirements - Legal interoperability for d...
Regulations, privacy and security requirements - Legal interoperability for d...Regulations, privacy and security requirements - Legal interoperability for d...
Regulations, privacy and security requirements - Legal interoperability for d...Wolfgang Kuchinke
Ā 
Service Integration for Research Infrastructures by Reciprocal Usage
Service Integration for Research Infrastructures by Reciprocal UsageService Integration for Research Infrastructures by Reciprocal Usage
Service Integration for Research Infrastructures by Reciprocal UsageWolfgang Kuchinke
Ā 
Repositories in an Open Data Ecosystem
Repositories in an Open Data EcosystemRepositories in an Open Data Ecosystem
Repositories in an Open Data EcosystemWolfgang Kuchinke
Ā 
Zone model for data privacy and confidentiality in medical research
Zone model for data privacy and confidentiality in medical researchZone model for data privacy and confidentiality in medical research
Zone model for data privacy and confidentiality in medical researchWolfgang Kuchinke
Ā 
CDISC Use Case Workshop Archiving of Studies
CDISC Use Case Workshop Archiving of StudiesCDISC Use Case Workshop Archiving of Studies
CDISC Use Case Workshop Archiving of StudiesWolfgang Kuchinke
Ā 

More from Wolfgang Kuchinke (18)

Temporal relations in queries of ehr data for research
Temporal relations in queries of ehr data for researchTemporal relations in queries of ehr data for research
Temporal relations in queries of ehr data for research
Ā 
Computer System Validation with privacy zones, e-source and clinical trials b...
Computer System Validation with privacy zones, e-source and clinical trials b...Computer System Validation with privacy zones, e-source and clinical trials b...
Computer System Validation with privacy zones, e-source and clinical trials b...
Ā 
Personalized medicine tools for clinical trials - kuchinke
Personalized medicine tools for clinical trials - kuchinkePersonalized medicine tools for clinical trials - kuchinke
Personalized medicine tools for clinical trials - kuchinke
Ā 
Computer System Validation - privacy zones, eSource and EHR data in clinical ...
Computer System Validation - privacy zones, eSource and EHR data in clinical ...Computer System Validation - privacy zones, eSource and EHR data in clinical ...
Computer System Validation - privacy zones, eSource and EHR data in clinical ...
Ā 
Use of personalized medicine tools for clinical research networks
Use of personalized medicine tools for clinical research networksUse of personalized medicine tools for clinical research networks
Use of personalized medicine tools for clinical research networks
Ā 
Kuchinke - Learning Health System (LHS) in Europe - Introduction and meeting ...
Kuchinke - Learning Health System (LHS) in Europe - Introduction and meeting ...Kuchinke - Learning Health System (LHS) in Europe - Introduction and meeting ...
Kuchinke - Learning Health System (LHS) in Europe - Introduction and meeting ...
Ā 
Regulations, privacy, security for data bridges - Kuchinke
Regulations, privacy, security for data bridges - KuchinkeRegulations, privacy, security for data bridges - Kuchinke
Regulations, privacy, security for data bridges - Kuchinke
Ā 
Agile Computer System Validation of software products
Agile Computer System Validation of software productsAgile Computer System Validation of software products
Agile Computer System Validation of software products
Ā 
Reverse Engineering of Clinical Trials to Improve Research
Reverse Engineering of Clinical Trials to Improve ResearchReverse Engineering of Clinical Trials to Improve Research
Reverse Engineering of Clinical Trials to Improve Research
Ā 
Introduction to CTIM - the Clinical Trial Information Mediator
Introduction to CTIM - the Clinical Trial Information MediatorIntroduction to CTIM - the Clinical Trial Information Mediator
Introduction to CTIM - the Clinical Trial Information Mediator
Ā 
Standard based Electronic Archiving for Clinical Trials
Standard based Electronic Archiving for Clinical TrialsStandard based Electronic Archiving for Clinical Trials
Standard based Electronic Archiving for Clinical Trials
Ā 
Increased Ethical Demands for Patient Empowerment in Personalised Medicine
Increased Ethical Demands for Patient Empowerment in Personalised MedicineIncreased Ethical Demands for Patient Empowerment in Personalised Medicine
Increased Ethical Demands for Patient Empowerment in Personalised Medicine
Ā 
Ethical concerns caused by integrative patient empowerment services
Ethical concerns caused by integrative patient empowerment servicesEthical concerns caused by integrative patient empowerment services
Ethical concerns caused by integrative patient empowerment services
Ā 
Regulations, privacy and security requirements - Legal interoperability for d...
Regulations, privacy and security requirements - Legal interoperability for d...Regulations, privacy and security requirements - Legal interoperability for d...
Regulations, privacy and security requirements - Legal interoperability for d...
Ā 
Service Integration for Research Infrastructures by Reciprocal Usage
Service Integration for Research Infrastructures by Reciprocal UsageService Integration for Research Infrastructures by Reciprocal Usage
Service Integration for Research Infrastructures by Reciprocal Usage
Ā 
Repositories in an Open Data Ecosystem
Repositories in an Open Data EcosystemRepositories in an Open Data Ecosystem
Repositories in an Open Data Ecosystem
Ā 
Zone model for data privacy and confidentiality in medical research
Zone model for data privacy and confidentiality in medical researchZone model for data privacy and confidentiality in medical research
Zone model for data privacy and confidentiality in medical research
Ā 
CDISC Use Case Workshop Archiving of Studies
CDISC Use Case Workshop Archiving of StudiesCDISC Use Case Workshop Archiving of Studies
CDISC Use Case Workshop Archiving of Studies
Ā 

Recently uploaded

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
Ā 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Ā 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
Ā 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
Ā 
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
Ā 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ā˜
Ā 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
Ā 
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts serviceChennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts servicevipmodelshub1
Ā 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
Ā 
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts serviceChennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts servicesonalikaur4
Ā 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
Ā 
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
Low Rate Call Girls Kolkata Avani šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
Ā 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
Ā 

Recently uploaded (20)

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
Ā 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
Ā 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
Ā 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
Ā 
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
Ā 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Ā 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
Ā 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Ā 
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts serviceChennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Ā 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Ā 
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts serviceChennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Ā 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Ā 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Ā 
Model Call Girl in Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in  Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in  Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
Ā 
Low Rate Call Girls Kolkata Avani šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
Ā 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
Ā 

Secure access to biomedical data sources for legal data sharing-kuchinke

  • 1. Enabling Secure Access to Biomedical Data Sources Pilot installation for legally compliant data sharing in BioMedBridges Seminar AGM Meeting in Munich, Germany 18 February 2016 Wolfgang Kuchinke
  • 2. Aim ā—‹ Comprehensive analysis of ethical, legal and regulatory requirements and of data security risks for data sharing between Research Infrastructures ā—‹ Development of a security framework to ensure that data bridges of BioMedBridges are compliant with regulations and protect privacy and data security ā—‹ Enable the sharing of sensitive, medical data for clinical research at Research Infrastructures W. Kuchinke (2016)
  • 3. Background ā—‹ Translational research is a promising approach to improve the discovery of new therapies ā—‹ Collaboration of biomedical researchers and clinical practitioners is required ā—‹ Translational research is data intensive and needs support of information technology to enable efficient data sharing, data linking and analysis ā—‹ Access to data of clinical trials from diverse sources can improve the discovery of benefits, but also of unwanted effects of drugs and therapies 3 W. Kuchinke (2016)
  • 4. BioMedBridges ā—‹ BioMedBridges project is developing a pilot implementation that integrates research data and clinical data resources ā—‹ Aim is to enable data bridges for data sharing between research infrastructures ā—‹ Access to data is restricted by data access policies, rules and regulations ā—‹ Requirement of data access approvals and data management plans ā—‹ The pilot implementation can demonstrate that a secure access to sensitive data for research purposes is possible ā—‹ Access approvals can be automatised ā—‹ Sophisticated identity and permissions management can be realised and simplified by using well known Open Source software components 4 W. Kuchinke (2016)
  • 5. Data sharing between Research Infrastructures The role of Data Bridges
  • 6. Data sharing between Research Infrastructures Find the data source and request access for data sharing by the Data Bridges
  • 7. The project collaborators EMBL EMBL-EBI ELIXIR ErasmusMC Erasmus University Medical Center Rotterdam Euro-BioImaging FVB Leibniz-Institut fĆ¼r Molekulare Pharmakologie EU-OPENSCREEN HMGU Helmholtz Zentrum MĆ¼nchen BBMRI Inserm Institut national de la santĆ© et de la recherche mĆ©dicale STFC Science and Technology Facilities Council INSTRUCT TMF Technologie- und Methodenplattform fĆ¼r die vernetzte medizinische Forschung e.V. TUM-MED Technische UniversitƤt MĆ¼nchen BBMRI UDUS Heinrich Heine UniversitƤt DĆ¼sseldorf ECRIN 7
  • 8. Project Plan ā—‹ Development of a security framework ā—‹ Work on WT1-7 has been finished ā—‹ Identification of data security and privacy requirements for data bridges ā—‹ Results were compiled in ļƒ  D5.1 and D5.2 ā—‹ Support for the assessment of ethical and legal requirements ā—‹ Legal Assessment Tool (LAT) ā—‹ Design of the security architecture and authorisation framework 8
  • 10. How are we meeting our objectives? ā—‹ Generation of security requirements for an e- infrastructure based on use cases ā—‹ Threat and risk analysis for sharing data ā—‹ Development of threat mitigation strategy ā—‹ Implementation of a pilot to verify the feasibility of the security framework ā—‹ Collaborative implementation of secure access to sensitive, human data (example of biobank data) involving ELIXIR and BBMRI 10
  • 11. ļ‚”Risk analysis was conducted to identify countermeasures against threats ļ‚” Authentication, authorization, secure communication, encryption of data, anonymization, pseudonymization, auditing and data provenance ļ‚” Deployment solutions for the mitigation of identified risks ļ‚”Specification of three access tiers ļ‚” Open, restricted, and committee-controlled ļ‚”Activity diagrams indicate required actions for data sharing by secure data bridges Security architecture - Overview 11
  • 12. Elements of security architecture and pilot implementation
  • 13. ļ‚”Sensitive and confidential data can be safeguarded by regulating or restricting the access and the usage of data ļ‚”Access controls should always be proportionate to the kind of data ļ‚”Example: ā— UK Data Service has three levels of access for data ā— safeguarded data (data that contain no personal information, but the data owner considers a risk of disclosure is possible by linkage to other data) ā— controlled data - data that may be disclosive ā— open data - data without personal information ļ‚”Controlled data are only available to users who have been trained and accredited and their data usage has been approved by a relevant Data Access Committee (DAC) Regulating access to data 13 W. Kuchinke (2016)
  • 14. ļ‚”Example: The European Genome-phenome Archive (EGA) ā— Services for archiving, processing and distribution for all types of potentially identifiable genetic and phenotypic human data at the European Bioinformatics Institute (EBI) ļ‚”Controlled access data is defined by the original informed consent agreements signed by the participants involved in the study ā— Controlled access data often consists of human data derived from medical research ā— All data submitted to the EGA must be subject to controlled access ā— Access to data is controlled by a Data Access Committee (DAC), which must be registered as part of the submission process Regulating access to data 14 W. Kuchinke (2016)
  • 15. ļ‚”BioSamples Database from ELIXIR ļ‚”BBMRI catalogue (BBMRI Hub) extended with a MIABIS layer and a data cube layer ļ‚”Resource Entitlement Management System ļ‚”Legal Assessment Tool Infrastructure elements 15 W. Kuchinke (2016)
  • 16. ļ‚”A body of one or more named individuals who are responsible for data release to external requestors based on consent and/or National Research Ethics requirements ļ‚”To establish a DAC at the EGA one must register the details of your DAC during the submission process via either Webin or DAC.xml ļ‚”Each dataset that is submitted to EGA databases must be linked to a Data Access Agreement (DAA), which defines the terms and conditions of using the dataset Data Access Committee (DAC) 16 W. Kuchinke (2016)
  • 17. ļ‚”The Resource Entitlement Management System (REMS) is open source software ļ‚”It manages policies for granting access to data resources ļ‚”For example: ā— An application for access is required to get access to clinical data from a web application like BBMRI Hub ā— Information about the purpose of research, or needed types of data access and data protection requirements have to be provided by the applicant ā— Approval is granted by a Data Access Committee (DAC) Resource Entitlement Management System 17 W. Kuchinke (2016)
  • 18. ļ‚”REMS allows data managers to define for each data source an authorisation workflow ļ‚”This workflow can be employed by software systems to ensure that users are entitled to access data ļ‚”REMS manages agreements between multiple data owners, data sets and data users ļ‚”It delegates responsibilities to the DAC using data access agreements ļ‚”It is being successfully used by the European Genome-phenome Archive Resource Entitlement Management System 18
  • 19. ļ‚”Shibboleth is a single sign-on log-in system for computer networks and the Internet ļ‚”It is an open source implementation for identity management and federated identity-based authentication and a authorization (or access control) infrastructure ļ‚”It is based on Security Assertion Markup Language (SAML) ļ‚”Federated identities allow the sharing of information about users from one security domain to another one ļ‚”This allows for cross-domain single sign-on and removes the need for content providers to maintain user names and passwords ļ‚”Identity providers (IdPs) supply user information, while service providers (SPs) use this information to give access Shibboleth Single Sign-on 19
  • 20. ļ‚”Web-based technology that implements the HTTP/POST artifact and attribute push profiles of SAML, including both Identity Provider (IdP) and Service Provider (SP) components ļ‚”SAML authentication assertion with a temporary "handle" contained within it ā— This handle allows the IdP to recognize a request about a particular user as corresponding to the principal that authenticated earlier ļ‚”The SP can request a specific type of authentication from the IdP ļ‚”Shibboleth 2.0 supports additional encryption capacity ļ‚”Attributes ā— Access control is performed by matching attributes supplied by IdPs against rules defined by SPs. ļ‚”The SP makes an access decision based on the attributes Shibboleth technology 20
  • 22. SAML ļ‚”The Security Assertion Markup Language is a standard for exchanging authentication and authorization identities ļ‚”SAML is an XML-based protocol that uses security tokens containing assertions to pass information about a principal (end user) between a SAML authority, named an Identity Provider (IP), and a SAML consumer, named a Service Provider ā— Enables web-based, cross-domain single sign-on (SSO) ā— An assertion is a package of information that supplies statements made by a SAML authority ā— They are usually made about a subject, represented by the <Subject> element ļ‚”Authorization Decision Assertion is a request to allow the assertion subject to access the specified resource has been granted or denied ļ‚”An important type of SAML assertion is the so-called "bearer" assertion used to facilitate Web Browser SSO
  • 23. MIABIS ļ‚”The Minimum Information About Biobank data Sharing (MIABIS) standardizes the data elements used to describe biobanks, research on samples and associated data ļ‚”The MIABIS Community Standards have several granularity levels ā— Support of interoperability between biobanks sharing their data ā— General attributes to describe biobanks, sample collections and studies at an aggregated/metadata level (MIABIS Core 2.0) ā— New MIABIS modules describe samples and sample donors at individual level 23
  • 24. BioSamples Database ļ‚”BioSamples Database stores and supplies descriptions and metadata about biological samples used in research ļ‚”Sample data are from many sources (e.g. 1000Genomes, HipSci, FAANG) or have been used by European Nucleotide Archive (ENA) or ArrayExpress ļ‚”The BioSamples Database aggregates information for reference samples, as well as samples for which data exist in one of the EBIā€™s other data resources ļ‚”All samples are described with annotations ā— These annotations can be linked to ontology or controlled vocabulary 24
  • 25. Legal Assessment Tool (LAT) ļ‚”We implemented an approach where relevant concepts derived from computer science were adapted to define legal requirements for data bridges ļ‚”ā€œLegal interoperabilityā€ as an extension of the general interoperability concept for diverse systems ļ‚”Data flow descriptions are as basis for the specification of legal and ethical requirement clusters 25
  • 26. Legal Assessment Tool (LAT) ļ‚”Usage of LAT ļ‚”Answering a short survey ļ‚”LAT assesses the given answers and shows the legal texts and rules / regulations, which are relevant for the researcherā€™s situation ļ‚”Availability: http://hhu2.at.xencon.de/web/guest/assessmentto ol ļ‚”To provide guidance, a specific decision pathway is followed 26
  • 27. Survey of LAT to specify data access 27
  • 28. Decision pathway of LAT 28 User specifies data and provides information Final decision for guidance to data sharing is reached
  • 29. Security architecture and framework of the pilot implementation
  • 30. ļ‚” Demonstration of feasibility and usability of the security architecture ļ‚” Collaborative implementation of secure access ļ‚” Based upon use case: ā— Researcher wants to obtain data about biosamples, researcher searches for a biobank harbouring data about disease group x, containing at least y samples of material type z ļ‚” Pilot will implement a complete workflow for data search and data sharing ā— Instantiating the security architecture with all access tiers ā— Enabling queries and data sharing in a secure, privacy preserving, legally and ethically sound manner Pilot for security framework 30 W. Kuchinke (2016)
  • 31. ļ‚”Use of popular identity federation standard SAML ļ‚”Open source Shibboleth is available for many platforms and applications ļ‚”Shibboleth offers simple methods to wrap areas of web applications (e.g., via URL patterns) ā— Therefore, before serving a web request, an unauthenticated user can be forwarded to the login process ā— User can select an identity provider (IdP) ļ‚”After authentication, Shibboleth creates a user session using identity attributes, which are sent back to the original requester ļ‚”The tool acting as a service provider (SP) can check the existence of a session and the associated attributes Identity Management via Shibboleth 31
  • 32. ļ‚”The workflow supports the research use case where a user is looking for samples data ļ‚”EBIā€™s Biosamples Database is the starting point for the use case ļ‚”Using LAT the researcher searching for specific data get legal / ethical requirements to consider when accessing and sharing human data ļ‚”The BBMRI Hub provides summary information for the requested dataset (makes the data findable) ļ‚”It mediates the access to individual level data (e.g., anonymised patient records) ļ‚”The Hub checks that the requesting user has an associated Shibboleth session Pilot workflow process 32
  • 33. ļ‚”If the user has no Shibboleth session, Shibboleth redirects the user to a sign-on page ļ‚”After successful authentication the request is sent back to the Hub, where the user session is used to query REMS related attributes ļ‚”These attributes contain the list of resource entitlements associated to the user, such as for example database access rights ļ‚”This information is obtained by coupling REMS with Shibbolethā€™s Attribute Authority component ļ‚”If the user does not have the rights to access the requested data, the user is forwarded to REMS, to apply for such access ļ‚”Approved applications are notified to the user via email, which is also used to send a link to the user to continue with accessing the protected database Pilot workflow process 33
  • 34. Workflow of pilot implementation: Authorisation after request for data access 34
  • 35. Progress of pilot implementation ļ‚”Implementation of SSO using Shibboleth ļ‚”Extension of the BBMRI catalogue (BBMRI Hub) ļ‚”Integration of REMS in order to support authorization Remaining tasks: ļ‚”Integration of (mockup) biobanks ļ‚”Integration of the LAT ļ‚”Sustainability of developed tools and framework 35 W. Kuchinke (2016)
  • 36. Support for additional security and data protection issues ļ‚”Data access agreements provide a balance between the need of access to medical data data and ELSI demands ļ‚”It is important that the process of granting access to data and monitoring the access once it is approved rely on efficient and robust tools ļ‚”All tools must operate within a secure and ethical framework ļ‚”One can leverage systems like REMS to improve the workflow of data access approval processes ļ‚”Possibility for the extension of data access approvals to clinical trials ā— This can improve accountability and trust in the scientific community ā— May help overcoming obstacles for the sharing of clinical study data W. Kuchinke (2016)
  • 37. Impact and sustainability of the developed tools and framework
  • 38. Impact ā—‹ User and stakeholder feedback of LAT ā—‹ The tool is publicly available, comments and suggestions were gathered online ā—‹ Presentation of LAT ā—‹ BMB AGM (Florence), GMDS (Gƶttingen), Knowledge Exchange workshop (Berlin), RDA ā—‹ Comment of evaluators: ā€œThis is the tool we need!ā€ ā—‹ Comparison of LAT with tools of other initiatives ā—‹ BBMRI legal WIKI, hSERN, IPAC ā—‹ These tools complement each other ā—‹ Security framework ā—‹ Feasibility and utility of the security framework is demonstrated by a pilot implementation ā—‹ Example for building secure data bridges 38
  • 39. Impact of the developments ā—‹ The most significant (and lasting) impact? ā—‹ Knowledge exchange workshop (30 June 2014, Berlin) ā—‹ Possibilities were created to use a software tool for legal and ethical interoperability ā—‹ Additional opportunities with an strategic impact? ā—‹ Collaboration with RDA / IPAC ā—‹ Extension of LAT knowledge base with national legislation and rules would be necessary ā—‹ Incorporation of legal ontology into LAT ā—‹ Employment by BBMRI ā—‹ Employment by ECRIN 39
  • 40. Sustainability of Legal Assessment Tool ā—‹Maintained and developed by ELIXIR, ECRIN ā—‹Enabling legal and ethical interoperability when using / re-using medical data for research purposes ā—‹Plans for extension and sustainability exist ā—‹Regular updates of the knowledge base ā—‹Enlargement of ontology, development of a graphic wizard for data entry, inclusion of examples from use cases ā—‹ But knowledge not in place to maintain LAT beyond the project? ā—‹Source code is openly available, on a request base ā—‹Decision on suitable Open Source licence 40
  • 41. Sustainability of framework of pilot ļ‚” Security framework ļ‚” Blueprint for secure, privacy preserving, ethically and legally sound data bridges between research infrastructures ļ‚” Can educate users about risks and risk mitigation ļ‚” BBMRI catalogue of pilot ļ‚” Maintained and developed in BBMRI ļ‚” The code is not openly available ļ‚” BioSamples Database ļ‚” Maintained by ELIXIR ļ‚” Necessary knowledge is in place to maintain these resources beyond the project ļ‚” The future maintenance of the other tools is uncertain
  • 42. Lessons learned and References
  • 43. Lessons learned for the security and data protection ļ‚”Combination of Shibboleth and REMS limits efficiently risks of the disclosure of confidential information to unauthorised persons ļ‚”REMS ensures that data access authorisation is granted according to specific legal requirements associated with a data sets (consideration of informed consent given by the patient/ data provider) ļ‚”The functionality of activity tracking allows that evidence of compliance with regulations is controlled and users and data managers can be held accountable for their actions 43
  • 44. Lessons learned from the pilot ā—‹ What worked? ā—‹ Collaboration within BioMedBridges was essential ā—‹ Knowledge exchange with external stakeholders was decisive ā—‹ Developing an interactive legal / ethical Web2.0 tool ā—‹ Development of a complex security framework for tools ā—‹ What did not work? ā—‹ Initiate collaboration with external stakeholders and research infrastructures ā—‹ Maintenance and further development of the tool after the projectā€™s end (sustainability question) ā—‹ Development of a single and joint framework for secure, legally and ethically compliant research by all research infrastructures 44 W. Kuchinke (2016)
  • 45. Additional linked ethical and legal governance tools ļ‚”The Legal Assessment Tool (LAT) guides researchers with no legal knowledge through relevant legal requirements for data sharing ā— LAT provides researchers with an online, interactive selection process to characterise the involved types of data and databases and provides suitable requirements and recommendations for data sharing ā— Links to the LAT were added to the BBMRI Hub ā— Guide data managers when assessing data sharing policies ļ‚”The Human Sample Exchange Regulation Navigator (hSERN) is a web resource featuring legal aspects involved in the exchanging human information ļ‚”The BBMRI Legal Wiki can provide useful information when data has to be exchanged between EU member countries ļ‚”The International Policy interoperability and data Access Clearinghouse (IPAC) is a tool providing information about policy interoperability on international level ā— It can provide direct help to the members of DACs who need to create forms within REMS for users 45 W. Kuchinke (2016)
  • 46. References ā—‹ Legal Assessment Tool (LAT). http://www.biomedbridges.eu/sharingsensitive-data ā—‹ Human Sample Exchange Regulation Navigator http://www.hsern.eu/ ā—‹ BBMRI Legal WIKI http://www.bbmri-wp4.eu/wiki/index.php/Main_Page ā—‹ IPAC http://p3g.org/ipac ā—‹ Brandizi, M., Melnichuk, O., Sarkans, U., Bild, R., Kohlmayer, et.al. (2016, February 11). BioMedBridges: Implementation of a pilot for the security framework. Zenodo. http://doi.org/10.5281/zenodo.45927 ā—‹ 46 W. Kuchinke (2016)
  • 47. References ā—‹ Kuchinke W, Krauth C, Bergmann R, Karakoyun T, Woollard A, Schluender I, Braasch B, Eckert M, Ohmann C. Legal assessment tool (LAT): an interactive tool to address privacy and data protection issues for data sharing. BMC Med Inform Decis Mak. 2016 Jul 7;16(1):81 ā—‹ Brandizi M, Melnichuk O, Bild R, Kohlmayer F, Rodriguez- Castro B, Spengler H, Kuhn KA, Kuchinke W, Ohmann C, Mustonen T, Linden M, Nyrƶnen T, Lappalainen I, Brazma A, Sarkans U. Orchestrating differential data access for translational research: a pilot implementation. BMC Med Inform Decis Mak. 2017 Mar 23;17(1):30 47 W. Kuchinke (2016)
  • 48. Contributions ā—‹ Part of the presentation was presented earlier by Wolfgang Kuchinke, Raffael Bild, Florian Kohlmayer, Klaus A. Kuhn 48 W. Kuchinke (2016)
  • 49. Contact Wolfgang Kuchinke UDUS, Duesseldorf, Germany wolfgang.kuchinke@uni-duesseldorf.de This presentation contains additional explanatory material for a workshop