Contractual Approaches to Data Protection in Clinical Research Projects

Similar documents
Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary

Our Data Protection Officer is Andrew Garrett, Operations Manager

Data Protection and Privacy Policy PORTOBAY GROUP Version I

Scientific Research Data Management Policy

Impacts of the GDPR in Afnic - Registrar relations: FAQ

This Privacy Policy applies if you're a customer, employee or use any of our services, visit our website, , call or write to us.

Privacy Policy Effective Date: October 4, 2017


Rules for Commissioned Processing. (DDV Declaration of Conformity)

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT

the processing of personal data relating to him or her.

Open Banking Consent Model Guidelines. Part 1: Implementation

How the GDPR will impact your software delivery processes

Privacy Challenges in Big Data and Industry 4.0

Data Management Checklist

TIA. Privacy Policy and Cookie Policy 5/25/18

PS Mailing Services Ltd Data Protection Policy May 2018

PRIVACY STATEMENT. The Island with Bear Grylls (the Programme ) Introduction and main purposes

H2020-LEIT-ICT WP European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy

Individual Agreement. commissioned processing

The NIS Directive and Cybersecurity in

General Framework for Secure IoT Systems

Consent Model Guidelines

Overview of Akamai s Personal Data Processing Activities and Role

How to make your data open

Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment

Legal Issues in Data Management: A Practical Approach

Data Governance: Data Usage Labeling and Enforcement in Adobe Cloud Platform

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION

RippleMatch Privacy Policy

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

The Two Dimensions of Data Privacy Measures

Spectrum Wellness Privacy Statement

GDPR White Paper. Introduction

PRIVACY STATEMENT OF TIBBAA SMARTCARD

Privacy Policy: Data & Information Security Policy Last revised: 9 May 2018

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System

Catalent Inc. Privacy Policy v.1 Effective Date: May 25, 2018 Page 1

Chartered Membership: Professional Standards Framework

PRIVACY POLICY PRIVACY POLICY

Distributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

PRIVACY POLICY & GDPR COMPLIANCE STATEMENT Updated 15 May 2018

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

Depending on the Services or information you request from us, we may ask you to provide the following personal information:

Privacy Notices under #GDPR: Have you noticed my notice?

DATA PROTECTION POLICY THE HOLST GROUP

Arkadin Data protection & privacy white paper. Version May 2018

Google Cloud & the General Data Protection Regulation (GDPR)

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

ENCePP Code of Conduct Implementation Guidance for Sharing of ENCePP Study Data

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).

IDENTITY ASSURANCE PRINCIPLES

Chapter 4. Fundamental Concepts and Models

e-infrastructures in FP7 INFO DAY - Paris

The types of personal information we collect and hold

New Zealand Telecommunications Forum. Code for Vulnerable End Users of Telecommunication Services. ( Vulnerable End User Code )

BIOEVENTS PRIVACY POLICY

Fair data and open data: differences and consequences

Motorola Mobility Binding Corporate Rules (BCRs)

Identity Management: Setting Context

Project Isaacus - Leading Public and Private Actors beyond Big Data. Jaana Sinipuro, Project Director

IMPORTANT INSTRUCTIONS:

FIBO Operational Ontologies Briefing for the Object Management Group

Privacy notice. Last updated: 25 May 2018

Powering Knowledge Discovery. Insights from big data with Linguamatics I2E

Data Protection Privacy Notice

Smart Software Licensing tools and Smart Account Management Privacy DataSheet

Altitude Software. Data Protection Heading 2018

OnlineNIC PRIVACY Policy

Safaricom Data Privacy Statement

CliniSys Website Privacy Policy

Data Protection Policy

GDPR - Are you ready?

Creating a Digital Preservation Network with Shared Stewardship and Cost

POMONA EUROPE ADVISORS LIMITED

GDPR and the Privacy Shield

Science Europe Consultation on Research Data Management

The UNISDR Private Sector Alliance for Disaster Resilient Societies

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange

CE4031 and CZ4031 Database System Principles

Proposed Interim Model for GDPR Compliance-- Summary Description

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Implementing an Audit Program for HIPAA Compliance

GDPR Compliant. Privacy Policy. Updated 24/05/2018

Islam21c.com Data Protection and Privacy Policy

Contract Services Europe

1 Privacy Statement INDEX

Open Data Policy City of Irving

This article will explain how your club can lawfully process personal data and show steps you can take to ensure that your club is GDPR compliant.

The role of digital disruption in health care

Comparison of SmartData Fabric with Cloudera and Hortonworks Revision 2.1

High-level expert group on information systems and interoperability. Third meeting 29 November Report

The Australian Privacy Act An overview of the Australian Privacy Principles (APPs) Author: Paul Green

Proposal for a model to address the General Data Protection Regulation (GDPR)

Project Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH

GDPR. The new landscape for enforcing and acquiring domains. You ve built your business and your brand. Now how do you secure and protect it?

Transcription:

Contractual Approaches to Data Protection in Clinical Research Projects EICAR, 24th Annual Conference Nürnberg, October 2016 Dr. jur. Marc Stauch Institute for Legal Informatics Leibniz Universität Hannover 1

1. Data mining as a privacy challenge IT scientists mining data in ever more diverse forms and ever greater quantities. Increasing view that this places in question traditional attempts to protect the privacy of individuals (data subjects) by technical de-identification measures. o As Paul Ohm writes: Computer scientists have recently undermined our faith in the privacy-protecting power of anonymization, the name for techniques for protecting the privacy of individuals in large databases they can often 'reidentify' or 'deanonymize' individuals hidden in anonymized data with astonishing ease. 2

Data-mining as a privacy challenge (contd.) In response, attention has focused on radical data security conversions that seek to aggregate data or present it in a non-individuated form. o Presented as counts rather than individual-level datarows o Cleaning rows of outliers, perturbation, adding noise Alternatively, technical security is applied externally as part of securely storing and controlling access to data, so only trusted persons with the clearest reasons for needing to see the data may do so. o Data siloed in secure repositories; in some cases external users not allowed to access raw data, but only to pose predefined queries 3

Data-mining as a privacy challenge (contd.) Problem with both of these responses is that they potentially inhibit researchers from learning from and using the data in the optimal way. o If data is cleaned of many of the characteristics that individuate it and aggregated into counts, much of its value for research may be lost. o Placing the data in secure off-limit databases means most researchers will not see it in the first place. o In either case, slows down understanding of diseases, and hence of developing ways to prevent and treat them. 4

Data-mining as a privacy challenge (contd.) Also second problem, which is that defensive strategies of the above kind fail to build (or may even diminish) trust between the communities of would-be data researchers and the data subjects whose data is needed to do the research. Here proliferation of restrictive de-identification and access control techniques may reinforce public view that mining personal data for new knowledge is an inherently suspect and risky enterprise. 5

2. Data-sharing in clinical research Benefits of health data analysis for research o New means of mining (searching through and analysising) the data; sophisticated computer algorithms able to identify previously unsuspected associations/correlations in the data o Ever greater understanding of multi-factorial influences on development of diseases; encompasses past (how a condition arose), and future (ability to predict future health events) At same time potential risks to individual interests: o In privacy (easier for others to infer facts about a person including about their health o In dignity/autonomy (others may make decisions that affect the person, accordingly, including without the person s knowledge) 6

Data-sharing in clinical research (contd.) Health data an especially sensitive and vulnerable category of data (and treated as such under the law: Art 8 DPD; Art 9 GDPR) So it is clear data protection law, backed up by technical data security, is necessary in order to minimise various risks, but in terms of promoting beneficial use of health data for research, not sufficient. Question is what can be added to achieve greater trust? (solution closely related to achievement of more transparency) 7

3. Contractual frameworks for individual clinical research projects Groups of researchers bound by contracts that create closed research communities Plausible solution in specific health data research projects, where a limited number of partners cooperate in sharing and mining data in order to pursue a pre-determined research goal. o Key scenario is when data originally stemming from individual patients are to be made centrally accessible via a central repository, or otherwise shared by multiple users. o AETIONOMY Project as example 8

Contractual frameworks for clinical research projects (contd.) AETIONOMY project funded by the Innovative Medicines Initiative (IMI) Aims to advance understanding of the causes of neuro-degenerative diseases (AD and PD). o [http://www.aetionomy.eu/en/vision.html]. Large quantities of detailed clinical data shared by clinical and pharmaceutical partners. IT scientists carrying out stratification analysis, dividing patients into subgroups that reflect the discrete ways in which the diseases to develop. 9

Contractual frameworks for clinical research projects (contd.) For this purpose LUH has prepared a series of data provider and data end user contracts that the project partners have signed. Framework seeks to ensure that data users who access the data for project purposes handle it in legally and ethically compliant fashion. o Includes need for strict control of the data to prevent it from escaping into unforeseen interpretational contexts; entails state of art data security in accordance with the law (Art 17 DPD; Art 32 GDPR). 10

4. Contractual documents as a means of promoting transparency GDPR also stresses need for transparency : o Art 5(1) Need for personal data to be (a) processed lawfully, fairly and in a transparent manner in relation to the data subject. Here, particular feature of the contractual documents developed by LUH for projects like AETIONOMY: This is use of a so-called preamble (placed before the legally operative contractual provisions), i.e: o [an] introductory written statement of facts or assumptions upon which a statute or contract is based. 11

Contractual documents as a means of promoting transparency (contd.) In the context of clinical data research projects the preamble in the data sharing agreements spells out the factual substratum including the purposes of the project against which the data processing in the project will take place. o For example, the preamble to the various AETIONOMY project data-sharing contracts states (in redacted and abridged form). 12

4a. The AETIONOMY Preamble The AETIONOMY project is an IMI project that aims to analyse and structure different types of data (ranging from molecular data to information on symptoms) and apply this knowledge to construct a new classification of patient groups based on the underlying causes of their disease. This will facilitate the development of drugs that effectively target the specific disease mechanisms in different patient groups. At the same time, each of the project partners recognises as a priority the need to respect the fundamental interests and rights of patients, including the need to preserve the security and privacy of personal data processed in the project 13

AETIONOMY Preamble (contd.) The data-flow in the AETIONOMY project envisages that all individual (subject-level) data will ultimately be transferred to the [X] repository at [partner Y], where it will be made available to partners for mining and algorithm development as part of constructing the targeted disease taxonomies. In some instances data provider partners will send data directly to [XXX]; however two variant data flows are also planned. First, data may be sent initially to the AETIONOMY Knowledge base at [partner Z] for required data curation [by Z] before onward transfer to [X repository]. In the second place, in the case of image data, this may first be sent to [partner Q] for pre-processing, before inclusion in [X repository]. 14

AETIONOMY Preamble (contd.) While the main obligations upon the data providers and users, respectively, are common to every agreement, individual data flows are covered by separate variant models: this allows the context of each data sharing transaction to be taken account of in specific additional provisions, so that parties obligations reflect their specific position within the overall data flow network. The present model agreement is needed to state the obligations and conditions under which an AETIONOMY data provider will transfer data to [Y] for processing and storage in a data-cube in [Y s] X data repository, to which AETIONOMY data users will have access to carry out their tasks in the Project. 15

5. Wider Application Use of using contractual preambles documents as a means of shining a light on data processing operations is potentially of wide application. o in most cases, extracting value from data will involve multiparty arrangements - transactions between separate legal entities, which are susceptible to contractual arrangements (usually wanted by the parties themselves). Thus in its Report on Big Data, the US PCAST Report (2014) distinguished three standard kinds of dataprocessing entity: o data collectors; data analysers; data users o (rare for all roles to be combined within one entity) 16

Wider Application (contd.) In this regard, data protection regulations could aim for a system, not dissimilar to that for present cases where agreements between different entities may raise legal or social concerns (such as in the area of competition law) Such contracts would need to be deposited with a central regulatory authority. o Admittedly, considerations of commercial confidentiality may sometimes require that the operative provisions of such contracts be kept from public view (albeit the regulator would be aware of them). 17

5. Wider Application However, in each case the parties could be required to include a preamble, in a standard prescribed format, setting out the main features of their arrangement o Would include the nature of the data to be shared; the intended purposes of processing it; and the source and final destination of the data. This would be available in public part of registry. Such an approach would promote transparency of processing operations using individual data, and thereby contribute to more public trust 18

Thank you for your attention! Marc Stauch stauch@iri.uni-hannover.de Acknowledgement: the work on which this paper is based has received funding from the Innovative Medicines Initiative under grant agreement no 115568. The views expressed are those of the authors and do not necessarily reflect those of IMI. 19