29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.

Slides:



Advertisements
Présentations similaires
droit + pub = ? vincent gautrais professeur agrégé – avocat
Advertisements

GINIE Data Policy workshop France F. Salgé G. Bertrand Y. Riallant.
Les pronoms compléments
CCIE – 27 novembre 2000 Part 1: (45 minutes) - Jean Rauscher
GERPISA Eleventh International Colloquium June 11-13, 2003 Paris The Origins and the Limits of the Productive Models Diversity Research questions and research.
Département fédéral de lintérieur DFI Office fédéral de la statistique OFS Implementing the economic classification revision (NACE / ISIC) in the Business.
Le sondage LibQUAL à HEC Montréal Une première expérience réussie qui sintègre au processus de planification stratégique de la bibliothèque Le sondage.
Primary French PowerPoints What’s Your Name?.
Revenir aux basiques !. 1 Revenir aux basiques Processus Nécessité daméliorer la Maîtrise les Offres et Projets: lanalyse des causes racines montre un.
Inforoute Santé du Canada Les défis de linteropérabilité en e-santé Mike Sheridan, Chef de lexploitation 19 mai 2006.
Talking about yourself
To use this resource, make sure you view the slideshow, not just open the file. You can learn a slide off by heart, then test yourself on the next slide.
Questions II How do you Form Questions in French??
Les verbes en -er. chanter – to singtelephoner – to call danser – to dancetravailler – to work diner – to have dinnervoyager –to travel ecouter – to listen.
Cliquez et modifiez le titre Cliquez pour modifier les styles du texte du masque Deuxième niveau Troisième niveau Quatrième niveau Cinquième niveau 23/01/2014©
RECOMMENDATIONS ON EXPORT MARKETING FOR GEORGIAN WINES Tbilisi – November 27, 2007.
REBUILDING HAITIAN MEDICAL EDUCATION AND TRAINING.
Status report SOLEIL April 2008
The OECD Guidelines and the Evolving Privacy Landscape Data Protection Day January 28, 2011 Jennifer Stoddart Privacy Commissioner of Canada Joint High.
Reading an analog clock
Defence R&D Canada R et D pour la défense Canada Novel Concepts for the COP of the Future Denis Gouin Alexandre Bergeron-Guyard DRDC Valcartier.
Role-play C On the first page, you will see a sample of the preparation material you will be given 10 minutes before your exam. On the second page, you.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
The Benefits of Technology in the Classroom By: Jennifer Langer.
Assessment and the new secondary curriculum S. Barfoot.
How to solve biological problems with math Mars 2012.
Core Module 9 Family and Community Engagement Association des conseils scolaires des écoles publiques de lOntario (ACÉPO) Association franco-ontarienne.
EUROPEAN ASSOCIATION OF DEVELOPMENT RESEARCH AND TRAINING INSTITUTES ASSOCIATION EUROPÉENNE DES INSTITUTS DE RECHERCHE ET DE FORMATION EN MATIÈRE DE DÉVELOPPEMENT.
AFNOR NF Z – "Online Consumer Reviews
Les Questions dInformation. Information Questions Information questions are open-ended. They request new information and cannot be answered with a simple.
28th Conference of Directors of Paying agencies Namur, 27 to 29 October 2010 The Belgian Presidency of the Council of the European Union Workshop 2 : Control.
Mardi 20 Novembre 2012 Recap I can
1 La promotion de la santé ancrée dans la loi Le mandat de Promotion Santé Suisse est ancré dans la loi fédérale du 18 mars 1994 sur lassurance maladie.
Bienvenue à la classe de français!
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
En Avant Communication en direct C HAPITRE 1 : Pour commencer.
Observations from the International Drug Policy Consortium JAMIE BRIDGE SENIOR POLICY AND OPERATIONS MANAGER AU CONFERENCE OF MINISTERS OF DRUG CONTROL.
INVESTMENT CLIMATEDEVELOPMENT IMPACT EVALUATION INITIATIVE Piloting the Entreprenant Status: In search of a successful formalization model BENIN Impact.
PURCHASING PHASE REVIEW Cornerstones of Purchase baseline
Les choses que j aime Learning Objective: To know how to use j aime to talk about things I like to do.
Laboratoire de Bioinformatique des Génomes et des Réseaux Université Libre de Bruxelles, Belgique Introduction Statistics.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
Présentation dun modèle dinterface adaptative dun système de diagnostique et dintervention industriel: ADAPTS (Adaptive Diagnostics And Personalized Technical.
Il est vs. cest. How would you translate these sentences? Cest Pierre. Il est gentil. Cest un ami. Cest un ami français. It is Pierre. He is nice. Its.
QU’EST-CE QUE TU FAIS?.
Chez moi! In this unit you will learn:
Le Baromètre Zone Cours : un environnement pour la micro-évaluation de ressources pédagogiques* Jacques Raynauld Olivier Gerbé HEC Montréal, MATI Montréal.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
1 Diffusion du savoir et mobilisation des connaissances Bilan de la réunion des partenaires du Domaine Justice, Police et Sécurité à Ottawa (14 novembre.
Français II H – Leçon 1B Structures
J’aime ma culture francophone, j’aime notre façon d’être, notre joie de vivre, nos traditions, nos manies. Je veux que mes enfants vivent ça et qu’ils.
INDICATOR DEFINITION An indicator describes the manifestation of a process of change resulting from the pursuit of an action. Un indicateur décrit la manifestation.
«MASTER MANAGEMENT ET INGENIERIE ECONOMIQUE» Spécialité: Projet innovation conception, option gestion de la connaissance Module: Communautés virtuelles,
KM-Master Course, 2004 Module: Communautés virtuelles, Agents intelligents C3: Collaborative Knowledge construction & knowledge sharing Thierry NABETH.
The Passé Composé Objective: to talk about things we have done on a visit to explain what events happened to speak and write about events in the past.
Qui and que can both be translated as ‘that’ or ‘which’ or ‘who’. They are called relative pronouns because the relate back to a noun which has been mentioned.
Belgian Breast Meeting Senator F. Roelants du Vivier 13th october.
ANSWERS. What is Verb Conjugation? For one thing, conjugating a verb is simply putting a verb in an orderly arrangement. We will use a chart. To create.
Core Module 10 Advocacy: Engaging the Public Association des conseils scolaires des écoles publiques de l’Ontario (ACÉPO) Association franco-ontarienne.
Welcome everyone.
Template Provided By Genigraphics – Replace This Text With Your Title John Smith, MD 1 ; Jane Doe, PhD 2 ; Frederick Smith, MD, PhD 1,2 1.
Session 3: Implementation experience: Selection of measures based on Cost-effectiveness Analysis Introduction: summary of relevant results of the questionnaire.
Beneficiary Communication
Your UBRP Summary Report Title
Transcription de la présentation:

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Dr. Ann Cavoukian Information and Privacy Commissioner of Ontario

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive De-identification Risk and Resolution Bradley Malin, Ph.D. Assistant Professor Vanderbilt University

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive De-identified is not Anonymous (Sweeney 1998, 2000) Zip Birthdate Sex Name Address Date registered Party affiliation Date last voted Voter List Ethnicity Visit date Diagnosis Procedure Medication Total charge Hospital Discharge Data 87% of the United States is RE-IDENTIFIABLE

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive DNA Re-identification Many deployed genomic privacy technologies leave DNA susceptible to re-identification (Malin 2005) DNA is re-identified by automated methods, such as: –Genotype – Phenotype Inference (Malin & Sweeney, 2000, 2002)

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Genealogy Re-identification (Malin 2006) IdentiFamily: –software that links de- identified pedigrees to named individuals –Uses publicly available information, such as obituaries, death records, and the Social Security Death Index database to build genealogies

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Genealogy Re-identification (Malin 2006)

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive System Susceptibility (Malin, JAMIA 2005) Privacy Protection Systems What Trusted Third Party Semi-Trusted Third Party DenominalizationDe-identification Where deCode Genetics Inc. University of Gent, Custodix University of Montreal University of Utah, University of Sydney, Australian National University Susceptibility to Attack Family Structures Trails Genotype-Phenotype Dictionary SusceptibleNot Susceptible

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Altering Data Does not Guarantee Protection Science Magazine (Lin et al, 2004) –< 100 SNPs make DNA unique –Proposed protection: perturb DNA i.e., change A with T, etc. aaaact atacct –Increase perturbation, decrease internal correlations (see graph) –Conclusions Too much perturbation needed to prevent linkage Keep records under lock and key Privacy (Perturbation) Utility (Correlations) DISCLAIMER: Uniqueness Does not Guarantee Privacy will be Compromised

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Formal Re-identification Model De-identified Biobank Data Identified Data aaactaaga cacaccatg tatatgatgt John Doe Jane Doe Jeremiah Doe Necessary Condition UNIQUENESS 1. Make Data Non-unique Necessary Condition LINKAGE MODELC 2. Certify No Linkage Route Already Public Necessary Condition UNIQUENESS Necessary Condition UNIQUENESS

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Formal Protection k-Map (Sweeney, 2002) –Each shared record refers to at least k entities in the population k-Anonymity (Sweeney, 2002) –Each shared record is equivalent to at least k-1 other records k-Unlinkability (Malin 2006) –Each shared record links to at least k identities via its trail –Satisfies k-Map protection model

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Beyond Ad hoc Protections Perturbation does not guarantee privacy Alternative: Generalization of data (Malin 2005) (Lin et al 2004)

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Learning Who You Are From Where You Have Been (Trails) (Malin & Sweeney, 2001; 2004, Malin & Airoldi 2006)

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Preventing Trails: Cystic Fibrosis Population (1149 samples) BEFORE STRANON 100% Samples In Repository AFTER STRANON 0% Samples k-Re-identified

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Benefit: Quantified Risk Change in re- identification risk Shift burden of increased risk to requesting analyst Ties together legal and computational models Initial Setting Requested Quantity Forced Setting

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Measuring and Managing Re-identification Risk by Khaled El Emam University of Ottawa

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Managing Re-id Risk- I Before data is collected: –Scenarios When preparing a protocol For review by ethics boards When formulating new policies and procedures When writing data sharing agreements –Tools Heuristics Simulations

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Managing Re-id Risk - II After data is collected: –Scenarios Providing data to administrators, researchers or government departments Responding to an access to information request –Tools Masking Risk-based anonymization

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Heuristics, Masking, Anon The 20k rule, 70k rule, 100k rule …. Decision tools from matching experiments Around 18 tools for masking on the market Deciding on a risk threshold for anonymization

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Acceptable Re-id Risk What databases does an attacker have access to for record linkage ? What does an attacker know beforehand ? What is the verification cost ? How do we account for privacy tradeoffs by the public ? What is the impact of consent model ?

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Databases Public information and registries Commercial but generally available databases Confidential and proprietary databases

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Verification Cost At some point the verification cost becomes too high compared to the benefit for the attacker The proportion of data that is population unique is important The extent of overall matching success is also important You can control both through anonymization

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Tradeoffs The public is willing to trade their privacy for personal benefits/gains What they tell us is not necessarily how they will behave To what extent is the public willing to trade their privacy for societal gain ?

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Consent Models Is the impact on recruitment rates and bias a function of the consent model or how it is implemented ? There are many factors that influence consent – were all of these controlled for when comparing consent models ?

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Workshop 4 Protecting Privacy Through De-Identification: Reality or Fallacy Part 1: Discussion

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Dr. Debra Grant Senior Health Privacy Specialist Information and Privacy Commission of Ontario

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive De-identification challenges raised by genetic and genomic data William W. Lowrance, PhD September 26, 2007

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive The physical basis of the challenges The human genome: is extensive and very fine-grained influences many personal attributes is intrinsic to the body doesn't change during the lifetime is unique to the individual. The full genome is carried by the DNA in every cell of the body (except red blood cells).

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive What genomic data look like...tttccgtatgcgtagccagacttaccctcctagtag... through 3,000,000,000 "data-cells," each carrying a/t/g/c. Altering or inserting just a few a/t/g/c can make a big difference, whether the genome is being considered: as a dynamic program-tape, or as an intrinsic "barcode."

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive What genetic data look like at sequence scale: ctag...ctccca at gene scale: "Diabetes-factor gene SLC308A" at body scale: "red hair," "heritable renal dysplasia" at family scale: pedigree, family health history, other indicators.

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive The most useful construal of identifiability for genomic data, in my view "Identifiability" is the potential associability of data with persons.

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Paths through which genomic data can become identified (a) matching genotype to identifiable reference genotype data (such as police, military, or blood-relatives') (b) linking genomic+associated data (health, social, etc) with other data (c) profiling, i.e. probabilistically describing likely appearance, health factors, or other traits.

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Tactics for de-identifying genomic data (a) limiting the proportion of genome released (b) statistically degrading the data before releasing (c) irreversibly de-identifying (d) separating the identifiers and key-coding.

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Tactic (a): limiting the proportion of genome released is done, and can protect but often limits usefulness, because often it isn't known in advance which portions of genome are relevant difficult to judge how much is "not too much" to release.

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Tactic (b): statistically degrading the data before releasing can be done, such as by randomly substituting some a/t/g/c almost always degrades usefulness, because most analyses depend on precise fine details.

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Tactic (c): irreversibly de-identifying is occasionally done, such as when the purpose is to survey the background occurrence of some phenomenon, or to provide data for educational use.

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Tactic (d): separating the identifiers and key-coding works well if performed carefully, the key is properly safeguarded, and use of the key to reconnect is strictly controlled is increasingly being used in activities such as health research.

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive To de-identify, or not? Whether and in what ways to de-identify genomic data depends on the: character of the data consent intended uses potential for linking to reference genotype or other data protections.

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Alternatives and complements to de-identification Provide access via controlled release (governed by contract, overseen by a stewardship committee, etc) Sanction against misuse of the data (such as improper re-identifying) or abuse using the data (such as negative discrimination).

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Closing sermon De-identification is a crucial, practical protection for both genomic and other kinds of data and its use must be strongly encouraged! General ref: Lowrance and Collins, "Identifiability in genomic research," Science 317, (August 3, 2007).

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Consent and Access to Personal Information for Health Research – public perspective Don Willison, Sc.D. Centre for Evaluation of Medicines, St. Josephs Healthcare, Dept of Clinical Epidemiology & Biostatistics, McMaster University,

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Research team: –McMaster University Don Willison (P.I. – privacy, policy, research methods) Lisa Schwartz (philosophy, bioethics) Julia Abelson (public engagement) Cathy Charles (public engagement, qualitative methods) Lehana Thabane (statistician, quantitative methods) Marilyn Swinton (research coordinator, qualitative methods) –York University David Northrup (survey methods) –Canadian Policy Research Networks Mary Pat MacKinnon, Judy Watling (dialogue) Funding: Canadian Institutes of Health Research Publication: JAMIA – November 2007

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Context: Expanding Use of personal information for health research Increase in scope and complexity of data use –Data linkage administrative and clinical data survey and genetic information –Single time-limited studies registries and biobanks –EHR: expanded access to health information for: population / public health research pragmatic trials Researchers need individual-level data –Challenge: masking of identity –Debate: treat data as identifiable?

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Issues Around Consent Patient/public perspective: –How to obtain meaningful and valid consent? Researchers perspective: –practicability of obtaining consent potential selection biases in a consent-based system –If consent is waived, limitations: Cannot contact patient / Who may screen charts? General: –Must we be limited to the binary option of consent / no consent?

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Our survey: Cross-Canada telephone survey, random-digit dialled –March-April 2005 –n=1230 (58% response rate) Structure: –General questions Demographics, altruism Placing health and privacy in context of other priorities –Questions in abstract attitudes re: privacy and research trust in institutions use of medical records for different types of research –Specific scenarios. Role of consent in: medical record research electronic health record record linkage

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive WHAT DID WE FIND? Attitudes to privacy High support for privacy in principle: –97% felt protection of the privacy of their personal information was important 74% very important / 23% somewhat important. –91% agreed that more effort needs to be made to protect our privacy 59% strongly agreed / 32% somewhat agreed –92% agreed that everyone benefits if the privacy of individuals is respected 66% strongly agreed / 26% somewhat agreed

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Privacy vs. Research

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Research Scenarios 4 scenarios: –Abstraction of information from health record for research –Use of electronic health information for research –Linkage of education with EHR –Linkage of income with electronic health record Data have direct identifiers removed –Makes it difficult but not impossible to re-identify

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Opinion regarding consent and alternatives across scenarios ScenarionConsent Choice Do not use Ask permission first Notify / opt out Just use Every time General renewing General once Manual extraction of data from medical record 12074% 32%23%5% 24%12% 60% Automated extraction of data from EHR 9419%36%28%27% Link education with EHR 85810%41%26%23% Link income with EHR 85327%40%16%17%

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Public Dialogues Key messages: –High sense of altruism, but contingent on benefit being accrued to public –Desire for greater control when there is a commercial element. –Importance of trust of the researcher beneficence / non-maleficence –Consent choice little different between identifiable and non-identifiable information A matter of respect for the individual

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Conclusions Public values both health research and privacy –If pressed, privacy tends to give way to research –Support is there for research use of personal information, Much of this support is qualified Researchers need to be careful to maintain public trust Importance of paying attention to safeguards Individuals differ in the amount of control that want to exercise over use of their personal information. –Majority (~65%) open to alternatives to express consent on a study-by-study basis –Only 12-27% willing to allow use of their information without their knowledge or consent

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive Policy Implications: Insufficient public support for across-the-board assumed or deemed consent for research uses of personal information for health research Document individuals consent choices for 2° uses of personal information – authorization model. –Embrace the range of consent alternatives –How best to approach this? Track choices through common inter-operable EHR (Canada Health Infoway) Need infrastructures for ascertaining and managing consent choices Safeguards and governance structures

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 29e Confrence internationale des commissaires à la protection de la vie prive