![]() |
| Photo by: Mediajon |
All medical databases need to establish unity and organization, and tighter privacy restrictions will inadvertently establish organization. The process of De-Identification allows subjects, in medical databases, to become anonymous when their information is used in research studies. Its purpose is to protect subject’s private information, however there are differences in standards between the institutions that possess medical databases causing an inconsistency in regards to what information needs to be protected (2). The inconsistency in the De-Identification process causes great confusion when subjects’ information is passed between medical databases with different standards. For example, say a medical database requires names to be hidden, and then when the information is passed along to another institution their medical database requires the names of the subjects. This would result in a time consuming process in which names have to be added back to the correct information. Stricter privacy regulations has addressed this issue by offering a new identification system known as Pseudonymization. This process allows subjects to take on a pseudonyms, or fake names, in order to protect their real identity (2). This process will not only protect subject’s information, but it will allow researchers to have a standardized identification for a subject without using their actual name. This will save time, and make medical databases more organized when trying to locate a particular subject’s information.
![]() | ||
| Photo by: The.Comedian |
Communication with subjects will play a key role in maintaining security, and ensuring reliability. Subjects need to be aware of what types of research their information is being used for. In the Nature article “Power to the People” the author advocates for a method known as “specific consent”, a process in which researchers must obtain consent from every subject before they are able to use their information in research. Nowadays researchers use a method known as “broad consent”, a process in which researchers obtain consent from a few subjects and their consent is supposed to be representative of all the subjects (4). Critics’ argue that this may take too much time and slow down research (4), however I feel a simple email sent by the researchers to the subjects would be an efficient way to achieve specific consent. One could also have subjects verify the information before their data is used to further ensure that the data is accurate. Not only will this allow subjects to consent for the use of their information, it will also give subjects a better understanding for what their information is being used for.
Many benefits can come from tightening the security on medical databases. Critics who say that the restrictions will slow down scientific research need to look at all the benefits. Organization, reliability, and communication are benefits of what can come from stricter privacy regulations. New methods like specific consent, and pseudonymization are just a few of the new features that will come from the bill proposed by European Parliament. People put trust into organizations that hold their information, and the least they can do is to make sure one’s information is safe in the company’s hands. Hopefully Europe can show nations around the world the improvements that come from tighter security restrictions and give the other nation’s confidence to join the movement.
Bibliography
1. 2013. Privacy in the Digital Age. Nature [Internet]. [2013 May 15, cited 2014 Jan 30] Volume 497, Issue 7449. Available from: http://www.nature.com/news/privacy-in-the-digital-age-1.12978
2. Kim, Natalie. 2013. Towards Trans-Atlantic Interoperability: Scientific Research and Privacy Under the EU Data Protection Regulation. Harvard Journal of Law &Technology (Jolt Digest) [Internet]. [2013 Aug 11, cited 2014 Feb 2]. Available from: http://jolt.law.harvard.edu/digest/legislation/towards-trans-atlantic-interoperability-scientific-research-and-privacy-under-the-eu-data-protection-regulation
3. Fox, Tina. 2013. IDASH Projects: Protecting Privacy and Patient Rights in the Name of Scientific Progress. News Center [Internet]. [2013 Sep 10, cited 2013 Feb 2]. Available from: http://ucsdnews.ucsd.edu/pressrelease/idash_projects_protecting_privacy_and_patient_rights_in_the_name_of_sc1
4. 2014. Power to the People. Nature [Internet]. [2014 Jan 15, cited 2014 Feb 3 2014] Volume 505, Issue 7483. Available from: http://www.nature.com/news/power-to-the-people-1.14505





