SlideShare a Scribd company logo
1 of 20
Cloud-Based
Data Storage, Computing and Sharing
for Health and Medical Research
Dr Jeff Christiansen, Queensland Cyber Infrastructure Foundation (QCIF)
This work is licensed under the Creative Commons Attribution 4.0 International License (CC-BY-4.0). To view a copy of the license, visit https://creativecommons.org/licenses/by/4.0/
Research Lifecycle
NHMRC Statement on Data Sharing - https://www.nhmrc.gov.au/grants-funding/policy/nhmrc-statement-data-sharing
Research Lifecycle
Data is central
NHMRC Statement on Data Sharing - https://www.nhmrc.gov.au/grants-funding/policy/nhmrc-statement-data-sharing
Research Lifecycle
NHMRC Statement on Data Sharing - https://www.nhmrc.gov.au/grants-funding/policy/nhmrc-statement-data-sharing
Data Infrastructure Requirements:
Storage
Management (Organising, Sharing with collaborators)
Analysis Tools
Compute (Desktop, Institutional, Cloud, HPC)
Dissemination of Results and Data Access
(Sharing with others)
Health and Medical research data
• Includes data derived from, or directly related to, human beings.
• Single human beings may be individually identifiable* in a proportion of these data.
• If individually identifiable data also contains health, genetic, or biometric information, it is also considered to be sensitive#
• Sensitive data carries legal and ethical responsibilities in ensuring that information is not intentionally or inadvertently disclosed to
non-authorised individuals.
• Everybody associated with these data (Data Custodians, Researchers, Research Collaborators and Data Infrastructure Operators) have
a shared ethical responsibility to ensure harm does not come to any research participant through unauthorised release of identifiable
data.
• Risk management is required – how to use and share but in a suitably secure manner?
Data infrastructure operators have a duty to Data Custodians and Researchers to demonstrate that they:
• have appropriate levels of maturity and discipline in information security practice to store human-derived research data and
• have a repertoire of administrative, physical, and technical safeguards in place to assure custodians of the security of the information.
* - NHMRC National Statement on Ethical Conduct in Human Research (2007 – Updated May 2015) https://www.nhmrc.gov.au/guidelines-publications/e72
# - Privacy Act 1988 (Cth) https://www.legislation.gov.au/Series/C2004A03712
Health and Medical research data
• Includes data derived from, or directly related to, human beings.
• Single human beings may be individually identifiable* in a proportion of these data.
• If individually identifiable data also contains health, genetic, or biometric information, it is also considered to be sensitive#
• Sensitive data carries legal and ethical responsibilities in ensuring that information is not intentionally or inadvertently disclosed to
non-authorised individuals.
• Data Custodians, Researchers, Research Collaborators and Data Infrastructure Operators have a shared ethical responsibility to ensure
harm does not come to any research participant through unauthorised release of identifiable data.
• Risk management is required – how to use and share data but in a suitably safe manner?
* - NHMRC National Statement on Ethical Conduct in Human Research (2007 – Updated May 2015) https://www.nhmrc.gov.au/guidelines-publications/e72
# - Privacy Act 1988 (Cth) https://www.legislation.gov.au/Series/C2004A03712
Health and Medical research data
• Includes data derived from, or directly related to, human beings.
• Single human beings may be individually identifiable* in a proportion of these data.
• If individually identifiable data also contains health, genetic, or biometric information, it is also considered to be sensitive#
• Sensitive data carries legal and ethical responsibilities in ensuring that information is not intentionally or inadvertently disclosed to
non-authorised individuals.
• Data Custodians, Researchers, Research Collaborators and Data Infrastructure Operators have a shared ethical responsibility to ensure
harm does not come to any research participant through unauthorised release of identifiable data.
• Risk management is required – how to use and share data but in a suitably safe manner?
Data infrastructure operators have a duty to Data Custodians and Researchers to demonstrate that they:
• have appropriate levels of maturity and discipline in information security practice to store human-derived research data and
• have a repertoire of administrative, physical, and technical safeguards in place to assure custodians of the security of the information.
* - NHMRC National Statement on Ethical Conduct in Human Research (2007 – Updated May 2015) https://www.nhmrc.gov.au/guidelines-publications/e72
# - Privacy Act 1988 (Cth) https://www.legislation.gov.au/Series/C2004A03712
What is med.data.edu.au?
Nationally-funded Data Infrastructure for Health and Medical Research Data
NCRIS-funding through the RDSI (Research Data Storage Infrastructure) and RDS (Research Data Services) projects
What is med.data.edu.au?
Data Infrastructure
What is med.data.edu.au?
Data Infrastructure
Cloud Storage (Networked via AARNet)
Management (Mediaflux, MyTardis, Aspera)
What is med.data.edu.au?
Data Infrastructure
Cloud Storage (Networked via AARNet)
Management (Mediaflux, MyTardis, Aspera)
Compute (Nectar Research Cloud, HPC)
Analysis Tools (BYO Software)
What is med.data.edu.au?
Data Infrastructure
Cloud Storage (Networked via AARNet)
Management (Mediaflux, MyTardis, Aspera)
Compute (Nectar Research Cloud, HPC)
Analysis Tools (BYO Software)
Dissemination of Results and Data Access (Data Registry)
What is med.data.edu.au?
Data Infrastructure
Cloud Storage (Networked via AARNet)
Management (Mediaflux, MyTardis, Aspera)
Compute (Nectar Research Cloud, HPC)
Analysis Tools (BYO Software)
Dissemination of Results and Data Access (Data Registry)
Resource Library
Protecting Personal Health Information in Research
Legislation (Cth, All States and Territories)
Codes, Policies and Best Practice (NHMRC, NIH)
IT security framework (ASD Info Security Manual)
What is med.data.edu.au?
Data Infrastructure
Cloud Storage (Networked via AARNet)
Management (Mediaflux, MyTardis, Aspera)
Compute (Nectar Research Cloud, HPC)
Analysis Tools (BYO Software)
Dissemination of Results and Data Access (Data Registry)
Resource Library
Protecting Personal Health Information in Research
Legislation (Cth, All States and Territories)
Codes, Policies and Best Practice (NHMRC, NIH)
IT security framework (ASD Info Security Manual)
Interactive Use Guide (Is med.data right for my data?)
Who manages it?
Who is using it?
54 Data Collections 2.6 PB (~600,000 DVDs) May 2017
Identifiable vs. non-identifiable data
The majority of 6PB data is re-identifiable/non-
identifiable.
Identifiable vs. non-identifiable data
The majority of 6PB data is re-identifiable/non-
identifiable.
For individually identifiable data a discussion about risk
management is required:
• What is the sensitivity level of the data?
• Use Cases: How, where and by who is the data to be
used?
Dictates the specifics of the IT security set-up (e.g.
encryption, authentication) required.
Identifiable vs. non-identifiable data
The majority of 6PB data is re-identifiable/non-
identifiable.
For individually identifiable data a discussion about risk
management is required:
• What is the sensitivity level of the data?
• Use Cases: How, where and by who is the data to be
used?
Dictates the specifics of the IT security set-up (e.g.
encryption, authentication) required.
Security policies are set by each Node Operator.
Happy to discuss with Data Custodians and Institutional
IT Security Officers:
• Use Cases
• Security set-up cf. ASD ISM Principles and Controls
Australian Signals Directorate Information Security Manual
https://www.asd.gov.au/infosec/ism/
Want to know more?
Contact Us
Interactive Use Guide
Funding
Operators

More Related Content

What's hot

Up2013 hie cloud_kamran_ghane
Up2013 hie cloud_kamran_ghaneUp2013 hie cloud_kamran_ghane
Up2013 hie cloud_kamran_ghane
sapenov
 

What's hot (20)

Timo Minssen, "Big Data and Intellectual Property Rights in the Health and Li...
Timo Minssen, "Big Data and Intellectual Property Rights in the Health and Li...Timo Minssen, "Big Data and Intellectual Property Rights in the Health and Li...
Timo Minssen, "Big Data and Intellectual Property Rights in the Health and Li...
 
Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...
 
Barbara Evans, "Big Data and the Meaning of Individual Autonomy in a Crowd"
Barbara Evans, "Big Data and the Meaning of Individual Autonomy in a Crowd"Barbara Evans, "Big Data and the Meaning of Individual Autonomy in a Crowd"
Barbara Evans, "Big Data and the Meaning of Individual Autonomy in a Crowd"
 
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
 
The Challenging and Changing Face of NHS Information Governance - Paper Deliv...
The Challenging and Changing Face of NHS Information Governance - Paper Deliv...The Challenging and Changing Face of NHS Information Governance - Paper Deliv...
The Challenging and Changing Face of NHS Information Governance - Paper Deliv...
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issues
 
Donna Gitter, "Informed Consent and Privacy of De-Identified and Estimated Da...
Donna Gitter, "Informed Consent and Privacy of De-Identified and Estimated Da...Donna Gitter, "Informed Consent and Privacy of De-Identified and Estimated Da...
Donna Gitter, "Informed Consent and Privacy of De-Identified and Estimated Da...
 
EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
 
Up2013 hie cloud_kamran_ghane
Up2013 hie cloud_kamran_ghaneUp2013 hie cloud_kamran_ghane
Up2013 hie cloud_kamran_ghane
 
Data Governance in two different data archives: When is a federal data reposi...
Data Governance in two different data archives: When is a federal data reposi...Data Governance in two different data archives: When is a federal data reposi...
Data Governance in two different data archives: When is a federal data reposi...
 
Sharing scientific data ethics and consent
Sharing scientific data    ethics and consentSharing scientific data    ethics and consent
Sharing scientific data ethics and consent
 
Sharing scientific data: Ethics and consent
Sharing scientific data: Ethics and consentSharing scientific data: Ethics and consent
Sharing scientific data: Ethics and consent
 
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and research
 
Web scraping and healthcare
Web scraping and healthcareWeb scraping and healthcare
Web scraping and healthcare
 
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
 
Research Data Management, Challenges and Tools - Per Öster
Research Data Management, Challenges and Tools - Per Öster Research Data Management, Challenges and Tools - Per Öster
Research Data Management, Challenges and Tools - Per Öster
 
Clarifying BI & IG support - Steven Aulman
Clarifying BI & IG support - Steven AulmanClarifying BI & IG support - Steven Aulman
Clarifying BI & IG support - Steven Aulman
 
20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open Science20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open Science
 

Similar to ANDS health and medical data webinar 16 May. Storing and Publishing Health and Medical Data. Jeff Christiansen

Lessons from the UK: Data access, patient trust & real-world impact with heal...
Lessons from the UK: Data access, patient trust & real-world impact with heal...Lessons from the UK: Data access, patient trust & real-world impact with heal...
Lessons from the UK: Data access, patient trust & real-world impact with heal...
Varsha Khodiyar
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
kayla_ann_30
 

Similar to ANDS health and medical data webinar 16 May. Storing and Publishing Health and Medical Data. Jeff Christiansen (20)

Med.data.edu.au project
Med.data.edu.au projectMed.data.edu.au project
Med.data.edu.au project
 
Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)
 
2015 04-18-wilson cg
2015 04-18-wilson cg2015 04-18-wilson cg
2015 04-18-wilson cg
 
Toward a FAIR Biomedical Data Ecosystem
Toward a FAIR Biomedical Data EcosystemToward a FAIR Biomedical Data Ecosystem
Toward a FAIR Biomedical Data Ecosystem
 
Data Management, Research Integrity and Ethics
Data Management, Research Integrity and EthicsData Management, Research Integrity and Ethics
Data Management, Research Integrity and Ethics
 
dkNET Webinar: Creating and Sustaining a FAIR Biomedical Data Ecosystem 10/09...
dkNET Webinar: Creating and Sustaining a FAIR Biomedical Data Ecosystem 10/09...dkNET Webinar: Creating and Sustaining a FAIR Biomedical Data Ecosystem 10/09...
dkNET Webinar: Creating and Sustaining a FAIR Biomedical Data Ecosystem 10/09...
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
Digital transformation to enable a FAIR approach for health data science
Digital transformation to enable a FAIR approach for health data scienceDigital transformation to enable a FAIR approach for health data science
Digital transformation to enable a FAIR approach for health data science
 
NCVHS Privacy and Security Update
NCVHS Privacy and Security Update NCVHS Privacy and Security Update
NCVHS Privacy and Security Update
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosis
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
20160719 23 Research Data Things
20160719 23 Research Data Things20160719 23 Research Data Things
20160719 23 Research Data Things
 
Lessons from the UK: Data access, patient trust & real-world impact with heal...
Lessons from the UK: Data access, patient trust & real-world impact with heal...Lessons from the UK: Data access, patient trust & real-world impact with heal...
Lessons from the UK: Data access, patient trust & real-world impact with heal...
 
Security & Privacy - Lecture E
Security & Privacy - Lecture ESecurity & Privacy - Lecture E
Security & Privacy - Lecture E
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health Records
 
Data Management in Human Imaging
Data Management in Human ImagingData Management in Human Imaging
Data Management in Human Imaging
 
ANDS presentation from Menzies HIQ Symposium: The Future of Data Sharing in a...
ANDS presentation from Menzies HIQ Symposium: The Future of Data Sharing in a...ANDS presentation from Menzies HIQ Symposium: The Future of Data Sharing in a...
ANDS presentation from Menzies HIQ Symposium: The Future of Data Sharing in a...
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
 
Research Data Management Services at UWA (November 2015)
Research Data Management Services at UWA (November 2015)Research Data Management Services at UWA (November 2015)
Research Data Management Services at UWA (November 2015)
 

More from ARDC

More from ARDC (20)

Introduction to ADA
Introduction to ADAIntroduction to ADA
Introduction to ADA
 
Architecture and Standards
Architecture and StandardsArchitecture and Standards
Architecture and Standards
 
Data Sharing and Release Legislation
Data Sharing and Release Legislation   Data Sharing and Release Legislation
Data Sharing and Release Legislation
 
Australian Dementia Network (ADNet)
Australian Dementia Network (ADNet)Australian Dementia Network (ADNet)
Australian Dementia Network (ADNet)
 
Investigator-initiated clinical trials: a community perspective
Investigator-initiated clinical trials: a community perspectiveInvestigator-initiated clinical trials: a community perspective
Investigator-initiated clinical trials: a community perspective
 
NCRIS and the health domain
NCRIS and the health domainNCRIS and the health domain
NCRIS and the health domain
 
International perspective for sharing publicly funded medical research data
International perspective for sharing publicly funded medical research dataInternational perspective for sharing publicly funded medical research data
International perspective for sharing publicly funded medical research data
 
Clinical trials data sharing
Clinical trials data sharingClinical trials data sharing
Clinical trials data sharing
 
Clinical trials and cohort studies
Clinical trials and cohort studiesClinical trials and cohort studies
Clinical trials and cohort studies
 
Introduction to vision and scope
Introduction to vision and scopeIntroduction to vision and scope
Introduction to vision and scope
 
FAIR for the future: embracing all things data
FAIR for the future: embracing all things dataFAIR for the future: embracing all things data
FAIR for the future: embracing all things data
 
ARDC 2018 state engagements - Nov-Dec 2018 - Slides - Ian Duncan
ARDC 2018 state engagements - Nov-Dec 2018 - Slides - Ian DuncanARDC 2018 state engagements - Nov-Dec 2018 - Slides - Ian Duncan
ARDC 2018 state engagements - Nov-Dec 2018 - Slides - Ian Duncan
 
Skilling-up-in-research-data-management-20181128
Skilling-up-in-research-data-management-20181128Skilling-up-in-research-data-management-20181128
Skilling-up-in-research-data-management-20181128
 
Research data management and sharing of medical data
Research data management and sharing of medical dataResearch data management and sharing of medical data
Research data management and sharing of medical data
 
Findable, Accessible, Interoperable and Reusable (FAIR) data
Findable, Accessible, Interoperable and Reusable (FAIR) dataFindable, Accessible, Interoperable and Reusable (FAIR) data
Findable, Accessible, Interoperable and Reusable (FAIR) data
 
Applying FAIR principles to linked datasets: Opportunities and Challenges
Applying FAIR principles to linked datasets: Opportunities and ChallengesApplying FAIR principles to linked datasets: Opportunities and Challenges
Applying FAIR principles to linked datasets: Opportunities and Challenges
 
How to make your data count webinar, 26 Nov 2018
How to make your data count webinar, 26 Nov 2018How to make your data count webinar, 26 Nov 2018
How to make your data count webinar, 26 Nov 2018
 
Ready, Set, Go! Join the Top 10 FAIR Data Things Global Sprint
Ready, Set, Go! Join the Top 10 FAIR Data Things Global SprintReady, Set, Go! Join the Top 10 FAIR Data Things Global Sprint
Ready, Set, Go! Join the Top 10 FAIR Data Things Global Sprint
 
How FAIR is your data? Copyright, licensing and reuse of data
How FAIR is your data? Copyright, licensing and reuse of dataHow FAIR is your data? Copyright, licensing and reuse of data
How FAIR is your data? Copyright, licensing and reuse of data
 
Peter neish DMPs BoF eResearch 2018
Peter neish DMPs BoF eResearch 2018Peter neish DMPs BoF eResearch 2018
Peter neish DMPs BoF eResearch 2018
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

ANDS health and medical data webinar 16 May. Storing and Publishing Health and Medical Data. Jeff Christiansen

  • 1. Cloud-Based Data Storage, Computing and Sharing for Health and Medical Research Dr Jeff Christiansen, Queensland Cyber Infrastructure Foundation (QCIF) This work is licensed under the Creative Commons Attribution 4.0 International License (CC-BY-4.0). To view a copy of the license, visit https://creativecommons.org/licenses/by/4.0/
  • 2. Research Lifecycle NHMRC Statement on Data Sharing - https://www.nhmrc.gov.au/grants-funding/policy/nhmrc-statement-data-sharing
  • 3. Research Lifecycle Data is central NHMRC Statement on Data Sharing - https://www.nhmrc.gov.au/grants-funding/policy/nhmrc-statement-data-sharing
  • 4. Research Lifecycle NHMRC Statement on Data Sharing - https://www.nhmrc.gov.au/grants-funding/policy/nhmrc-statement-data-sharing Data Infrastructure Requirements: Storage Management (Organising, Sharing with collaborators) Analysis Tools Compute (Desktop, Institutional, Cloud, HPC) Dissemination of Results and Data Access (Sharing with others)
  • 5. Health and Medical research data • Includes data derived from, or directly related to, human beings. • Single human beings may be individually identifiable* in a proportion of these data. • If individually identifiable data also contains health, genetic, or biometric information, it is also considered to be sensitive# • Sensitive data carries legal and ethical responsibilities in ensuring that information is not intentionally or inadvertently disclosed to non-authorised individuals. • Everybody associated with these data (Data Custodians, Researchers, Research Collaborators and Data Infrastructure Operators) have a shared ethical responsibility to ensure harm does not come to any research participant through unauthorised release of identifiable data. • Risk management is required – how to use and share but in a suitably secure manner? Data infrastructure operators have a duty to Data Custodians and Researchers to demonstrate that they: • have appropriate levels of maturity and discipline in information security practice to store human-derived research data and • have a repertoire of administrative, physical, and technical safeguards in place to assure custodians of the security of the information. * - NHMRC National Statement on Ethical Conduct in Human Research (2007 – Updated May 2015) https://www.nhmrc.gov.au/guidelines-publications/e72 # - Privacy Act 1988 (Cth) https://www.legislation.gov.au/Series/C2004A03712
  • 6. Health and Medical research data • Includes data derived from, or directly related to, human beings. • Single human beings may be individually identifiable* in a proportion of these data. • If individually identifiable data also contains health, genetic, or biometric information, it is also considered to be sensitive# • Sensitive data carries legal and ethical responsibilities in ensuring that information is not intentionally or inadvertently disclosed to non-authorised individuals. • Data Custodians, Researchers, Research Collaborators and Data Infrastructure Operators have a shared ethical responsibility to ensure harm does not come to any research participant through unauthorised release of identifiable data. • Risk management is required – how to use and share data but in a suitably safe manner? * - NHMRC National Statement on Ethical Conduct in Human Research (2007 – Updated May 2015) https://www.nhmrc.gov.au/guidelines-publications/e72 # - Privacy Act 1988 (Cth) https://www.legislation.gov.au/Series/C2004A03712
  • 7. Health and Medical research data • Includes data derived from, or directly related to, human beings. • Single human beings may be individually identifiable* in a proportion of these data. • If individually identifiable data also contains health, genetic, or biometric information, it is also considered to be sensitive# • Sensitive data carries legal and ethical responsibilities in ensuring that information is not intentionally or inadvertently disclosed to non-authorised individuals. • Data Custodians, Researchers, Research Collaborators and Data Infrastructure Operators have a shared ethical responsibility to ensure harm does not come to any research participant through unauthorised release of identifiable data. • Risk management is required – how to use and share data but in a suitably safe manner? Data infrastructure operators have a duty to Data Custodians and Researchers to demonstrate that they: • have appropriate levels of maturity and discipline in information security practice to store human-derived research data and • have a repertoire of administrative, physical, and technical safeguards in place to assure custodians of the security of the information. * - NHMRC National Statement on Ethical Conduct in Human Research (2007 – Updated May 2015) https://www.nhmrc.gov.au/guidelines-publications/e72 # - Privacy Act 1988 (Cth) https://www.legislation.gov.au/Series/C2004A03712
  • 8. What is med.data.edu.au? Nationally-funded Data Infrastructure for Health and Medical Research Data NCRIS-funding through the RDSI (Research Data Storage Infrastructure) and RDS (Research Data Services) projects
  • 10. What is med.data.edu.au? Data Infrastructure Cloud Storage (Networked via AARNet) Management (Mediaflux, MyTardis, Aspera)
  • 11. What is med.data.edu.au? Data Infrastructure Cloud Storage (Networked via AARNet) Management (Mediaflux, MyTardis, Aspera) Compute (Nectar Research Cloud, HPC) Analysis Tools (BYO Software)
  • 12. What is med.data.edu.au? Data Infrastructure Cloud Storage (Networked via AARNet) Management (Mediaflux, MyTardis, Aspera) Compute (Nectar Research Cloud, HPC) Analysis Tools (BYO Software) Dissemination of Results and Data Access (Data Registry)
  • 13. What is med.data.edu.au? Data Infrastructure Cloud Storage (Networked via AARNet) Management (Mediaflux, MyTardis, Aspera) Compute (Nectar Research Cloud, HPC) Analysis Tools (BYO Software) Dissemination of Results and Data Access (Data Registry) Resource Library Protecting Personal Health Information in Research Legislation (Cth, All States and Territories) Codes, Policies and Best Practice (NHMRC, NIH) IT security framework (ASD Info Security Manual)
  • 14. What is med.data.edu.au? Data Infrastructure Cloud Storage (Networked via AARNet) Management (Mediaflux, MyTardis, Aspera) Compute (Nectar Research Cloud, HPC) Analysis Tools (BYO Software) Dissemination of Results and Data Access (Data Registry) Resource Library Protecting Personal Health Information in Research Legislation (Cth, All States and Territories) Codes, Policies and Best Practice (NHMRC, NIH) IT security framework (ASD Info Security Manual) Interactive Use Guide (Is med.data right for my data?)
  • 16. Who is using it? 54 Data Collections 2.6 PB (~600,000 DVDs) May 2017
  • 17. Identifiable vs. non-identifiable data The majority of 6PB data is re-identifiable/non- identifiable.
  • 18. Identifiable vs. non-identifiable data The majority of 6PB data is re-identifiable/non- identifiable. For individually identifiable data a discussion about risk management is required: • What is the sensitivity level of the data? • Use Cases: How, where and by who is the data to be used? Dictates the specifics of the IT security set-up (e.g. encryption, authentication) required.
  • 19. Identifiable vs. non-identifiable data The majority of 6PB data is re-identifiable/non- identifiable. For individually identifiable data a discussion about risk management is required: • What is the sensitivity level of the data? • Use Cases: How, where and by who is the data to be used? Dictates the specifics of the IT security set-up (e.g. encryption, authentication) required. Security policies are set by each Node Operator. Happy to discuss with Data Custodians and Institutional IT Security Officers: • Use Cases • Security set-up cf. ASD ISM Principles and Controls Australian Signals Directorate Information Security Manual https://www.asd.gov.au/infosec/ism/
  • 20. Want to know more? Contact Us Interactive Use Guide Funding Operators