SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
consenting to research

presentation to the Presidential Commission for the
             Study of Bioethical Issues

              San Francisco, CA USA
                    2/2/2012
“Privacy is about
     context, social
situations, and control.”
      - danah boyd
1. We are going to get our [genetic,
health] data, one way or another.
but we often lack agency to decide what is done
              with data about us…
(we are also going to talk about it)
in the future, anyone who wants a
copy of your genome will probably be
able to get it.
2. data
     > information
          > knowledge
              > wisdom
how do we ensure our data gets
turned into knowledge?
3. the infrastructure is just emerging.
“technology doesn’t support
    patient engagement”
my wish list

• Remove uncertainty, create incentives, training
• Safe harbor for IRB-approved experimentation
  with new models for consent (i.e. portable, fully
  identified, etc)
• Clear guidelines that harm lies in the act of
  reidentification, not act of distributing data with
  risk of reidentification (as long as done under safe
  harbor with consent)
• Matching grants for infrastructure (inarguable
  role for government)

Mais conteúdo relacionado

Semelhante a Consenting to Research

Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...ARDC
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docxtodd271
 
10 cognitive biases that distorts your thinking
10 cognitive biases that distorts your thinking10 cognitive biases that distorts your thinking
10 cognitive biases that distorts your thinkingCol Mukteshwar Prasad
 
Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdf
Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdfModule 6 DiscussionIntroductionData ethics is a branch of ethics.pdf
Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdfsaxenaavnish1
 
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...Dana Gardner
 
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldAnonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldTed Myerson
 
RachelWhat supporting content does Dr. Koonjbearry provide.docx
RachelWhat supporting content does Dr. Koonjbearry provide.docxRachelWhat supporting content does Dr. Koonjbearry provide.docx
RachelWhat supporting content does Dr. Koonjbearry provide.docxaudeleypearl
 
Meyer rsf summer workshop-6-12-17 final
Meyer rsf summer workshop-6-12-17 finalMeyer rsf summer workshop-6-12-17 final
Meyer rsf summer workshop-6-12-17 finalMichelle N. Meyer
 
SXSW 2012 - Big Data Conversation
SXSW 2012 - Big Data ConversationSXSW 2012 - Big Data Conversation
SXSW 2012 - Big Data Conversationjohn st.
 
Technological progress: blessing or curse? (2012)
Technological progress: blessing or curse? (2012)Technological progress: blessing or curse? (2012)
Technological progress: blessing or curse? (2012)Andrea Boggio
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionIOSR Journals
 
Running head Ethical concerns in ComputingEthical concerns in C.docx
Running head Ethical concerns in ComputingEthical concerns in C.docxRunning head Ethical concerns in ComputingEthical concerns in C.docx
Running head Ethical concerns in ComputingEthical concerns in C.docxcharisellington63520
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPMicah Altman
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021andygustafson
 
Hit Conference Flyer 2012 6.26
Hit Conference Flyer 2012 6.26Hit Conference Flyer 2012 6.26
Hit Conference Flyer 2012 6.26kcheaney
 
Designing Effective Science Communication
Designing Effective Science CommunicationDesigning Effective Science Communication
Designing Effective Science CommunicationJennifer Briselli
 
Managing Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and ApproachesManaging Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and ApproachesMicah Altman
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 

Semelhante a Consenting to Research (20)

Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 
10 cognitive biases that distorts your thinking
10 cognitive biases that distorts your thinking10 cognitive biases that distorts your thinking
10 cognitive biases that distorts your thinking
 
Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdf
Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdfModule 6 DiscussionIntroductionData ethics is a branch of ethics.pdf
Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdf
 
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...
 
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldAnonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
 
RachelWhat supporting content does Dr. Koonjbearry provide.docx
RachelWhat supporting content does Dr. Koonjbearry provide.docxRachelWhat supporting content does Dr. Koonjbearry provide.docx
RachelWhat supporting content does Dr. Koonjbearry provide.docx
 
Meyer rsf summer workshop-6-12-17 final
Meyer rsf summer workshop-6-12-17 finalMeyer rsf summer workshop-6-12-17 final
Meyer rsf summer workshop-6-12-17 final
 
SXSW 2012 - Big Data Conversation
SXSW 2012 - Big Data ConversationSXSW 2012 - Big Data Conversation
SXSW 2012 - Big Data Conversation
 
Technological progress: blessing or curse? (2012)
Technological progress: blessing or curse? (2012)Technological progress: blessing or curse? (2012)
Technological progress: blessing or curse? (2012)
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
2010 opensciencepeterson
2010 opensciencepeterson2010 opensciencepeterson
2010 opensciencepeterson
 
Running head Ethical concerns in ComputingEthical concerns in C.docx
Running head Ethical concerns in ComputingEthical concerns in C.docxRunning head Ethical concerns in ComputingEthical concerns in C.docx
Running head Ethical concerns in ComputingEthical concerns in C.docx
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
 
Hit Conference Flyer 2012 6.26
Hit Conference Flyer 2012 6.26Hit Conference Flyer 2012 6.26
Hit Conference Flyer 2012 6.26
 
Designing Effective Science Communication
Designing Effective Science CommunicationDesigning Effective Science Communication
Designing Effective Science Communication
 
Ethics and Data
Ethics and DataEthics and Data
Ethics and Data
 
Managing Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and ApproachesManaging Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and Approaches
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 

Mais de john wilbanks

Generic Visual Consent Template
Generic Visual Consent TemplateGeneric Visual Consent Template
Generic Visual Consent Templatejohn wilbanks
 
Sage Bionetworks consent overview - November 2017
Sage Bionetworks consent overview - November 2017Sage Bionetworks consent overview - November 2017
Sage Bionetworks consent overview - November 2017john wilbanks
 
PD app consent wireframe May 8 2014
PD app consent wireframe May 8 2014PD app consent wireframe May 8 2014
PD app consent wireframe May 8 2014john wilbanks
 
mPower consent screenshots
mPower consent screenshotsmPower consent screenshots
mPower consent screenshotsjohn wilbanks
 
Informed Consent in the Mobile World
Informed Consent in the Mobile WorldInformed Consent in the Mobile World
Informed Consent in the Mobile Worldjohn wilbanks
 
Participant-Centered Consent Toolkit Overview
Participant-Centered Consent Toolkit OverviewParticipant-Centered Consent Toolkit Overview
Participant-Centered Consent Toolkit Overviewjohn wilbanks
 
A New Model for Informed Consent - Participant Centered Consent - Broad Insti...
A New Model for Informed Consent - Participant Centered Consent - Broad Insti...A New Model for Informed Consent - Participant Centered Consent - Broad Insti...
A New Model for Informed Consent - Participant Centered Consent - Broad Insti...john wilbanks
 
A New Model for Informed Consent: The Impact of Open Science on the Responsib...
A New Model for Informed Consent: The Impact of Open Science on the Responsib...A New Model for Informed Consent: The Impact of Open Science on the Responsib...
A New Model for Informed Consent: The Impact of Open Science on the Responsib...john wilbanks
 
Electronic Data Methods Forum - Portable Consent 2.0
Electronic Data Methods Forum - Portable Consent 2.0Electronic Data Methods Forum - Portable Consent 2.0
Electronic Data Methods Forum - Portable Consent 2.0john wilbanks
 
Portable Informed Consent
Portable Informed ConsentPortable Informed Consent
Portable Informed Consentjohn wilbanks
 
Let's Pool Our Medical Data
Let's Pool Our Medical DataLet's Pool Our Medical Data
Let's Pool Our Medical Datajohn wilbanks
 
Living well through data
Living well through data Living well through data
Living well through data john wilbanks
 
PLC User Upload Wireframes v1
PLC User Upload Wireframes v1PLC User Upload Wireframes v1
PLC User Upload Wireframes v1john wilbanks
 
Wireframe public oct 2011
Wireframe public oct 2011Wireframe public oct 2011
Wireframe public oct 2011john wilbanks
 
Consent to research
Consent to research  Consent to research
Consent to research john wilbanks
 
It's the Customer, Not the Container
It's the Customer, Not the ContainerIt's the Customer, Not the Container
It's the Customer, Not the Containerjohn wilbanks
 

Mais de john wilbanks (16)

Generic Visual Consent Template
Generic Visual Consent TemplateGeneric Visual Consent Template
Generic Visual Consent Template
 
Sage Bionetworks consent overview - November 2017
Sage Bionetworks consent overview - November 2017Sage Bionetworks consent overview - November 2017
Sage Bionetworks consent overview - November 2017
 
PD app consent wireframe May 8 2014
PD app consent wireframe May 8 2014PD app consent wireframe May 8 2014
PD app consent wireframe May 8 2014
 
mPower consent screenshots
mPower consent screenshotsmPower consent screenshots
mPower consent screenshots
 
Informed Consent in the Mobile World
Informed Consent in the Mobile WorldInformed Consent in the Mobile World
Informed Consent in the Mobile World
 
Participant-Centered Consent Toolkit Overview
Participant-Centered Consent Toolkit OverviewParticipant-Centered Consent Toolkit Overview
Participant-Centered Consent Toolkit Overview
 
A New Model for Informed Consent - Participant Centered Consent - Broad Insti...
A New Model for Informed Consent - Participant Centered Consent - Broad Insti...A New Model for Informed Consent - Participant Centered Consent - Broad Insti...
A New Model for Informed Consent - Participant Centered Consent - Broad Insti...
 
A New Model for Informed Consent: The Impact of Open Science on the Responsib...
A New Model for Informed Consent: The Impact of Open Science on the Responsib...A New Model for Informed Consent: The Impact of Open Science on the Responsib...
A New Model for Informed Consent: The Impact of Open Science on the Responsib...
 
Electronic Data Methods Forum - Portable Consent 2.0
Electronic Data Methods Forum - Portable Consent 2.0Electronic Data Methods Forum - Portable Consent 2.0
Electronic Data Methods Forum - Portable Consent 2.0
 
Portable Informed Consent
Portable Informed ConsentPortable Informed Consent
Portable Informed Consent
 
Let's Pool Our Medical Data
Let's Pool Our Medical DataLet's Pool Our Medical Data
Let's Pool Our Medical Data
 
Living well through data
Living well through data Living well through data
Living well through data
 
PLC User Upload Wireframes v1
PLC User Upload Wireframes v1PLC User Upload Wireframes v1
PLC User Upload Wireframes v1
 
Wireframe public oct 2011
Wireframe public oct 2011Wireframe public oct 2011
Wireframe public oct 2011
 
Consent to research
Consent to research  Consent to research
Consent to research
 
It's the Customer, Not the Container
It's the Customer, Not the ContainerIt's the Customer, Not the Container
It's the Customer, Not the Container
 

Último

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 

Último (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 

Consenting to Research

  • 1. consenting to research presentation to the Presidential Commission for the Study of Bioethical Issues San Francisco, CA USA 2/2/2012
  • 2. “Privacy is about context, social situations, and control.” - danah boyd
  • 3. 1. We are going to get our [genetic, health] data, one way or another.
  • 4. but we often lack agency to decide what is done with data about us…
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. (we are also going to talk about it)
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. in the future, anyone who wants a copy of your genome will probably be able to get it.
  • 17. 2. data > information > knowledge > wisdom
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. how do we ensure our data gets turned into knowledge?
  • 25.
  • 26. 3. the infrastructure is just emerging.
  • 27. “technology doesn’t support patient engagement”
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. my wish list • Remove uncertainty, create incentives, training • Safe harbor for IRB-approved experimentation with new models for consent (i.e. portable, fully identified, etc) • Clear guidelines that harm lies in the act of reidentification, not act of distributing data with risk of reidentification (as long as done under safe harbor with consent) • Matching grants for infrastructure (inarguable role for government)

Notas do Editor

  1. control over informationhuman dignityintimacyrestricted accessharm preventionexploitationdiscrimination