Cargando…

Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness

Genome and other data are already being used in areas including cancer and rare diseases. Data-sharing and secondary uses are likely to become much broader and far more extensive; thus, obtaining proper consent for these new uses of data is an important issue. Obtaining consent through online method...

Descripción completa

Detalles Bibliográficos
Autores principales: Kogetsu, Atsushi, Ogishima, Soichi, Kato, Kazuto
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Frontiers Media S.A. 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5992519/
https://www.ncbi.nlm.nih.gov/pubmed/29910822
http://dx.doi.org/10.3389/fgene.2018.00167
_version_ 1783330046465802240
author Kogetsu, Atsushi
Ogishima, Soichi
Kato, Kazuto
author_facet Kogetsu, Atsushi
Ogishima, Soichi
Kato, Kazuto
author_sort Kogetsu, Atsushi
collection PubMed
description Genome and other data are already being used in areas including cancer and rare diseases. Data-sharing and secondary uses are likely to become much broader and far more extensive; thus, obtaining proper consent for these new uses of data is an important issue. Obtaining consent through online methods may be an option to overcome the problems associated with one-off, paper-based informed consent. When the process of obtaining consent takes place remotely, authentication must be assured. Patients may also choose to store some of their own information online, such as genetic information, and allow healthcare professionals to access this data. In this health information transfer and exchange process, it is vital that anyone accessing this information be correctly authenticated to protect patients' privacy. In this article, we first clarified that authentication has two roles: i.e., not only to prevent impersonation but also to prove intent, which is a vital step to ensure that medical research and health information exchange are conducted ethically. We then set out methods of authentication. As a result, we were able to make suggestions about the requirements for authentication and a possible method of authentication for these purposes. We considered problems of biometrics and recommended two-factor authentication without biometrics as a workable solution. However, three-factor authentication including biometrics seems likely to be used once biometrics become more common.
format Online
Article
Text
id pubmed-5992519
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher Frontiers Media S.A.
record_format MEDLINE/PubMed
spelling pubmed-59925192018-06-15 Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness Kogetsu, Atsushi Ogishima, Soichi Kato, Kazuto Front Genet Genetics Genome and other data are already being used in areas including cancer and rare diseases. Data-sharing and secondary uses are likely to become much broader and far more extensive; thus, obtaining proper consent for these new uses of data is an important issue. Obtaining consent through online methods may be an option to overcome the problems associated with one-off, paper-based informed consent. When the process of obtaining consent takes place remotely, authentication must be assured. Patients may also choose to store some of their own information online, such as genetic information, and allow healthcare professionals to access this data. In this health information transfer and exchange process, it is vital that anyone accessing this information be correctly authenticated to protect patients' privacy. In this article, we first clarified that authentication has two roles: i.e., not only to prevent impersonation but also to prove intent, which is a vital step to ensure that medical research and health information exchange are conducted ethically. We then set out methods of authentication. As a result, we were able to make suggestions about the requirements for authentication and a possible method of authentication for these purposes. We considered problems of biometrics and recommended two-factor authentication without biometrics as a workable solution. However, three-factor authentication including biometrics seems likely to be used once biometrics become more common. Frontiers Media S.A. 2018-06-01 /pmc/articles/PMC5992519/ /pubmed/29910822 http://dx.doi.org/10.3389/fgene.2018.00167 Text en Copyright © 2018 Kogetsu, Ogishima and Kato. http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
spellingShingle Genetics
Kogetsu, Atsushi
Ogishima, Soichi
Kato, Kazuto
Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness
title Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness
title_full Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness
title_fullStr Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness
title_full_unstemmed Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness
title_short Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness
title_sort authentication of patients and participants in health information exchange and consent for medical research: a key step for privacy protection, respect for autonomy, and trustworthiness
topic Genetics
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5992519/
https://www.ncbi.nlm.nih.gov/pubmed/29910822
http://dx.doi.org/10.3389/fgene.2018.00167
work_keys_str_mv AT kogetsuatsushi authenticationofpatientsandparticipantsinhealthinformationexchangeandconsentformedicalresearchakeystepforprivacyprotectionrespectforautonomyandtrustworthiness
AT ogishimasoichi authenticationofpatientsandparticipantsinhealthinformationexchangeandconsentformedicalresearchakeystepforprivacyprotectionrespectforautonomyandtrustworthiness
AT katokazuto authenticationofpatientsandparticipantsinhealthinformationexchangeandconsentformedicalresearchakeystepforprivacyprotectionrespectforautonomyandtrustworthiness