Cargando…
Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness
Genome and other data are already being used in areas including cancer and rare diseases. Data-sharing and secondary uses are likely to become much broader and far more extensive; thus, obtaining proper consent for these new uses of data is an important issue. Obtaining consent through online method...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Frontiers Media S.A.
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5992519/ https://www.ncbi.nlm.nih.gov/pubmed/29910822 http://dx.doi.org/10.3389/fgene.2018.00167 |
_version_ | 1783330046465802240 |
---|---|
author | Kogetsu, Atsushi Ogishima, Soichi Kato, Kazuto |
author_facet | Kogetsu, Atsushi Ogishima, Soichi Kato, Kazuto |
author_sort | Kogetsu, Atsushi |
collection | PubMed |
description | Genome and other data are already being used in areas including cancer and rare diseases. Data-sharing and secondary uses are likely to become much broader and far more extensive; thus, obtaining proper consent for these new uses of data is an important issue. Obtaining consent through online methods may be an option to overcome the problems associated with one-off, paper-based informed consent. When the process of obtaining consent takes place remotely, authentication must be assured. Patients may also choose to store some of their own information online, such as genetic information, and allow healthcare professionals to access this data. In this health information transfer and exchange process, it is vital that anyone accessing this information be correctly authenticated to protect patients' privacy. In this article, we first clarified that authentication has two roles: i.e., not only to prevent impersonation but also to prove intent, which is a vital step to ensure that medical research and health information exchange are conducted ethically. We then set out methods of authentication. As a result, we were able to make suggestions about the requirements for authentication and a possible method of authentication for these purposes. We considered problems of biometrics and recommended two-factor authentication without biometrics as a workable solution. However, three-factor authentication including biometrics seems likely to be used once biometrics become more common. |
format | Online Article Text |
id | pubmed-5992519 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | Frontiers Media S.A. |
record_format | MEDLINE/PubMed |
spelling | pubmed-59925192018-06-15 Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness Kogetsu, Atsushi Ogishima, Soichi Kato, Kazuto Front Genet Genetics Genome and other data are already being used in areas including cancer and rare diseases. Data-sharing and secondary uses are likely to become much broader and far more extensive; thus, obtaining proper consent for these new uses of data is an important issue. Obtaining consent through online methods may be an option to overcome the problems associated with one-off, paper-based informed consent. When the process of obtaining consent takes place remotely, authentication must be assured. Patients may also choose to store some of their own information online, such as genetic information, and allow healthcare professionals to access this data. In this health information transfer and exchange process, it is vital that anyone accessing this information be correctly authenticated to protect patients' privacy. In this article, we first clarified that authentication has two roles: i.e., not only to prevent impersonation but also to prove intent, which is a vital step to ensure that medical research and health information exchange are conducted ethically. We then set out methods of authentication. As a result, we were able to make suggestions about the requirements for authentication and a possible method of authentication for these purposes. We considered problems of biometrics and recommended two-factor authentication without biometrics as a workable solution. However, three-factor authentication including biometrics seems likely to be used once biometrics become more common. Frontiers Media S.A. 2018-06-01 /pmc/articles/PMC5992519/ /pubmed/29910822 http://dx.doi.org/10.3389/fgene.2018.00167 Text en Copyright © 2018 Kogetsu, Ogishima and Kato. http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. |
spellingShingle | Genetics Kogetsu, Atsushi Ogishima, Soichi Kato, Kazuto Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness |
title | Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness |
title_full | Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness |
title_fullStr | Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness |
title_full_unstemmed | Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness |
title_short | Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness |
title_sort | authentication of patients and participants in health information exchange and consent for medical research: a key step for privacy protection, respect for autonomy, and trustworthiness |
topic | Genetics |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5992519/ https://www.ncbi.nlm.nih.gov/pubmed/29910822 http://dx.doi.org/10.3389/fgene.2018.00167 |
work_keys_str_mv | AT kogetsuatsushi authenticationofpatientsandparticipantsinhealthinformationexchangeandconsentformedicalresearchakeystepforprivacyprotectionrespectforautonomyandtrustworthiness AT ogishimasoichi authenticationofpatientsandparticipantsinhealthinformationexchangeandconsentformedicalresearchakeystepforprivacyprotectionrespectforautonomyandtrustworthiness AT katokazuto authenticationofpatientsandparticipantsinhealthinformationexchangeandconsentformedicalresearchakeystepforprivacyprotectionrespectforautonomyandtrustworthiness |