Informed Consent for Secondary Research under the New NIH Data Sharing Policy

2021 ◽  
Vol 49 (3) ◽  
pp. 489-494
Author(s):  
Mark A. Rothstein

AbstractThe new NIH data sharing policy, effective January 2023, requires researchers to submit a data management and data sharing plan in their grant application. Expanded data sharing, encouraged by NIH to facilitate secondary research, will require informed consent documents to explain data sharing plans, limitations, and procedures.

2021 ◽  
pp. 019394592110292
Author(s):  
Elizabeth E. Umberfield ◽  
Sharon L. R. Kardia ◽  
Yun Jiang ◽  
Andrea K. Thomer ◽  
Marcelline R. Harris

Nurse scientists are increasingly interested in conducting secondary research using real world collections of biospecimens and health data. The purposes of this scoping review are to (a) identify federal regulations and norms that bear authority or give guidance over reuse of residual clinical biospecimens and health data, (b) summarize domain experts’ interpretations of permissions of such reuse, and (c) summarize key issues for interpreting regulations and norms. Final analysis included 25 manuscripts and 23 regulations and norms. This review illustrates contextual complexity for reusing residual clinical biospecimens and health data, and explores issues such as privacy, confidentiality, and deriving genetic information from biospecimens. Inconsistencies make it difficult to interpret, which regulations or norms apply, or if applicable regulations or norms are congruent. Tools are necessary to support consistent, expert-informed consent processes and downstream reuse of residual clinical biospecimens and health data by nurse scientists.


2015 ◽  
Vol 10 (1) ◽  
pp. 260-267 ◽  
Author(s):  
Kevin Read ◽  
Jessica Athens ◽  
Ian Lamb ◽  
Joey Nicholson ◽  
Sushan Chin ◽  
...  

A need was identified by the Department of Population Health (DPH) for an academic medical center to facilitate research using large, externally funded datasets. Barriers identified included difficulty in accessing and working with the datasets, and a lack of knowledge about institutional licenses. A need to facilitate sharing and reuse of datasets generated by researchers at the institution (internal datasets) was also recognized. The library partnered with a researcher in the DPH to create a catalog of external datasets, which provided detailed metadata and access instructions. The catalog listed researchers at the medical center and the main campus with expertise in using these external datasets in order to facilitate research and cross-campus collaboration. Data description standards were reviewed to create a set of metadata to facilitate access to both externally generated datasets, as well as the internally generated datasets that would constitute the next phase of development of the catalog. Interviews with a range of investigators at the institution identified DPH researchers as most interested in data sharing, therefore targeted outreach to this group was undertaken. Initial outreach resulted in additional external datasets being described, new local experts volunteering, proposals for additional functionality, and interest from researchers in inclusion of their internal datasets in the catalog. Despite limited outreach, the catalog has had ~250 unique page views in the three months since it went live. The establishment of the catalog also led to partnerships with the medical center’s data management core and the main university library. The Data Catalog in its present state serves a direct user need from the Department of Population Health to describe large, externally funded datasets. The library will use this initial strong community of users to expand the catalog and include internally generated research datasets. Future expansion plans will include working with DataCore and the main university library.


2007 ◽  
Vol 4 (1) ◽  
pp. 115-131
Author(s):  
Hee-Jeong Jin ◽  
Jeong-Won Lee ◽  
Hwan-Gue Cho

Summary A microarray is a principal technology in molecular biology. It generates thousands of expressions of genotypes at once. Typically, a microarray experiment contains many kinds of information, such as gene names, sequences, expression profiles, scanned images, and annotation. So, the organization and analysis of vast amounts of data are required. Microarray LIMS (Laboratory Information Management System) provides data management, search, and basic analysis. Recently, microarray joint researches, such as the skeletal system disease and anti-cancer medicine have been widely conducted. This research requires data sharing among laboratories within the joint research group. In this paper, we introduce a web based microarray LIMS, SMILE (Small and solid MIcroarray Lims for Experimenters), especially for shared data management. The data sharing function of SMILE is based on Friend-to-Friend (F2F), which is based on anonymous P2P (Peer-to-Peer), in which people connect directly with their “friends”. It only allows its friends to exchange data directly using IP addresses or digital signatures you trust. In SMILE, there are two types of friends: “service provider”, which provides data, and “client”, which is provided with data. So, the service provider provides shared data only to its clients. SMILE provides useful functions for microarray experiments, such as variant data management, image analysis, normalization, system management, project schedule management, and shared data management. Moreover, it connections with two systems: ArrayMall for analyzing microarray images and GENAW for constructing a genetic network. SMILE is available on http://neobio.cs.pusan.ac.kr:8080/smile.


Author(s):  
S Noorzuraini ◽  
M Shukri ◽  
A Amron ◽  
M Izzat ◽  
M Ramdzan ◽  
...  
Keyword(s):  

Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3458
Author(s):  
Lidia Ogiela ◽  
Marek R. Ogiela ◽  
Hoon Ko

This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of protecting and securing data against unauthorized acquisition. Data-sharing protocols will execute the tasks of securing a special type of information, i.e., data services. The area of data protection will be defined for various levels, within which will be executed the tasks of data management and protection. The authors’ solution concerning securing data with the use of cryptographic threshold techniques used to split the secret among a specified group of secret trustees, simultaneously enhanced by the application of linguistic methods of description of the shared secret, forms a new class of protocols, i.e., intelligent linguistic threshold schemes. The solutions presented in this paper referring to the service management and securing will be dedicated to various levels of data management. These levels could be differentiated both in the structure of a given entity and in its environment. There is a special example thereof, i.e., the cloud management processes. These will also be subject to the assessment of feasibility of application of the discussed protocols in these areas. Presented solutions will be based on the application of an innovative approach, in which we can use a special formal graph for the creation of a secret representation, which can then be divided and transmitted over a distributed network.


BMJ ◽  
2015 ◽  
Vol 350 (may07 31) ◽  
pp. h2146-h2146 ◽  
Author(s):  
T. Ploug ◽  
S. Holm

2003 ◽  
Vol 32 (3) ◽  
pp. 59-64 ◽  
Author(s):  
Beng Chin Ooi ◽  
Yanfeng Shu ◽  
Kian-Lee Tan

Sign in / Sign up

Export Citation Format

Share Document