Professor John Bacon-Shone Director, Social Sciences Research Centre & Chair, Human Research Ethics Committee The University of Hong Kong Re-identification.

Slides:



Advertisements
Similar presentations
Anonymous Services, Hard to Reach Participants, and Issues around Outcome Evaluation Centre for Community Based Research United Way of Peel Region Roundtable.
Advertisements

Alberto Camacho Jessica George Maria Moya Rekeisha Scott Stephanie Williams Group B:
Standards Unit N9: Evaluating Directed Number Statements
StormingForce.com Motion. StormingForce.com StormingForce’s technology is significantly increasing productivity and quality of manual repetitive tasks.
G544 DEBATES: Determinism vs Freewill
Janine McElroy Ben Tieniber Chris Herr
CHAPTER 3 THE ETHICS AND POLITICS OF SOCIAL RESEARCH.
DNA FINGERPRINTING - AN ETHICAL ISSUE?. Student Activity  Who discovered DNA? and at which university?  What is DNA?  In what year do you think DNA.
Protecting Participants in a Global Research Community Dr. Jane Kaye University of Oxford, UK.
Evaluating Hypotheses Chapter 9. Descriptive vs. Inferential Statistics n Descriptive l quantitative descriptions of characteristics.
Chapter 7 Sampling and Sampling Distributions
Evaluating Hypotheses Chapter 9 Homework: 1-9. Descriptive vs. Inferential Statistics n Descriptive l quantitative descriptions of characteristics ~
Database Design Concepts Info 1408 Lecture 2 An Introduction to Data Storage.
FERPA Overview for CANR Business Managers Rob Kent, MSU Assistant General Counsel October 7, 2014.
Social Research Methods: Qualitative and Quantitative Approaches, 5e This multimedia product and its contents are protected under copyright law. The following.
Ch. 9 Fundamental of Hypothesis Testing
Research Methods.
Database Design Concepts Info 1408 Lecture 2 An Introduction to Data Storage.
EVIDENCE BASED MEDICINE
HL2 MARKETING THEORY: QUANTITATIVE MARKET RESEARCH IB BUSINESS & MANAGEMENT A COURSE COMPANION.
Identity Management What is it? Why? Responsibilities? Bill Weems Academic Computing University of Texas Health Science Center at Houston.
Selecting Researchable Topics and Questions
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
ADVANCE DIRECTIVES PLANNING FOR MEDICAL CARE IN THE EVENT OF LOSS OF DECISION-MAKING ABILITY.
Sampling. Concerns 1)Representativeness of the Sample: Does the sample accurately portray the population from which it is drawn 2)Time and Change: Was.
SOCW 671 #3 Research Ethics and Diversity. Class Session Objectives Selecting and informing persons participating in research Preventing and detecting.
Section 3. Double Blind - Neither the subjects nor the people working with them know which treatment each subject is receiving Block Design - A block.
Testing Theories: Three Reasons Why Data Might not Match the Theory Psych 437.
Copyright © 2008 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. John W. Creswell Educational Research: Planning,
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Document Editing PCS Lesson 4. Objectives List situations that require you to edit and undo documentation Demonstrate how to edit your documentation Demonstrate.
1 Accurate See previous slides Complete See previous slides Up-to-date See previous slides RelevantInformation should not include data that is not needed.
Canadian English LING 202, Fall 2007 Dr. Tony Pi Research Ethics.
DNA & Proteins B3a.
Family Educational Rights and Privacy Act (FERPA) UNION COLLEGE.
Audit Sampling: An Overview and Application to Tests of Controls
DNA Profiling. What is DNA? DNA stands for Deoxyribo-Nucleic Acid –A chemical found in every cell of our bodies –Carries genetic information from one.
Alastair R. Beresford Frank Stajano University of Cambridge Presented by Arcadiy Kantor — CS4440 September 13, 2007.
Friends Chat. Friends Chat on Voice Voice Chat Friends Chat is a full bodied, well researched, complete user interface for subscribers to talk/ chat.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 8-1 Chapter Eight Audit Sampling: An Overview and Application.
Copyright © 2007 Pearson Education Canada 7-1 Chapter 7: Audit Planning and Documentation.
Creating Open Data whilst maintaining confidentiality Philip Lowthian, Caroline Tudor Office for National Statistics 1.
SINGING FROM THE SAME HYMN SHEET Address to SATS Study Day 29 June 2013 Dr Sue Armstrong.
Bangor Transfer Abroad Programme Marketing Research SAMPLING (Zikmund, Chapter 12)
Anonymity and Privacy Issues --- re-identification
5-6-1 Unit 6: Ethical considerations After completing this unit, you should be able to: Understand the basic ethical principles of working with.
Chapter 6 Designing Experiments. Is it ethical? A promising new drug has been developed for treating cancer in humans. Researchers want to administer.
Evaluation Research Dr. Guerette. Introduction Evaluation Research – Evaluation Research – The purpose is to evaluate the impact of policies The purpose.
My life, my style and my culture College students from Hispanic and Caucasian families differ: How are the differences useful in understanding how families.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
SAMPLING DISTRIBUTION OF MEANS & PROPORTIONS. SAMPLING AND SAMPLING VARIATION Sample Knowledge of students No. of red blood cells in a person Length of.
Optimal Database Marketing Drozdenko & Drake, ©
Market Analysis 1 To ensure success, the entrepreneur needs to understand the industry and the market. He or she should define areas of analysis and conduct.
BUSINESS MANAGEMENT – HIGHER BUSINESS ENTERPRISE Business in Contemporary Society Business Objectives.
Sampling Design and Analysis MTH 494 Ossam Chohan Assistant Professor CIIT Abbottabad.
Section 3 Opportunities Applicant Registration Instructions.
UNIT III. A managerial problem can be described as the gap between a given current state of affairs and a future desired state. Problem solving may then.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall Statistics for Business and Economics 8 th Edition Chapter 9 Hypothesis Testing: Single.
Chapter 6 Sampling and Sampling Distributions
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
Introduction Ms. Binns.  Distinguish between qualitative and quantitative data  Explain strengths and limitations of a qualitative approach to research.
Independent Centre for Privacy Protection Schleswig-Holstein
The Cost of Free Lesson 4-4.
Elements of Reasoning:
SAMPLING (Zikmund, Chapter 12).
Data Management Ethical considerations for educational research
Chapter 4 Summary.
Chapter 8 SAMPLING and SAMPLING METHODS
Year 13 BTEC National Extended Certificate Information Technology
Presentation transcript:

Professor John Bacon-Shone Director, Social Sciences Research Centre & Chair, Human Research Ethics Committee The University of Hong Kong Re-identification and Privacy risk Asian Privacy Scholars Network: July 2013

Introduction Ethics committees in universities generally assume that once personal data has been anonymized, it is no longer personal data, so the privacy risk is permanently addressed Recent papers suggest that this is not necessarily a wise assumption! I wish to examine the issue of re-identification and what it means for privacy, confidentiality and research ethics

Asian Privacy Scholars Network: July 2013 Anonymity Seems the most difficult ethical concept for academics to fully grasp. The dictionary says: Anonymous: not named or identified But most people think it just means not named, so for example, if I interview you, but do not record your name, they think it is anonymous, even if I know who you are or you make statements in the interview record that implicitly identify you What is much more tricky is that anonymity may not be static: being anonymous today does not necessarily mean being anonymous tomorrow

Asian Privacy Scholars Network: July 2013 Personal Identifier (PDPO) The ordinance states that: “Personal Identifier” means an identifier that is assigned to an individual by a data user for the purpose of the operations of the user and that uniquely identifies that individual in relation to the data user, but does not include an individual's name used to identify that individual While the assignment of a “personal identifier” may provide a certain degree of anonymity, its effectiveness relies on the data user taking the necessary action. For example, if a hospital uses the patient’s ID card number to identify the patient, the desired degree of anonymity will not be attained.

Asian Privacy Scholars Network: July 2013 Personal Identifier (my version) Personal Identifier means an identifier, other than name, that uniquely identifies some (but maybe not all) individuals in a specified population Clearly, the existence of a personal identifier does not mean we have anonymity for all individuals. Some privacy risk therefore exists. The evaluation of such privacy risk requires knowing both the chance of re-identification of individuals and the consequences. Next, let’s examine the chance of re-identification

Asian Privacy Scholars Network: July 2013 Chance of re-identification This can be separated into 2 elements: 1) Chance of uniqueness 2) Ease of matching

Asian Privacy Scholars Network: July 2013 Chance of uniqueness The chance of uniqueness depends on both the identifier and the population The more variables in the dataset and the more possible values for each variable, the more likely that the identifier is unique for some individuals. Hence the concern about Big Data and the development of much larger datasets. A smaller population (e.g. identical twins in Hong Kong) has a much greater chance of uniqueness than a large population. Note that DNA profile may not be unique (identical twins) and the matching can be indirect using the similarities of DNA within families.

Asian Privacy Scholars Network: July 2013 Ease of matching The ease of matching means how easily can we match the identifier back to a specific person. Let us consider some examples: ID card number: here the risk of matching is high, because the government has enabled leakage of matching information (e.g. Company Registry) DNA profile: the risk of matching should be low, unless you or family members have provided DNA profiles to a registry (see later discussion) Date and time of admission to a specific hospital: would allow matching with hospital records, if they can be accessed

Asian Privacy Scholars Network: July 2013 Ease of matching Recent publications have discussed the possibility of matching becoming easier with time, for example: Data leakage: Individuals make DNA profiles public, making it increasingly possible to use familial matches to match individuals or surnames Arrested individuals are often required to provide DNA profiles that are not erased even if innocent ID card numbers are leaked from websites, making it even easier to match to names.

Asian Privacy Scholars Network: July 2013 Ease of matching Linkage of the identifier to individual characteristics: Hospital admission: If it is known that you were involved in a traffic accident, your hospital admission soon afterward near to the accident location becomes likely, increasing the ease of matching to hospital records. DNA: Researchers are developing methods to predict personal characteristics from DNA profiles, such as eye, skin and hair colour, so ease is likely to increase

Asian Privacy Scholars Network: July 2013 Value of matching Need to consider the reason of matching: Authentication – need to be able to match against an identifier carried by the individual such as ID card Matching other records – need only to match internally, so no need to use an identifier usable externally, greatly reducing the risk of unintended matching

Asian Privacy Scholars Network: July 2013 Consequences of re-identification Can range from the trivial (e.g. customer of a clothing retail outlet) to the serious (e.g. HIV status), but the full consequences cannot always be predicted While it is possible to change some identifiers (e.g. ID card number, mobile phone number), it is impossible to change other identifiers (e.g. DNA profile), so long term risk needs to be recognized and addressed

Asian Privacy Scholars Network: July 2013 Implications of re-identification Arguably unethical to promise: Zero risk – mistakes can always happen Future risk is same as current risk – technology and circumstances change; ease of matching continues to increase, especially for biological markers Need to review use of identifiers – what seemed privacy safe in the past may not be safe in the future, so need to continue to review privacy risk