Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2023 Oct;8(10):e013092.
doi: 10.1136/bmjgh-2023-013092.

Multiple modes of data sharing can facilitate secondary use of sensitive health data for research

Affiliations
Review

Multiple modes of data sharing can facilitate secondary use of sensitive health data for research

Tsaone Tamuhla et al. BMJ Glob Health. 2023 Oct.

Abstract

Evidence-based healthcare relies on health data from diverse sources to inform decision-making across different domains, including disease prevention, aetiology, diagnostics, therapeutics and prognosis. Increasing volumes of highly granular data provide opportunities to leverage the evidence base, with growing recognition that health data are highly sensitive and onward research use may create privacy issues for individuals providing data. Concerns are heightened for data without explicit informed consent for secondary research use. Additionally, researchers-especially from under-resourced environments and the global South-may wish to participate in onward analysis of resources they collected or retain oversight of onward use to ensure ethical constraints are respected. Different data-sharing approaches may be adopted according to data sensitivity and secondary use restrictions, moving beyond the traditional Open Access model of unidirectional data transfer from generator to secondary user. We describe collaborative data sharing, facilitating research by combining datasets and undertaking meta-analysis involving collaborating partners; federated data analysis, where partners undertake synchronous, harmonised analyses on their independent datasets and then combine their results in a coauthored report, and trusted research environments where data are analysed in a controlled environment and only aggregate results are exported. We review how deidentification and anonymisation methods, including data perturbation, can reduce risks specifically associated with health data secondary use. In addition, we present an innovative modularised approach for building data sharing agreements incorporating a more nuanced approach to data sharing to protect privacy, and provide a framework for building the agreements for each of these data-sharing scenarios.

Keywords: Health policies and all other topics; Public Health.

PubMed Disclaimer

Conflict of interest statement

Competing interests: None declared.

Figures

Figure 1
Figure 1. Direct sharing. Unidirectional transfer of resources from generator to consumer. The consumer performs data analysis and generates the research output.
Figure 2
Figure 2. Collaborative meta-analysis. Generators combine their resources and do a joint meta-analysis on the combined dataset. The generators do a joint analysis and generate a collaborative research output.
Figure 3
Figure 3. Federated analysis. Researchers independently conduct the same analysis on their own datasets and then combine their analysis outputs. Only the independently generated analysis results are combined in a joint research output.
Figure 4
Figure 4. Trusted Research Environment. Researchers register for an account that allows them access to a dataset on a secure platform where they can run analyses and generate outputs, but can only download and take away the outputs of the analyses without copying, downloading or retaining the raw data. Researchers generate independent analyses and research outputs from a common data source.

References

    1. Bittencourt MS. From evidence-based medicine to precision health: using data to personalize care. Arq Bras Cardiol. 2018;111:762–3. doi: 10.5935/abc.20180240. - DOI - PMC - PubMed
    1. Guyatt G, Cairns J, Churchill D. Evidence-based medicine: a new approach to teaching the practice of medicine. JAMA. 1992;268:2420–5. doi: 10.1001/jama.1992.03490170092032. - DOI - PubMed
    1. Bloomrosen M, Detmer DE. Informatics, evidence-based care, and research; implications for national policy: a report of an American Medical Informatics Association health policy conference. J Am Med Inform Assoc. 2010;17:115–23. doi: 10.1136/jamia.2009.001370. - DOI - PMC - PubMed
    1. Afraid of Scooping – Case Study on Researcher Strategies against Fear of Scooping in the Context of Open Science. [27-Apr-2018]. https://datascience.codata.org/articles/10.5334/dsj-2017-029/ Available. Accessed. - DOI
    1. Munos B. Lessons from 60 years of pharmaceutical innovation. Nat Rev Drug Discov. 2009;8:959–68. doi: 10.1038/nrd2961. - DOI - PubMed

LinkOut - more resources