Digitization has assumed great importance due to the shortage of samples, for reasons that include biopsies and other procedures that are extremely parsimonious.
2.
For discussion of these issues see, e.g., GreenbaumD. S., “The Database Debate,”Albany Law Journal of Science & Technology13 (2003): 431–515.
3.
The information concerning CHTN is derived from its website at <http://www-chtn.ims.nci.nih.gov/purpose.html> and from EisemanE.BloomG.BrowerJ.ClancyN., and OlmsteadS.S., Case Studies of Existing Human Tissue Repositories: “Best Practices” for a Biospecimen Resource for the Genomic and Proteomic Era (Santa Monica, CA: RAND, 2003), available at <http://www.rand.org/publications/MG/MG120> (last visited January 6, 2005).
4.
The information concerning the SPIN project is derived from two NCI websites, Shared Pathology Informatics Network, at <http://www.cancerdiagnosis.nci.nih.gov/spin>, and Shared Pathology Informatics Network (SPIN), at <http://spin.nci.nih.gov/>, and from the proposal for Consented High-performance Indexing and Retrieval of Pathology Specimens (CHIRPS), I. Kohane, Principal Investigator (July 2000), available at <http://spin.nci.nih.gov/CHIRPSGrant.pdf> (last visited January 6, 2005).
XML is a flexible text format derived from SGML, the international standard metalanguage for text markup systems. Originally developed for large-scale electronic publishing, it is increasingly the standard for exchange of data on the World Wide Web and can be processed or displayed by programs and browsers on all common operating systems. See Extensible Markup Language (XML), at <http://www.w3.org/XML/> (last visited January 6, 2005).
7.
AnderlikM. R., “Commercial Biobanks and Genetic Research,”American Journal of Pharmacogenomics3 (2003): 203–15.
8.
AnderlikM. R., “Commercial Biobanks and Genetic Research: Banking Without Checks?” in KnoppersB. M., ed., Populations and Genetics: Legal and Socio-Ethical Perspectives (The Hague: Kluwer, 2003): Pp. 345–376.
9.
Typically, the term “user-based access controls” refers to password protections and other measures to limit access to authorized users. As the term suggests, “role-based access controls” limit the scope of access for authorized users based on role. For example, in a health system database, access to cells that contain psychotherapy notes might be limited to psychiatrists and psychologists.
U.S. Patent No. 6,640,211, available through USPTO Patent Full-Text and Image Database, at <http://www.uspto.gov/patft/index.html> (last visited January 6, 2005).
13.
Press Release, “First Genetic Trust Awarded $2M ATP Grant to Create Secure Genetic Data System,” (May 11, 2004), available through <http://www.firstgenetic.net/news_press.html> (last visited January 6, 2005).
14.
AdamD., “Online Tumor Bank Aims to Offer Ready Route to Tissues,”Nature416 (2002): 464; TeodorovicI.TherasseP.SpatzA.IsabelleM., and OosterhuisW., “Human Tissue Research: EORTC Recommendations on its Practical Consequences,”European Journal of Cancer39 (2003): 2256–63.
15.
OosterhuisJ. W.CoeberghJ. W., and van VeenE., “Tumour Banks: Well-guarded Treasures in the Interest of Patients,”Nature Reviews Cancer3 (2003): 73–77, at 75.
16.
ClaytonE. W., “Informed Consent and Biobanks,”The Journal of Law, Medicine & Ethics33, no. 1 (2005): 15–21.
17.
Eiseman, supra note 3, at 132–34.
18.
CHIRPS proposal, supra note 4, at 17–19. Appendix 5 of the CHIRPS grant proposal, supra note 4, puts forth these general guidelines for all requests for specimens:
19.
• Review and evaluation of the protocol is necessary to protect against the use of identifiable research data when non-identifiable data would suffice; to establish the bona fides of the requestor and the requestor's capacity to protect confidentiality; and to prevent uses of the data for purposes other than those for which they were collected without any necessary additional review.
20.
• The investigator and the party releasing the identifiable data should sign a binding research agreement specifying such matters as the terms for use and the means of maintaining confidentiality, and prohibiting re-release of identifiable data.
21.
• There should be evidence of external review and approval of the data release by an IRB or equivalent.
22.
• The researcher should be able to provide documentation that all members of the research group have been trained in confidentiality practices.
23.
AnderlikM. R. and RothsteinM. A., “Privacy and Confidentiality of Genetic Information: What Rules for the New Science?”Annual Review of Genomics & Human Genetics2 (2001): 401–33, at 402.
24.
Federal Policy for the Protection of Human Subjects, 45 C.F.R. § 46A (basic Department of Health and Human Services policy for protection of human research subjects; a number of other federal agencies have adopted similar regulations).
25.
Standards for Privacy of Individually Identifiable Information: Final Rule, 65 Fed. Reg. 82462 (Dec. 28, 2000) and 67 Fed. Reg. 53182 (Aug. 14, 2002) (codified at 45 C.F.R §§ 160, 164).
26.
45 C.F.R. § 46.102(f).
27.
Office for Human Research Protections (OHRP), Department of Health and Human Services, “Guidance on Research Involving Coded Private Information or Biological Specimens” (August 10, 2004), available atwww.hhs.gov/ohrp/humansubjects/guidance/cdebiol.pdf (last visited January 6, 2005).
28.
45 C.F.R. § 46.101(b)(4).
29.
45 C.F.R. §§ 46.111(a)(7), 46.116(a)(5).
30.
Eiseman, supra note 3, at 124.
31.
45 C.F.R. § 160.103.
32.
45 C.F.R. § 164.514(b)(2).
33.
45 C.F.R. § 164.514(c).
34.
See OHRP, supra note 23, at 7.
35.
45 C.F.R. § 164.514(e). Also, the rule permits disclosure for public health purposes, such as reporting to state disease registries, 45 C.F.R. § 164.512(b), and it is worth noting the existence of a grandfathering provision, § 45 C.F.R. 164.532.
36.
Department of Health and Human Services, “Research Repositories, Databases, and the HIPAA Privacy Rule,”available at <http://privacyruleandresearch.nih.gov/pdf/research_repositories_final.pdf>; BledsoeM., “HIPAA Models for Repositories,”International Society for Biological and Environmental Repositories (ISBER) Newsletter, available at <http://www.isber.org/Newsletters/Fall2004.pdf> (last visited January 6, 2005); AamodtR., “The Health Information [sic] Portability and Accountability Act of 1996 Privacy Rule,”International Society for Biological and Environmental Repositories (ISBER) Newsletter, Summer 2003, available at <http://www.isber.org/newweb/Newsletters/Summer2003.pdf>(last visited January 6, 2005).
37.
Eiseman, supra note 3, at 131.
38.
SweeneyL., “Weaving Technology and Policy Together to Maintain Confidentiality,”Journal of Law, Medicine & Ethics25, no. 2 & 3 (1997): 98–110.
39.
LinZ.HewettM., and AltmanR. B., “Using Binning to Maintain Confidentiality of Medical Data,”Proceedings of the American Medical Informatics Association Annual Symposium (2002): 454–58.
40.
MitchellM., “Medical Privacy Law Stirs Controversy,”Knight-Ridder Newspapers, March 3, 2003.
41.
SetnessP. A., “When Privacy and the Public Good Collide: Does the Collection of Health Data for Research Harm Individual Patients?”Postgraduate Medicine On-line113, no. 5 (May 2003), at <http://www.postgradmed.com/issues/2003/05_03/editorial_may.htm> (last visited January 6, 2005).
42.
KatyalN. K., “Digital Architecture as Crime Control,”Yale Law Journal112 (2003): 2261–89.
Department of Health and Human Services, Security Standards: Final Rule, 68 Fed. Reg. 8334 (Feb. 20, 2003) (codified at 45 C.F.R. § 160, 162, and 164).
45.
This does not mean that the security of information in other formats escapes regulatory attention. The privacy rule includes some security provisions, which would apply to all protected health information. An example would be employee training on information handling under the heading of confidentiality.
LewisM., “Digital Signatures: Meeting the Traditional Requirements Electronically,”Asper Review of International Business & Trade Law2 (2002): 63–84, at 70.
KortE. J.CampbellB., and ResauJ. H., “A Human Tissue and Data Resource: An Overview of Opportunities, Challenges, and Development of a Provider/Researcher Partnership Model,”Computer Methods and Programs in Biomedicine70 (2003): 137–50.
53.
CHIRPS proposal, supra note 4, at 23–24.
54.
AnderlikM. R., supra note 8.
55.
For example, the U.S. Computer Fraud and Abuse Act criminalizes certain activities that undermine the confidentiality, integrity, and availability of data. See GeistM., “Cyberlaw 2.0,”Boston College Law Review44 (2003): 323–58.
56.
HarmonA., “Digital Vandalism Spurs a Call for Oversight,”New York Times, Sept. 1, 2003, A1.
57.
For example, the liability framework does nothing to place restrictions on use by those who receive information in breach of a duty of confidentiality. See, e.g., JangerE. J., “Privacy, Property, Information Costs, and the Anticommons,”Hastings Law Journal54 (2003): 899–929.
58.
BoyleJ.Shamans, Software and Spleens: Law and the Construction of the Information Society (Cambridge: Harvard University Press, 1996): at 177.