PRIVACY ENHANCEMENT IN DATA MANAGEMENT IN E-HEALTH for GENomic Medicine IST
The Consortium Custodix N.V., Belgium (project co-ordinator) Trust Service Provider (Privacy Enhancing Technologies) VITAMIB SARL, France “Dot-Com” Research Organisation with experience in Genetic Medicine
The Project PRIDEH-GEN : PRIvacy enhancement in Data management in E-Health in Genetic Medicine IST Starting Date: Duration 18 months Efforts:21 Manmonths Type of project: Accompanying measure url=
The Project PRIDEHINFOGENE PRIDEH-GEN
INFOGENE INteractive platform FOr personal GENEtic profile construction, decision support IST Starting Date: Duration 36 months Research
INFOGENE Objectives INFOGENE server –GeneKiosk: public genetic web kiosk –InfoGenie: intelligent personal advisor –GeneStudio: design & verify user interaction Towards citizens and healthcare professionals Genetic risk advice / Knowledge
PRIDEH PRIDEH: PRIvacy enhancement in Data management in E-Health IST Starting Date: Duration 24 months Efforts: 62 Manmonths Type of project: Take-up (Trials) url=
What is a Take-Up project ? Builds on services/products already available Take up by the market is perceived as slow Better acceptance and take-up through the project Pre Take-Up Take-Up Increased Use & Deployment
Take-up Focus Lowering of threshold for deployment of PETs Highlight the added value of PETs –Information unblocking –Privacy protection, legal added value Trust in TTP based PET service provision through QA Legal framework (legal experts)
Degrees of Identifiability First order identifiability –Direct linkage to nominative values. Second order identifiability –Information hidden in data records. –Correlation between data records.
Role of PET Privacy Protection Legitimate Processing of Sensitive Information Legitimate Processing of Sensitive Information e-Privacy Enhancing Techniques
Privacy Enhancing Techniques (P.E.T.s) Prohibiting creators and maintainers of information from disclosing it to inappropriate parties. Preventing the unauthorized or inappropriate (direct or indirect) establishment of a person’s or an organization’s identity. APPROACH E-Privacy includes the right of individuals and organisations to determine for themselves when, how and to what extent information about them is communicated to others Examples of P.E.T.s: Anonymisation, Pseudonymisation, Controlled Database Pollution, Proxy-services and Privacy Enhanced Intelligent Software Agents No Information Exchange P.E.T.s
Sources No storage All traffic between entities is encrypted & entities authenticate each other Registers PPE Privacy Processing Engine Processing is based on Cryptographic techniques
Pseudonymisation Server Secure HTTP Server Pseudonymisation TTP CUSTODIX HTTP Server Register Sources The Interactive Data Collection Model
Genomic Data Privacy New Issues: determine degree of identifiability. (Infogene-Vitamib, Prof. Dr. G. Brugal) Advanced Knowledge Discovery technology (A.I., pattern detection, neural networks, self learning systems, intelligent agents) Intelligent PETs (PRIDEH-Custodix, Prof. Dr. G. De Moor)
PRIDEH-GEN WP 1: Management and co-ordination WP 2: Inventory of the Techniques –D 2.1: Inventory Report on Privacy Enhancing Techniques (Sept. 2003). –By Custodix (Belgium), PRIDEH WP 3: Inventory of the Needs –D 3.1: Inventory of the Privacy Protection Needs (Sept. 2003) –By INFOGENE, Vitamib (France) WP 4: Production of the Guidelines & Dissemination. –D 4.1: Privacy Protection Guidelines for Genomic Medicine (Dec 2003)
Contact Address CUSTODIX (Project Co-ordination) Phone: Fax:
Thanks for listening With privacy in mind....