11
Privacy & Privacy & Confidentiality Confidentiality in Internet in Internet Research Research Jeffrey M. Cohen, Ph.D. Jeffrey M. Cohen, Ph.D. Associate Dean, Associate Dean, Responsible Conduct of Research Responsible Conduct of Research Weill Medical College of Cornell Weill Medical College of Cornell University University

Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean,

  • Upload
    damian

  • View
    30

  • Download
    0

Embed Size (px)

DESCRIPTION

Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell University. IRB Issues. Research on the Internet presents new concerns to the traditional IRB issues of privacy & confidentiality - PowerPoint PPT Presentation

Citation preview

Page 1: Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean,

Privacy & Privacy & Confidentiality in Confidentiality in Internet ResearchInternet Research

Jeffrey M. Cohen, Ph.D.Jeffrey M. Cohen, Ph.D.Associate Dean,Associate Dean,

Responsible Conduct of ResearchResponsible Conduct of ResearchWeill Medical College of Cornell UniversityWeill Medical College of Cornell University

Page 2: Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean,

IRB IssuesIRB Issues

Research on the Internet presents new Research on the Internet presents new concerns to the traditional IRB issues of concerns to the traditional IRB issues of privacy & confidentialityprivacy & confidentiality

Privacy concerns relate to whether Privacy concerns relate to whether Internet activity Internet activity – Is identifiableIs identifiable– Constitutes public or private behavior Constitutes public or private behavior

Confidentiality concerns relate to Confidentiality concerns relate to inappropriate disclosure of information inappropriate disclosure of information obtained over the Internetobtained over the Internet

Page 3: Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean,

PrivacyPrivacy

Identifiable vs. AnonymousIdentifiable vs. Anonymous– Online participants usually use Online participants usually use

pseudonyms (screen names, handles, pseudonyms (screen names, handles, etc.)etc.)

– Although not publicly linked to actual Although not publicly linked to actual names, identities can often be “readily names, identities can often be “readily ascertained” (e.g., using search engine)ascertained” (e.g., using search engine)

– People’s online identity may be as People’s online identity may be as important to them as their actual identity important to them as their actual identity

Page 4: Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean,

PrivacyPrivacy

Public vs. Private BehaviorPublic vs. Private Behavior– Most online activity is open to the publicMost online activity is open to the public– Federal regulations base the definition Federal regulations base the definition

of “private information” on the subjects’ of “private information” on the subjects’ “reasonable expectation” of privacy“reasonable expectation” of privacy

– In many situations (e.g., chat rooms), In many situations (e.g., chat rooms), participants expect privacy and don’t participants expect privacy and don’t expect their activity to be studiedexpect their activity to be studied

– Determination of privacy more Determination of privacy more complicated than it seemscomplicated than it seems

Page 5: Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean,

ConfidentialityConfidentiality

Two potential sources of breach of Two potential sources of breach of confidentialityconfidentiality– inadvertent disclosureinadvertent disclosure

Investigator who sent out research database to entire Investigator who sent out research database to entire ListservListserv

Investigator who’s computer was stolenInvestigator who’s computer was stolen

– deliberate attempts to gain accessdeliberate attempts to gain access No recorded incidents of hacking research dataNo recorded incidents of hacking research data

Technology can provide reasonable Technology can provide reasonable security but cannot guarantee absolute security but cannot guarantee absolute securitysecurity

Page 6: Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean,

ConfidentialityConfidentiality

Data transmitted via e-mail cannot be Data transmitted via e-mail cannot be anonymous without the use of additional anonymous without the use of additional steps. Almost all forms of e-mail contain the steps. Almost all forms of e-mail contain the sender's e-mail address.sender's e-mail address.– use an "anonymizer" - a third party site that strips use an "anonymizer" - a third party site that strips

off the sender's e-mail addressoff the sender's e-mail address

Web servers automatically store a great deal Web servers automatically store a great deal of personal information about visitors to a of personal information about visitors to a web site and that information can be web site and that information can be accessed by others.accessed by others.

Page 7: Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean,

ConfidentialityConfidentiality

Web sites can leave “Cookies”, a small Web sites can leave “Cookies”, a small file left on the user’s hard drive that is file left on the user’s hard drive that is sent back to the web site each time the sent back to the web site each time the browser requests a page from that site. browser requests a page from that site. Cookies can record which computer the Cookies can record which computer the user is coming from, what software and user is coming from, what software and hardware is being used, details of the hardware is being used, details of the links clicked on, and possibly even links clicked on, and possibly even email addresses, if provided by the email addresses, if provided by the user.user.

Page 8: Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean,

ConfidentialityConfidentiality

Degree of concern over confidentiality Degree of concern over confidentiality depends on sensitivity of the depends on sensitivity of the informationinformation

Since it is impossible to guarantee Since it is impossible to guarantee absolute data security over the absolute data security over the Internet, some extremely sensitive Internet, some extremely sensitive research may not be appropriate for research may not be appropriate for the Internetthe Internet

Page 9: Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean,

IRB RequirementsIRB Requirements

Investigators are going to have to provide Investigators are going to have to provide technical information on how they will deal technical information on how they will deal these issues.these issues.

IRBs need to have sufficient expertise on IRBs need to have sufficient expertise on the technical aspects of the Internet in the technical aspects of the Internet in order to ask the right questions and order to ask the right questions and evaluate the information provided.evaluate the information provided.

IRBs that review Internet research without IRBs that review Internet research without sufficient expertise are not in compliance sufficient expertise are not in compliance with the regulations!with the regulations!

Page 10: Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean,

ResourcesResources

American Psychological Association – American Psychological Association – Report of the Advisory Group on the Report of the Advisory Group on the Conduct of Research on the Internet Conduct of Research on the Internet http://www.apa.org/journals/amp/http://www.apa.org/journals/amp/featured_article/february_2004/amp59210featured_article/february_2004/amp592105.pdf5.pdf

AAAS Report on Internet ResearchAAAS Report on Internet Researchhttp://www.aaas.org/spp/dspp/sfrl/projects/http://www.aaas.org/spp/dspp/sfrl/projects/intres/main.htmintres/main.htm

Page 11: Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean,

Contact InfoContact Info

Jeffrey M. CohenJeffrey M. CohenAssociate Dean,Associate Dean,Research ComplianceResearch ComplianceWeill Medical College of Cornell Weill Medical College of Cornell UniversityUniversity425 E. 61st. St. DV-301425 E. 61st. St. DV-301New York, NY 10021New York, NY 10021Phone: (212) 821-0612Phone: (212) 821-0612Fax: (212) 821-0580Fax: (212) [email protected]@med.cornell.edu