2
1 Privacy & Privacy & Confidentiality in Confidentiality in Internet Research Internet Research Jeffrey M. Cohen, Ph.D. Jeffrey M. Cohen, Ph.D. Associate Dean, Associate Dean, Responsible Conduct of Research Responsible Conduct of Research Weill Medical College of Cornell University Weill Medical College of Cornell University IRB Issues IRB Issues Research on the Internet presents new concerns Research on the Internet presents new concerns to the traditional IRB issues of privacy & to the traditional IRB issues of privacy & confidentiality confidentiality Privacy concerns relate to whether Internet Privacy concerns relate to whether Internet activity activity Is identifiable Is identifiable Constitutes public or private behavior Constitutes public or private behavior Confidentiality concerns relate to inappropriate Confidentiality concerns relate to inappropriate disclosure of information obtained over the disclosure of information obtained over the Internet Internet Privacy Privacy Identifiable vs. Anonymous Identifiable vs. Anonymous Online participants usually use pseudonyms Online participants usually use pseudonyms (screen names, handles, etc.) (screen names, handles, etc.) Although not publicly linked to actual names, Although not publicly linked to actual names, identities can often be “readily ascertained” identities can often be “readily ascertained” (e.g., using search engine) (e.g., using search engine) People’s online identity may be as important People’s online identity may be as important to them as their actual identity to them as their actual identity Privacy Privacy Public vs. Private Behavior Public vs. Private Behavior Most online activity is open to the public Most online activity is open to the public Federal regulations base the definition of Federal regulations base the definition of “private information” on the subjects’ “private information” on the subjects’ “reasonable expectation” of privacy “reasonable expectation” of privacy In many situations (e.g., chat rooms), In many situations (e.g., chat rooms), participants expect privacy and don’t expect participants expect privacy and don’t expect their activity to be studied their activity to be studied Determination of privacy more complicated Determination of privacy more complicated than it seems than it seems Confidentiality Confidentiality Two potential sources of breach of Two potential sources of breach of confidentiality confidentiality inadvertent disclosure inadvertent disclosure Investigator who sent out research database to entire Investigator who sent out research database to entire Listserv Listserv Investigator who’s computer was stolen Investigator who’s computer was stolen deliberate attempts to gain access deliberate attempts to gain access No recorded incidents of hacking research data No recorded incidents of hacking research data Technology can provide reasonable security but Technology can provide reasonable security but cannot guarantee absolute security cannot guarantee absolute security Confidentiality Confidentiality Data transmitted via e Data transmitted via e-mail cannot be mail cannot be anonymous without the use of additional steps. anonymous without the use of additional steps. Almost all forms of e Almost all forms of e-mail contain the sender's mail contain the sender's e-mail address. mail address. use an " use an "anonymizer anonymizer" " - a third party site that strips off a third party site that strips off the sender's e the sender's e-mail address mail address Web servers automatically store a great deal of Web servers automatically store a great deal of personal information about visitors to a web site personal information about visitors to a web site and that information can be accessed by others. and that information can be accessed by others.

Privacy & Confidentiality in Internet Research...2 Confidentiality Web sites can leave “Cookies”, a small file left on the user’s hard drive that is sent back to the web site

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Privacy & Confidentiality in Internet Research...2 Confidentiality Web sites can leave “Cookies”, a small file left on the user’s hard drive that is sent back to the web site

1

Privacy & Privacy & Confidentiality in Confidentiality in Internet ResearchInternet Research

Jeffrey M. Cohen, Ph.D.Jeffrey M. Cohen, Ph.D.Associate Dean,Associate Dean,

Responsible Conduct of ResearchResponsible Conduct of ResearchWeill Medical College of Cornell UniversityWeill Medical College of Cornell University

IRB IssuesIRB Issues

Research on the Internet presents new concerns Research on the Internet presents new concerns to the traditional IRB issues of privacy & to the traditional IRB issues of privacy & confidentialityconfidentialityPrivacy concerns relate to whether Internet Privacy concerns relate to whether Internet activity activity –– Is identifiableIs identifiable–– Constitutes public or private behavior Constitutes public or private behavior

Confidentiality concerns relate to inappropriate Confidentiality concerns relate to inappropriate disclosure of information obtained over the disclosure of information obtained over the InternetInternet

PrivacyPrivacy

Identifiable vs. AnonymousIdentifiable vs. Anonymous–– Online participants usually use pseudonyms Online participants usually use pseudonyms

(screen names, handles, etc.)(screen names, handles, etc.)–– Although not publicly linked to actual names, Although not publicly linked to actual names,

identities can often be “readily ascertained” identities can often be “readily ascertained” (e.g., using search engine)(e.g., using search engine)

–– People’s online identity may be as important People’s online identity may be as important to them as their actual identity to them as their actual identity

PrivacyPrivacy

Public vs. Private BehaviorPublic vs. Private Behavior–– Most online activity is open to the publicMost online activity is open to the public–– Federal regulations base the definition of Federal regulations base the definition of

“private information” on the subjects’ “private information” on the subjects’ “reasonable expectation” of privacy“reasonable expectation” of privacy

–– In many situations (e.g., chat rooms), In many situations (e.g., chat rooms), participants expect privacy and don’t expect participants expect privacy and don’t expect their activity to be studiedtheir activity to be studied

–– Determination of privacy more complicated Determination of privacy more complicated than it seemsthan it seems

ConfidentialityConfidentiality

Two potential sources of breach of Two potential sources of breach of confidentialityconfidentiality–– inadvertent disclosureinadvertent disclosure

Investigator who sent out research database to entire Investigator who sent out research database to entire ListservListservInvestigator who’s computer was stolenInvestigator who’s computer was stolen

–– deliberate attempts to gain accessdeliberate attempts to gain accessNo recorded incidents of hacking research dataNo recorded incidents of hacking research data

Technology can provide reasonable security but Technology can provide reasonable security but cannot guarantee absolute securitycannot guarantee absolute security

ConfidentialityConfidentiality

Data transmitted via eData transmitted via e--mail cannot be mail cannot be anonymous without the use of additional steps. anonymous without the use of additional steps. Almost all forms of eAlmost all forms of e--mail contain the sender's mail contain the sender's ee--mail address.mail address.–– use an "use an "anonymizeranonymizer" " -- a third party site that strips off a third party site that strips off

the sender's ethe sender's e--mail addressmail address

Web servers automatically store a great deal of Web servers automatically store a great deal of personal information about visitors to a web site personal information about visitors to a web site and that information can be accessed by others.and that information can be accessed by others.

Page 2: Privacy & Confidentiality in Internet Research...2 Confidentiality Web sites can leave “Cookies”, a small file left on the user’s hard drive that is sent back to the web site

2

ConfidentialityConfidentiality

Web sites can leave “Cookies”, a small file Web sites can leave “Cookies”, a small file left on the user’s hard drive that is sent left on the user’s hard drive that is sent back to the web site each time the back to the web site each time the browser requests a page from that site. browser requests a page from that site. Cookies can record which computer the Cookies can record which computer the user is coming from, what software and user is coming from, what software and hardware is being used, details of the links hardware is being used, details of the links clicked on, and possibly even email clicked on, and possibly even email addresses, if provided by the user.addresses, if provided by the user.

ConfidentialityConfidentiality

Degree of concern over confidentiality Degree of concern over confidentiality depends on sensitivity of the informationdepends on sensitivity of the information

Since it is impossible to guarantee Since it is impossible to guarantee absolute data security over the Internet, absolute data security over the Internet, some extremely sensitive research may some extremely sensitive research may not be appropriate for the Internetnot be appropriate for the Internet

IRB RequirementsIRB Requirements

Investigators are going to have to provide Investigators are going to have to provide technical information on how they will deal these technical information on how they will deal these issues.issues.IRBs need to have sufficient expertise on the IRBs need to have sufficient expertise on the technical aspects of the Internet in order to ask technical aspects of the Internet in order to ask the right questions and evaluate the information the right questions and evaluate the information provided.provided.IRBs that review Internet research without IRBs that review Internet research without sufficient expertise are not in compliance with sufficient expertise are not in compliance with the regulations!the regulations!

ResourcesResources

American Psychological Association American Psychological Association –– Report of Report of the Advisory Group on the Conduct of Research the Advisory Group on the Conduct of Research on the Internet on the Internet http://http://www.apa.orgwww.apa.org/journals/amp//journals/amp/featured_article/february_2004/amp592105.pdffeatured_article/february_2004/amp592105.pdfAAAS Report on Internet ResearchAAAS Report on Internet Researchhttp://http://www.aaas.org/spp/dspp/sfrl/projectswww.aaas.org/spp/dspp/sfrl/projects//intres/main.htmintres/main.htm

Contact InfoContact Info

Jeffrey M. CohenJeffrey M. CohenAssociate Dean,Associate Dean,Research ComplianceResearch ComplianceWeill Medical College of Cornell UniversityWeill Medical College of Cornell University425 E. 61st. St. DV425 E. 61st. St. DV--301301New York, NY 10021New York, NY 10021Phone: (212) 821Phone: (212) 821--06120612Fax: (212) 821Fax: (212) [email protected]@med.cornell.edu