Data sharing has long been a cornerstone of healthcare and research and is only due to become more important with the rise of Big Data analytics and advanced therapies. Cell therapies, for example, rely not only on donated cells but also essentially on donated information to make them traceable. Despite the associated importance of concepts such as ‘donor anonymity’, the concept of anonymisation remains contentious. The Article 29 Working Party’s 2014 guidance on ‘Anonymisation Techniques’ has perhaps helped encourage a perception that anonymity is the result of data modification ‘techniques’, rather than a broader process involving management of information and context. In light of this enduring ambiguity, this article advocates a ‘relativ...
Thoughtful scholarship in the area of informational privacy sometimes assumes that a significant lev...
Though controversial the question of applying data protection laws to biological materials has only ...
Pseudonymisation is a data protection technique often used to protect the privacy of individuals whe...
The proliferation of digital technologies in healthcare creates two conflicting needs: protection of...
Tiivistelmä - Referat - Abstract In the modern European data economy two central ideals are in te...
Abstract Public trust is paramount for the well functioning of data driven healthcare activities suc...
Sharing data in biomedical contexts has become increasingly relevant, but privacy concerns set const...
Due to sensitivity nature of the data in e-healthcare and the need of these data to different ¿healt...
In this work, the authors analyze the concept and definitions of anonymity in the modern connected w...
The central aim of the thesis is to cast light on the status of Anonymity. I try to provide an ove...
A large amount of health data is gathered through various health institutions all over the world. Th...
This deliverable builds on the analysis carried out in Deliverable D7.4 which acted as an intermedia...
This era of big data analytics promises many things. In particular, it offers opportunities to extra...
AbstractAlthough widely analyzed by authors and theoretically valued by the public, the right to hea...
Privacy-enhancing technologies (PETs) promise to safeguard privacy and security alongside the use of...
Thoughtful scholarship in the area of informational privacy sometimes assumes that a significant lev...
Though controversial the question of applying data protection laws to biological materials has only ...
Pseudonymisation is a data protection technique often used to protect the privacy of individuals whe...
The proliferation of digital technologies in healthcare creates two conflicting needs: protection of...
Tiivistelmä - Referat - Abstract In the modern European data economy two central ideals are in te...
Abstract Public trust is paramount for the well functioning of data driven healthcare activities suc...
Sharing data in biomedical contexts has become increasingly relevant, but privacy concerns set const...
Due to sensitivity nature of the data in e-healthcare and the need of these data to different ¿healt...
In this work, the authors analyze the concept and definitions of anonymity in the modern connected w...
The central aim of the thesis is to cast light on the status of Anonymity. I try to provide an ove...
A large amount of health data is gathered through various health institutions all over the world. Th...
This deliverable builds on the analysis carried out in Deliverable D7.4 which acted as an intermedia...
This era of big data analytics promises many things. In particular, it offers opportunities to extra...
AbstractAlthough widely analyzed by authors and theoretically valued by the public, the right to hea...
Privacy-enhancing technologies (PETs) promise to safeguard privacy and security alongside the use of...
Thoughtful scholarship in the area of informational privacy sometimes assumes that a significant lev...
Though controversial the question of applying data protection laws to biological materials has only ...
Pseudonymisation is a data protection technique often used to protect the privacy of individuals whe...