Entire Transcript in Adobe Acrobat Format - National Reference ...

Entire Transcript in Adobe Acrobat Format - National Reference ... Entire Transcript in Adobe Acrobat Format - National Reference ...

bioethics.georgetown.edu
from bioethics.georgetown.edu More from this publisher
26.10.2014 Views

7 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 for two to two-and-a-half hours but we will do our best. Zeke, did you want to put that up? DR. EMANUEL: Yes. DR. MURRAY: Yes. Why don't we put that up. Thank you. While Zeke is -- right. (Slide.) This will be helpful all through our conversations this morning. By research conducted in an anonymous manner what we mean is this: One problem we had was many of these tissue collections for a variety of reasons would be inappropriate to strip identifiers from the tissue held say by the pathology lab at the teaching medical institution so, therefore, did we have to think about those tissue collections as identifiable. Well, clearly in the form in which they are held by the pathology laboratory they are identifiable and need to be identifiable. What will that mean in terms of any research that might be done with some tissue collections? Well, it struck us after a considerable amount of conversation that the most important -- that it made more sense to think about anonymity in the context of the particular use of the tissue.

8 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 If, for example, I have -- in an extreme case I have a series of fully identifiable tissue samples and I send them on to another scientist with every piece of identifying information stripped, there is nothing except the raw tissue, and that is what the scientist works with. It seemed odd to think about that as "identifiable" tissue. That scientist would have absolutely no way of going back and finding out from whom that tissue came so we came to a model of thinking of the tissue as used. It struck us that we accomplished the goals of protecting individual privacy and protecting individuals against potential discriminatory uses of genetic information about them if we, in fact, endorse a process by which a scientist could make a request for tissue, have the tissue sent with perhaps some information but not enough -- not sufficient information to identify the individual from whom the tissue came and to say that in that sense the tissue was being used in an anonymous manner. There is, what Zeke has labeled, an encryption barrier that is better than the metaphor of a fire wall. It is an encryption barrier which involves the stripping of a considerable amount of information. It might contain such things still as a medical history or at least the relevant points for the disease in question. It might

8<br />

1<br />

2<br />

3<br />

4<br />

5<br />

6<br />

7<br />

8<br />

9<br />

10<br />

11<br />

12<br />

13<br />

14<br />

15<br />

16<br />

17<br />

18<br />

19<br />

20<br />

21<br />

22<br />

23<br />

24<br />

If, for example, I have -- <strong>in</strong> an extreme case I<br />

have a series of fully identifiable tissue samples and I<br />

send them on to another scientist with every piece of<br />

identify<strong>in</strong>g <strong>in</strong>formation stripped, there is noth<strong>in</strong>g except<br />

the raw tissue, and that is what the scientist works with.<br />

It seemed odd to th<strong>in</strong>k about that as "identifiable" tissue.<br />

That scientist would have absolutely no way of go<strong>in</strong>g back<br />

and f<strong>in</strong>d<strong>in</strong>g out from whom that tissue came so we came to a<br />

model of th<strong>in</strong>k<strong>in</strong>g of the tissue as used.<br />

It struck us that we accomplished the goals of<br />

protect<strong>in</strong>g <strong>in</strong>dividual privacy and protect<strong>in</strong>g <strong>in</strong>dividuals<br />

aga<strong>in</strong>st potential discrim<strong>in</strong>atory uses of genetic<br />

<strong>in</strong>formation about them if we, <strong>in</strong> fact, endorse a process by<br />

which a scientist could make a request for tissue, have the<br />

tissue sent with perhaps some <strong>in</strong>formation but not enough --<br />

not sufficient <strong>in</strong>formation to identify the <strong>in</strong>dividual from<br />

whom the tissue came and to say that <strong>in</strong> that sense the<br />

tissue was be<strong>in</strong>g used <strong>in</strong> an anonymous manner.<br />

There is, what Zeke has labeled, an encryption<br />

barrier that is better than the metaphor of a fire wall.<br />

It is an encryption barrier which <strong>in</strong>volves the stripp<strong>in</strong>g of<br />

a considerable amount of <strong>in</strong>formation. It might conta<strong>in</strong><br />

such th<strong>in</strong>gs still as a medical history or at least the<br />

relevant po<strong>in</strong>ts for the disease <strong>in</strong> question. It might

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!