- Open Access
- Open Peer Review
If you build it, they will come: unintended future uses of organised health data collections
BMC Medical Ethicsvolume 17, Article number: 54 (2016)
Health research increasingly relies on organized collections of health data and biological samples. There are many types of sample and data collections that are used for health research, though these are collected for many purposes, not all of which are health-related. These collections exist under different jurisdictional and regulatory arrangements and include:
Population biobanks, cohort studies, and genome databases
Clinical and public health data
Direct-to-consumer genetic testing
Fitness trackers, health apps, and biometric data sensors
Ethical, legal, and social challenges of such collections are well recognized, but there has been limited attention to the broader societal implications of the existence of these collections.
Although health research conducted using these collections is broadly recognized as beneficent, secondary uses of these data and samples may be controversial. We examine both documented and hypothetical scenarios of secondary uses of health data and samples. In particular, we focus on the use of health data for purposes of:
Identification of victims of mass casualty events
Denial of entry for border security and immigration
Making health resource rationing decisions
Facilitating human rights abuses in autocratic regimes
Current safeguards relating to the use of health data and samples include research ethics oversight and privacy laws. These safeguards have a strong focus on informed consent and anonymization, which are aimed at the protection of the individual research subject. They are not intended to address broader societal implications of health data and sample collections. As such, existing arrangements are insufficient to protect against subversion of health databases for non-sanctioned secondary uses, or to provide guidance for reasonable but controversial secondary uses. We are concerned that existing debate in the scholarly literature and beyond has not sufficiently recognized the secondary data uses we outline in this paper. Our main purpose, therefore, is to raise awareness of the potential for unforeseen and unintended consequences, in particular negative consequences, of the increased availability and development of health data collections for research, by providing a comprehensive review of documented and hypothetical non-health research uses of such data.
Organised collections of biological samples and personal information have become increasingly important for health research, particularly in achieving translational aims to improve primary prevention, diagnosis, and treatment . Increasing reliance on biobanks and health databases has led to significant escalations in funding to support the collection of tissue and information as is evident, for example, in the recently announced U.S. Precision Medicine Initiative [2, 3]. That the use of health data for research is associated with significant ethical challenges is well recognised. A vibrant community of ELSI (ethical, legal, social implications) scholars has been debating issues such as informed consent requirements for biobanks, privacy implications of long-term storage of health data and data sharing, and the return of findings to research participants [4–11]. Most of these debates occur in the context of research ethics frameworks aimed at the protection of individual research participants. However, information collected in health research, particularly genomic data, also has implications for social groups (family and identifiable ethnic groups) to which individuals belong, and for society as a whole.
Although there are many effective mechanisms in place to protect personal data collections, there has been relatively little consideration of the potential consequences of the proliferation of organised collections of detailed and highly personal information on a broader societal level. In particular, there is a paucity of attention to non-research uses for which such data collections might be employed, irrespective of the original intentions of the builders and the expressed purposes of the platforms. New data and new forms of research, and most importantly, new research platforms and institutions, create new possibilities; they therefore establish new societal affordances beyond their utility for health research.
The purpose of this paper is to present a comprehensive review of potential uses of health data collections that are largely unforeseen and unintended by the biomedical research community. In so doing, we acknowledge the socially valuable health research that has been conducted through secondary use of data. We also acknowledge the important role the ELSI community has played in facilitating ethical use of such data. Nevertheless, we believe that key issues have not received sufficient attention, which becomes apparent when one considers some of the implications of living in a society in which the collection and electronic storage of health data have become increasingly normalized.
We begin by outlining the types of health data collections we are concerned with. These include collections established specifically for health research, as well as some collected for other reasons, but which have subsequently become valuable for health related research. In particular, we focus on human tissue biobanks, public health data collections, and data accumulated by private entities, such as direct-to-consumer genetic testing companies, Facebook, and fitness trackers. We then consider potential secondary uses of these data collections that are outside of, or even contrary to, the scope and purpose of the types of collections we have outlined. In our analysis, we consider secondary uses of health data for which instances have already been documented internationally (such as forensic investigations, civil law suits, and mass casualty events). We then consider a hypothetical scenario, the potential for health databases to be used for health care rationing decisions, to illustrate how shifting social priorities and interests might lead to repurposing of health data collections. Finally, we consider some historical examples of how population data collections subsequently came to facilitate large scale human rights abuses.
Taken together, these examples illustrate that ethical analysis of the development and use of health data collections is inadequate if it is limited to narrow consideration of risks and benefits, especially when this is focused on individual research participants. Rather, the development of health data collections and the potential uses they enable constitute critical shifts in the societal environment that should be subject to democratic scrutiny and decision-making procedures. Research ethics oversight (in the form of Institutional Review Boards and similar bodies) is not capable of guarding against the type of uses we discuss. Our intention is to raise awareness of these issues in the hope that they will be discussed more prominently in ELSI and related communities and, ultimately, lead to robust protections.
Organised collections of personal health data
Data that are useful for health research come from a range of sources and can be made available to researchers through a variety of mechanisms. We are concerned here primarily with data that are stored for long or indefinite periods of time as part of an organised collection. In particular, we focus on population biobanks, cohort studies, and genome databases; clinical and public health records; genetic data collected through direct-to-consumer genetic testing; data collected through social media; and data collected by fitness trackers, health apps, and biometric data sensors. In this context, we are cognisant of important differences in legal definitions and other uses between biological data, information, databases, and biological samples [12–14]. For the purposes of this paper, we are concerned with the societal consequences of collections including all of these categories.
Population biobanks, cohort studies, and genome databases
Researchers increasingly access data from central repositories and are expected to contribute data they generate to such repositories [15–17] (see also the United States NIH policy on data sharing) . Driven largely by the rationale of maximizing the utility of data generated by public funding for health research , many journals now require that researchers make their data publicly available as a condition of publication (e.g., PLOS, Nature) [20, 21]. Similarly, population biobanks collect and store biological samples and associated personal health and demographic information for the purpose of facilitating health research. Many population biobanks are also associated with ongoing follow-up of participants and so are best characterized as cohort studies (e.g., The Canadian Longitudinal Study on Aging) . In contrast to data gathered for the purpose of a particular study, data gathered for population biobanks are intended, from the outset, to be of benefit to as many research studies as possible. Such biobanks thus rely on significant public investment to create a research infrastructure that is widely accessible for an indefinite period of time.
The types of data that are collected and shared vary across studies and biobanks, but may include: demographic information, disease history, health related behaviours, psychosocial information, a wide variety of biological measures, brain scans, and genetic information [23, 24]. Depending on the type of collection, directly identifying information may be linked to individual level records . With scientific and technological advances, new forms of data collection are being enabled. For example, there is now a large number of whole genome and exome sequences that have been generated as part of different research endeavours, and efforts are under way for creating data storage mechanisms that would increase accessibility of these sequences to scientists . There is also an increasing use of natural language processing in mining of clinical data [27, 28], which makes strategies of anonymization difficult to implement.
In the past, research ethics protocols often assumed a direct relationship between research participants and the researcher(s) who recruited them for a particular study, and this expectation is still evident among many research participants . When data are shared beyond the original researchers or when data are collected for large research platforms, which will be used by multiple researchers, stewardship of data often cannot be located meaningfully with a particular researcher. Personal data collections are therefore associated with institutions (i.e., the biobank, or the health data repository), rather than individuals. While publics and research participants, in particular, tend to be supportive of having their samples used in future research, this view depends on a number of factors including: the country where the research is conducted, characteristics of the research participants, the type of sample, and who will have access to the samples [30, 31]. The importance of appropriate governance for biobanks and data collections has been widely acknowledged [32–34], though in practice, governance of these resources tends to be located within the scientific community. For example, governance of the NIH Database of Genotypes and Phenotypes (dbGaP) and other U.S. NIH repositories is controlled by data access committees appointed by NIH, which are limited to federal employees and generally consist of scientists working within NIH . dbGaP specifically prohibits institutions submitting data from adding their own safeguards over and above enforcement of consent (e.g., in the process of submitting data to dbGaP research institutions would not be allowed to add institutional requirements to safeguard samples/data, beyond enforcement of consent).
Clinical and public health data
Every interaction between an individual and a health care provider leads to information being recorded about symptoms, health histories, and past or current medications. This information is, in the first instance, directly linked with the patient’s name and other personal identifiers (e.g., address, health insurance number, etc.). Much of this information is also shared with pharmacies (to fill a prescription), health insurance companies (for reimbursement), labs (where testing may be completed) and other test locations. The primary purpose of collecting this information is to provide optimal health care for individuals and communities.
What then happens with this information varies by jurisdiction. In Canada, for example, such data are sent to the provincial health insurer, in part to allow physicians and other health care specialists to be paid. If an individual is hospitalized, further data are collected and analyzed to maintain records of: wait times for care, type of care provided, and ultimate resolution (for example, discharge to long-term care). This information is also collated centrally by the Canadian Institute for Health Information (CIHI) for research on quality of care. In the US, although health care systems vary by state and health data are not automatically pooled, Medicare data are aggregated and studied, much like the Canadian data. Also, specific data collation efforts collect various types of health data from health care organizations (e.g., the U.S. CDC’s collection of ambulatory health data) , and information is also collated by insurance companies to determine eligibility and pay the providers.
Regardless of the type of health care system, individual health information may be shared to some degree with other health care providers for the purposes of clinical care . In addition, some of these data may be shared outside of the health care system for the purposes of research. Across jurisdictions there is also a trend to move increasingly towards electronic medical records (EMR), which facilitate data sharing for improving clinical care and research . In some instances, there has been significant controversy surrounding the use of health data collected for clinical purposes, for subsequent research purposes. For example, in Denmark, over a period of several years the Danish General Practice Database reused confidential information about patients’ diagnoses for purposes of analysis and research without patients’ or physicians’ consent and awareness .
In addition to health information collected at point of care, information and biological samples are also collected in public health and screening programs. For example, many countries have newborn screening (NBS) programs. The primary purpose of these programs is to test for rare diseases such as phenylketonuria that are critical to detect in the early days of life . A blood sample is collected from infants to conduct these diagnostic tests, but once the sample is collected, there is ethical ambiguity about what can or should be done with it , . Often these collections are not “consented” and how they are governed and whether samples may be used for other purposes varies dramatically across jurisdictions [43, 44]. There has been significant public controversy about secondary research uses of newborn bloodspots  and while research shows that in the US the public tends to be supportive of the program, there is a preference for parental opt-in for secondary research uses .
For different types of health data and across jurisdictions, there is variation as to whether individuals are informed about the fact that their personal information is collected and used for research. If individuals are informed, there is variation in whether consent processes are in place, and whether these are opt-in or opt-out based (in many cases legislation is in place that allows for research use of samples and data without consent for quality assurance purposes). This strong focus on collecting, storing, and sharing personal and aggregate health data is frequently rationalized as supporting the development of a more “personalized medicine”  or “precision medicine” .
Direct-to-consumer genetic testing
Since their development, genetic tests have been offered to individuals through referral within the health care system in most jurisdictions in which they are available. In recent years there has been a proliferation of commercial companies that offer genetic tests for purchase “direct-to-consumer” (DTC) . These genetic tests claim to provide such information as how individuals will respond to certain drugs, verification of paternity, tracing of ancestry, and identifying propensities for psychological or physical health conditions [50–53]. In procuring such services, an individual submits a DNA sample, often with additional personal information.
In the process of providing such services, DTC genetic testing companies accumulate large amounts of personal information on individuals. However, it is not clear how such data are managed. In 2012, 86 companies offered genetic testing services online . Of these, only 28 disclosed what would be done with samples and information after the commercial transaction was concluded. It has become clear that for at least some of these companies, the financial gain from the transaction with individuals procuring the genetic test is not intended to be the primary source of revenue. Rather, the business model relies on the sale of the data to third parties [55, 56]. Interestingly, private firms operating EMRs (see previous section) also adopt business models that assume that a substantial portion of their revenue comes from analysis of data in the records they keep for employers and insurers for private insurance plans .
In contrast to the types of health data collections considered above, social media illustrate an accumulation of personal information that is more complex and sensitive to individual disclosure decisions. The information inherent in data from social media is also more dynamic and potentially far richer than other data sources in that it includes historical and up-to-date information about relationships, associations, and behaviours.
Social media are receiving increasing attention from social scientists, but are rarely considered in the context of health information. Many individuals willingly reveal very large amounts of personal information on social media sites, which enables the construction of an extensive picture of their health, lifestyle, biography, and behavior. For example, on sites such as Facebook, it is quite common for individuals to share personally identifying information such as birthdays, email addresses, addresses, and current or previous schools . People also commonly share behavioral and biographical information such as daily activities, interests, habits, hobbies, marital or relationship status, family and friend connections, all documented through comments, photos, and videos. Although people do not typically share their social security number (SSN), it has been shown that SSNs and other personal data can be inferred by aggregating information that people share online and publicly available information about them . Other less commonly shared information such as sexual orientation can also be predicted from network connections . Recent use of Facebook as a platform for research has resulted in widespread outrage, based primarily on the involvement of Facebook users in a study without their informed consent .
Fitness trackers, health apps, and biometric data sensors
The widespread use of mobile and wearable devices such as smartphones, fitness trackers and their associated health applications (apps) allows the measurement of a vast range of activities and physiological characteristics for health and performance. From daily habits and activities that users enter, to data recorded by cell phones and other devices through GPS and accelerometer readings (e.g. step counts or distance travelled), mobile devices and apps can monitor people with little effort or awareness on their part. Private companies and health researchers alike are eager to exploit the rich, real-time data streams these generate. Apple, for example, recently released its ResearchKit  to facilitate the development of health research applications for their devices. The day ResearchKit was launched, apps were also released to aid researchers in studying heart disease, Parkinson’s disease, breast cancer, diabetes and asthma .
Irrespective of concerns about their effectiveness , what is certain is that such apps and devices enable the generation of highly organised collections of very personal information. Few apps or devices are subject to government regulation despite the fact that they collect health information or offer health advice . Even apps that have been accredited (e.g., by the NHS in the UK) have been shown to fall short of data protection standards . Perhaps even more disconcerting is the automatic and unobtrusive collection of biometric measurements enabled by wearable sensors. For example, in some computer games physiological measures are used to assess the arousal level of gamers with the goal of optimising game play difficulty on an individual basis . Gamification has also been suggested as a way of increasing adherence to health app use . However, increased use of wearable technology and other connected devices is not without risks and these devices have become available before the societal implications of the data they provide have been fully considered .
In summary, multiple mechanisms can be identified whereby personal health related data are collected and made available to researchers in an organized fashion. Arguably, none of these data are collected for nefarious purposes. Indeed, if even a small proportion of the promised benefits of “big data” are realized, there is likely to be much benefit in them. These collections also exist under different governance regimes: ethics of clinical care, public health ethics, law, research ethics protocols, and commercial contracts between individuals and service providers. The collections rely on different types of funding: public/governmental research funding, health care system funding, consumer funding, advertising revenue models, and mixed funding models. The various collections also have different intended time horizons.
Unintended and unforeseen uses of health data collections
The possibilities inherent in analysis of “big data” have been heralded as beneficial for health and as potentially decreasing health care costs . However, it is self-evident that data collected for one purpose might also be used for other purposes not intended or envisaged at the time of collection. Indeed, some of the examples outlined above, such as newborn blood spot collections and biorepositories in pathology laboratories, have already been repurposed for secondary uses (i.e., samples and data originally collected for clinical or public health purposes were subsequently used for research). It is, indeed, conceivable that data collected for research purposes will eventually be used for yet other purposes .
Graves  argues that electronic health records represent the kind of organized collection of data that is attractive to domestic governments for surveillance and protection of its own population, to hostile foreign governments for espionage and sabotage, to commercial entities for generating revenue, and to criminals for illegal forms of profit. Given this environment of potentially hostile interests in health data, Graves suggests a compelling metaphor:
“Given our security design and likely attackers, our situation is something like this. It is as if we had each taken the valuable contents of our homes and deposited them, carefully indexed, in a huge warehouse somewhere in the country. We then give the warehouse owner and his employees careful instructions about who may access and use these valuables. Thoughtfully, the warehouse owner creates a special passage into the warehouse—a “portal”—by which we may access a few of our own possessions if we wish. The builder of the warehouse has equipped it with a very fancy lock (AES with 128- to 256-bit keys) that the owner may choose to use if he thinks he’s in a bad neighborhood. Meanwhile, there are four different large, well-trained, well-equipped, and materiel-hungry armies in easy marching distance. Will the warehouse owner and his employees lay down their lives, or will they open the lock? Or will they discover their warehouse is riddled with secret back doors, or that the armies have really big bolt cutters (secret supercomputers that can do a brute force attack on AES), or that the lock has an equally fancy secret master key?” (p. 113)
Perhaps Graves’s metaphor is too dramatic. Moreover, some of the secondary, non-research, uses that might arise for health data collections may be deemed uncontroversial or even broadly beneficial. But it would be naïve to think that organized collections of health data are of no interest to those outside of the health care and research community. With this in mind, we now illustrate some brief examples of conceivable secondary uses of health data and biological samples.
Health data and organised collections of DNA, in particular, have important forensic uses . Samples and information collected for health purposes may include information about individuals that is not routinely available in data collections available to law enforcement (or other) agencies. Situations can therefore arise in which the investigative opportunities afforded by existing health databases are of great interest for forensic and related purposes. Many examples illustrate this point. In some cases, the urgency of the situations that prompted requests for database access has meant that decisions were made without sufficient opportunity to engage in a fuller consultative process or consideration of the range of potential privacy and ethical issues.
A high profile case in the United States implicated the Texas Department of State Health Services (DSHS) in providing 8350 de-identified NBS samples to researchers without parental knowledge or consent . In the midst of a class action lawsuit brought against the DSHS in 2009, it was revealed that the DSHS also gave 800 samples to the Armed Forces DNA Identification Laboratory (AFDIL) to help create a national mitochondrial DNA database for use in forensic investigation of missing persons and cold cases [1, 75]. It is worth noting here that this was not just a one-off use of the NBS data, which might have been justified on particular grounds, but rather the development (and repurposing) of a DNA database for forensic purposes.
When the Swedish Minister for Foreign Affairs, Anna Lindh, was assassinated in 2003, police requested access to the suspected attacker’s DNA from a national NBS biobank to compare against DNA from the crime scene. Police were granted access, resulting in the conviction of the assassin . It is important to note that in this case there was no court involvement. The biobank acceded to the police request directly . In an armed robbery in Norway, a cancer patient was a prime suspect. The suspect had died six months after the robbery, but tissue samples had been collected in a hospital biobank. Police wanted to compare DNA found at the robbery site with the suspect’s DNA from the biobank sample. In this instance police access was denied by the Norwegian Supreme Court .
There are multiple cases involving claims of paternity, typically related to disputes over inheritance, that lead to requests or attempts to access DNA samples stored in biobanks. In another Norwegian case, a dispute relating to claims of biological kinship led to access being granted to tissue samples from a hospital biobank. In this case, the Norwegian Supreme Court argued that the claimant’s right to know his parents superceded laws prohibiting biobanks from giving access to samples without the sample donor’s consent, who in this case was dead .
Mass casualty events
In a Swedish case, a temporary amendment to the law restricting access to biobanks was passed after the 2004 Asian tsunami to allow for the use of samples from national NBS registries for identification of victims . The decision was based on arguments emphasizing the great benefit to family members of the victims, while assuming that there is no reason to believe that people whose samples are being used would object to this use (though it should be noted that this decision was not without its critics).
DNA analysis was also used for victim identification purposes following both the 9/11 World Trade Centre attack and Hurricane Katrina, although this was achieved through kinship analysis with DNA samples obtained voluntarily from family members . However, following such cases, some bioethicists have argued in favor of third-party access to health databases and biobanks after mass casualty events .
Border security and immigration
Contemporary examples of third-party access to health data or biobanks in the context of immigration and border security are comparatively rare. However, it can be argued that health databases afford similar opportunities to agencies wishing to exploit their potential. Following 9/11 many states have passed anti-terror legislation to intensify surveillance of “suspect populations” and control their movement . Many of these laws, such as the USA Patriot Act, grant security agencies broad powers to access private records without notifying the subjects of those records that an invasion of their privacy is being contemplated. The Patriot Act in particular has implications for non-U.S. jurisdictions, like the government of British Columbia, that have contracted with U.S. corporations to manage their electronic health records. Such corporations would be compelled to grant access to health records as a result of an application by a security agency using a much less stringent standard of proof .
One case in which health data may have been accessed by border personnel involved a Canadian woman attempting to travel to the United States in 2013 and being denied entry on the basis of a medical history of depression and attempted suicide. The woman, author Ellen Richardson, has written openly about her struggles with depression and suicide, and reported to the Canadian Broadcasting Corporation (CBC) that border officials cited her hospitalization for depression in June 2012 as the reason for the denial of entry . Further investigation by Canadian journalists did not clarify how U.S. border officials gained access to Richardson’s medical history, but revealed that contact with the police through 911 calls is routinely recorded in the database of the Canadian Police Information Centre. Sometimes these encounter reports include information about mental health. This database is shared with the U.S. Federal Bureau of Investigation and other U.S. security agencies . Richardson, however, reported that her 2012 hospitalization only involved contact with medical personnel in an ambulance, and not the police. The possibility that U.S. border officials are accessing Canadian health information is being investigated by the Ontario Privacy Commissioner .
What these examples illustrate is that the mere existence of collections of health data and biological samples creates possibilities for action and use that would otherwise not have been available. In cases like the tsunami, redirecting use of these resources found strong social support in spite of some controversy. In contrast, the use of NBS samples in Texas for forensic purposes led to wide-spread public outcry. While recognising that there are legal barriers to law enforcement and/or governmental access to data and samples, these cases demonstrate the potential that exists for DNA originally obtained for the purposes of public health screening or health research to be repurposed for law enforcement. As Kaye  has argued, large, centrally managed health databases cannot but be of interest to law enforcement and forensic communities, who are themselves advocating for the creation of large databases or biobanks to aid investigations [88, 89]. These developments have led legal scholars in the U.S. to warn that assumptions about privacy and unreasonable search and seizure under the Fourth Amendment do not account for the expanded investigative and surveillance capabilities afforded by biobanks and big data analytics [89–92].
In each of these cases, data/biospecimens were collected for specific purposes related to health care or health research. The consents provided – or in the case of NBS, the implied consent – did not extend to legal or security uses. Arguably, the bioethical principles and privacy protections governing the original consent were negated when access was allowed after the fact for other purposes. While democratically sanctioned processes or ethical reasoning may have been applied in some cases, as in the use of NBS samples for identification after the 2004 Asian tsunami, in others legal or other considerations were allowed to overrule the protections and understandings in place when the data/biospecimens were provided. These examples illustrate the limitations of the confidentiality protections that researchers are realistically able to offer research participants in many legal environments . Even where legal protections exist (such as Certificates of Confidentiality in the U.S.), their practical efficacy in preventing access has yet to be tested in court, especially when “national security” or other perceived pressing national interests are implicated .
Health resource allocations
A major challenge in presenting an analysis of unintended and unforeseen consequences is that we cannot know the ways in which particular societal interests develop and new ones emerge. But it is precisely these unforeseen uses we would like to highlight. The following example about health resource allocation is intended to illustrate a possible trajectory of societal interests in which health research data collections might come to find very different uses.
All health care systems currently use some method for rationing the provision of resources  and current forms of health care delivery are unlikely to be sustainable in many jurisdictions . In addition to demands associated with a demographic shift in age profile and an ever expanding range of new treatment options, costs of treatment are growing, in some cases dramatically. Drugs to treat rare diseases, which in aggregate may include as many as 1 in 12 Canadians  can exceed $300,000 per patient per year, in contrast to an average cost of under $1000 per person per year across the Canadian population . Similarly, cancer drugs may cost tens of thousands of dollars for short term life extension . These pressures on health care systems mean that governments and health insurers have to make increasingly difficult decisions about how to ration limited health resources.
Understandably, attempts toward rationing are controversial, especially when these are seen to be discriminatory. This is evident, for example, in recent media coverage in the UK about non-research uses of identifiable personal health information for risk stratification purposes (see, for example, ). Similar programs in the U.S. seek to identify frequent uses of ER admissions for the specific reason of targeting them for additional services [101–104].
Given pressures on health care systems, more drastic measures might be taken in the future to inform and enact rationing decisions. These trends might therefore lead to attempts to access health data collections for purposes of facilitating health resource rationing decisions. Governments and health insurers already have access to large amounts of personal health information about individual citizens, and in some cases legal protections are in place to guard against discriminatory practices. But legal protections are limited, and the types of health data collections available for research (outlined above) arguably extend the information otherwise available to health providers.
Lifestyle factors and personal health information are already used to make decisions by insurers about premiums and, in some instances, to exclude certain people from receiving coverage, as is done with life insurance coverage . In the U.S., the Genetic Information Nondiscrimination Act (GINA), in place since 2009, makes it illegal for health insurance companies or employers (through which people usually access health insurance) to discriminate based on genetic data  and the Affordable Care Act enacted in 2010 protects consumers against health insurance discrimination based on pre-existing conditions and against rate hikes based on medical diagnoses . However, neither Act addresses life insurance . In Europe, regulations prohibiting insurance discrimination based on genetic data have been in place for more than two decades, starting in 1990 in Belgium. However, these laws may in some cases be too narrow to fully protect people from the use of data associated with genetic information . Some have also argued that there are benefits to using genetic test results in assessing insurance premiums because doing so allows insurers to be more specific about who is at risk, rather than penalizing everyone in a particular category (e.g., women who have a family history of breast cancer but themselves do not have the particular mutation that would place them at increased risk) .
Information about individuals’ health behaviours is arguably of interest in making health resource decisions because behavioural data (smoking, drinking, diet, exercise) are strong predictors of health outcomes . Indeed, incentive-based health programs already rely on such data to shape individuals’ health behaviours, a practice which has been heavily criticized on ethical grounds and has potential for discrimination [111–113]. This potential for discrimination has been well documented among smokers. In contrast to other areas of health and social policy which have worked to counteract stigmatisation of affected groups and individuals, policy on tobacco control in some jurisdictions has actively sought to create stigma against smokers. These strategic stigmatisation efforts are associated with some alarming consequences, including surgeons refusing to treat smokers or pushing them down waiting lists, and family doctors not taking on smokers in their clinics or providing them with lower quality care . Insurance discrimination has also been documented based on risky behaviours like extreme sports (sky diving, etc.) .
Risk stratification can be used to ensure effective allocation of limited health care resources across a population. Further, individuals whose behavior puts them at increased health risk might legitimately be required to accept the financial burdens of those risks. However, criteria for determining ‘effective allocation’ and classifying what kinds of behaviour qualify as ‘high risk’ inevitably require value based judgments. Therefore, all decisions relating to health care coverage are inevitably political  with strong moral dimensions . We are here not advocating for or against particular approaches to health care allocation (e.g., luck egalitarianism). Rather, our point is that the use of health data to help inform health resource allocation is not simply a technical step in refining such decisions; the way they are used depends on particular values which should be subject to democratic scrutiny. Moreover, it is typically only socially privileged individuals who are able to dedicate their lives to health pursuits in ways that conform to merit based norms. With increasing pressure on financial sustainability of health care systems, it is not difficult to envisage increasing pressure to adopt merit based allocation of health resources, with those who are more “responsible” with their health and conform to rationalistic norms of health decision-making and personal life style choices rewarded with greater access to health resources, while non-conformers (e.g., smokers; vaccination refusers; screening non-attenders; non-compliant patients; sedentary habits) are punished with diminished access . Social media data are a prime candidate to support such assessments. Indeed, some insurers currently offer incentives to people who provide their health information (particularly behavioural data) in exchange for a discount on premiums, as long as they show healthy behaviour [119–121]. This places individuals who conscientiously object to this practice at a disadvantage to the extent that the discounts offered to those who comply are likely offset by increased premiums for those who refuse.
Human rights abuses and eugenics
Some of the health data collections (fitness trackers, social media, DTC genetic testing) we consider here have been developed relatively recently. However, population data have been collected historically and the examination of how certain types of data collections have been (mis)used for eugenic and similar purposes offers important insights. Seltzer and Anderson  describe ten historic cases in which documentary evidence exists to link the use of population data systems with human rights abuses. In some of these cases the data systems were “neutral” or even intended for population benefit, before being subverted for eugenic purposes. For example, in the Netherlands a population registration system was established in part to conduct social research, which was subsequently adapted in 1941 for the apprehension of Dutch Jews who were then deported to death camps. The death rate among Dutch Jews (73 %) was dramatically higher than that among Jews in France (25 %) and Belgium (40 %), as well as Jewish refugees living in the Netherlands during the Nazi occupation. Seltzer and Anderson argue that this was largely due to the fact that the registration system in the Netherlands facilitated the apprehension of Dutch Jews. Critically, the point here is not that the collection of a particular form of data resulted in human rights abuses, but that their availability facilitated such abuses.
Consideration of the ELS implications of health data has predominantly occurred in the context of developed countries, characterized by stable democracies that pride themselves on good human rights records (irrespective of evidence to the contrary). As a consequence, the macro-political context within which ELS issues are debated is often presumed to be constant. Seltzer and Anderson’s analysis highlights the flaws in this assumption. Ideological and other shifts in national sentiment can dramatically alter circumstances for particular groups, threatening their status as citizens and personal security. Given the potentially extreme longevity of electronic data collections, significant shifts in macro-political environments need to be considered not only a possibility but a certainty. Recent increases in immigration to Europe, for instance, are associated with an upsurge in support for rightwing political parties. Given that many of these parties across Europe explicitly target immigrants or specific minority groups, it is not unreasonable to suppose that if they gained political power, they might attempt to gain access to any population data systems allowing them to further discriminatory goals. Similarly, at least one of the leading contenders of the Republican nomination for the 2016 U.S. presidential elections strongly supports the forced deportation of any immigrants who are in the country without legal authorization, barring any refugees from Syria from entering the country , and has considered the possibility of keeping a database specifically on Muslims .
Our point here is not that we predict that databases currently being constructed will be used for such purposes. Rather, our point is that such uses are conceivable (it has happened before). Therefore, it is an oversight that the ELSI literature has not seriously discussed the potential link between utilization of population and health data by authoritarian or populist governments for ends that violate human rights.
Data security and other uses of health data
The potential for harmful secondary uses of health data has been recognized by some government agencies. In a 2003 report focusing on the ethical, legal and social implications of developments in genetics, the Australian Law Reform Commission noted controversial uses of genetic information relating to law enforcement, immigration, and many other public domains . Perhaps more concerning, a joint report, National and Transnational Security Implications of Big Data in the Life Sciences, by the American Association for the Advancement of Science (AAAS), the Federal Bureau of Investigation (FBI) and the United Nations Interregional Crime and Justice Research Institute (UNICRI) observed that with increasing amounts of health data, more data sharing, and improvements of analytic tools, there is an associated increase in risks for stealing sensitive data and “to inflict harm on individuals or groups, support a criminal enterprise, or disrupt Big Data applications to cause negative economic, political, or other societal outcomes” (p. 17) . The report further concludes that “risks can range from inappropriate access to sensitive data such as the numerous examples of cyber attacks to healthcare databases …, to the use of Big Data analyses in designing harmful biological agents.” (p. 34) .
Given extensive efforts to facilitate the sharing of health data across jurisdictional boundaries, such as the Global Alliance , attempts to compel access to health data by foreign governments once data have been shared across jurisdictional boundaries must also be considered, and the dynamic nature of political environments in countries beyond the origin of the health data cannot be ignored. Concerns must be acknowledged, for example, of such data being used to support new forms of eugenics in autocratic regimes outside of the jurisdiction within which the data were originally collected. Interestingly, the Court of Justice of the European Union (C-362/14) recently found the U.S. Safe Harbour agreement invalid, in part due to the Snowden revelations about NSA access. The agreement previously formed one of the bases for transfer of data from the EU to the U.S., and data transfer from the EU to the U.S. is currently legally challenging . Health data might also be used for homeland security. Legislation such as the USA Patriot Act suggests at least the possibility of government agencies forcing access to health data repositories for purposes of improved surveillance. Indeed, substantive efforts to link health and homeland security databases have been underway in the U.S. at least since the terrorist attacks of 9/11 . Or, health data might be used to identify individuals with propensities (“genetic predictors”) for criminal activity , or vulnerability to addiction .
We hope that these examples of secondary uses suffice to make our point. In some instances, they are more hypothetical (e.g., use of health data for border security); in others, precedents for secondary uses have already been established in some jurisdictions with varying public responses (e.g., newborn blood spots used for forensic purposes; biobank samples used to adjudicate in biological kinship disputes). It is also important to note that the health data collections we described above all exist within different legal frameworks, with different levels of electronic security, and hence affording different degrees of legal and illegal access. It might be argued, for example, that genetic information is well protected in government funded research databases, but that the same (or similar) information might not be as well protected legally and electronically when collected and held by direct-to-consumer genetic testing companies. In all cases, we have sought to illustrate that the existence of health data collections creates affordances for uses that are not envisaged in their original purpose.
The implications of large amounts of health data being collected, stored, and shared for health research cannot be understood in isolation from other societal trends. In particular, new challenges relating to big data are recognized for all kinds of electronic information unrelated to health, such as consumer purchasing behavior, internet browsing patterns, and the vast amounts of personal information available about every one of us on the web. Critical scholarship in these contexts points to the limitations of protecting privacy by giving individuals more control of data about them , and of relying on “notice-and-consent” as cornerstones of online privacy [133, 134]. Given the nature of digital data with its potentially indefinite lifespan and unprecedented capacities for re-analysis and information sharing, we need to adopt a much longer time horizon in examinations of societal implications. Indeed, addressing some of the issues we have raised in this paper is likely an important step toward establishing justifiable, legal data sharing solutions for the long term within the health care and research sector. We also need to be broader in the scope of our considerations. Limiting privacy considerations to issues around informed consent and de-identification (or anonymization) tends to focus on implications for the individual. However, information collected in health research clearly has implications for family members and the identifiable ethnic groups to which individuals belong, in the present and the future, particularly when we consider genetic and genomic data. We also need to consider the implications of living in a society in which the collection and electronic storage of health data have become increasingly normalized.
To this end it is worth considering briefly some of the mechanisms we might rely on to protect against misuses of data, and to assess their effectiveness for the kinds of scenarios described above. Computational mechanisms to safeguard data are certainly an important aspect of managing ELS concerns surrounding biobanks and health data, and significant efforts in this regard are taking place . However, as documents such as the National and Transnational Security Implications of Big Data in the Life Sciences  testify, it would be a mistake to assume that even very sophisticated electronic safeguards cannot be circumvented. Further, computational and technical safeguards in themselves are insufficient in the face of changes in public and political sentiment, especially if these lead to changes in policy or law. Electronic security measures are tools that do not serve to protect against the authorities who are in charge of those tools. In the US, a certificate of confidentiality may be issued on the request of a researcher, if data are deemed highly sensitive; this certificate is intended to permit the researcher to refuse a legal request for identifiable data . Limited case law suggests that certificates of confidentiality can protect against compelled disclosure of data. However, an evolving legal climate in which data are seen as essential to support core governmental functions, such as national security or affordable health care, could result in overriding such certificates. Importantly, many countries do not provide the equivalent of US certificates of confidentiality.
Another mechanism we currently rely on to protect participants in research from harm (unintended or otherwise) are Research Ethics Boards (REBs) or Institutional Review Boards (IRBs). Although they arguably provide many important protections, the scope of IRBs does not protect from the kind of societal consequences we have discussed in this paper. Indeed, consideration of “social consequences” is strictly outside the bounds of U.S. human research protection regulations . In Canada, the TCPS2 does not prohibit REBs from considering societal consequences of research, but nor does it specifically ask boards to consider these. The Oviedo Convention  and the Norwegian Act on Medical and Health Research  similarly state that the risks and benefits of research must be assessed for the individual, but REBs are not obliged to consider broader societal aspects of the research. And while IRBs have authority over individual research studies, they generally do not have the power to deny a government access to certain forms of data. They certainly do not have the power to restrict uses of data that have been shared beyond their jurisdictional boundaries (note, however, discussion around the need to give greater recognition to group harms of research) . Notably, IRBs also differ in how they handle risk and protect research participants. The literature shows variation between how boards interpret what is considered research and what type of ethics review is necessary [141, 142]. Even if IRBs were to consider some of the broader consequences of using secondary data for one study, this consideration might differ from IRB to IRB. But more importantly, the use of anonymous data for secondary use may also escape research ethics review altogether under current (U.S. and other) regulations. And if research is done in private institutions, it too may not be reviewed by IRBs. As such, IRBs might offer little to no protections to individuals in addition to insufficient consideration of social consequences.
Anonymisation of data by itself is also not an entirely satisfactory or feasible solution to protect data [143–145] nor does it meet the needs of those who would rather not have their data included in particular types of research . Further, in some cases, researchers may need identifiable or re-identifiable data . For example, some of the health data sources we have described are by their nature associated with personal identifiers (e.g., clinical health data; social networking profile). Further, when it comes to collecting data for health research, the more the data is stripped of information that could be used to identify an individual, the less the data are useful to answer certain types of research questions . There is therefore an incentive and societal value to the collection of identifiable data. Finally, anonymisation can often no longer be guaranteed because in many instances it is possible to re-identify individuals from “anonymized” health data [149–151]. In some instances, such as the Personal Genome Project, the idea that personal information could be private in the modern digital world is rejected as unfeasible. Rather than attempting to protect the privacy of research participants, the project leaders thus focused on recruiting participants willing to accept the risks associated with having their genomes published publicly (though we would argue that the conceptualization of such risks was likely not sufficiently broad). Finally, even participant-centric consent models , while undeniably an important step forward in resolving challenges relating to informed consent in large scale research platforms, in themselves do not guard against the type of problems we have outlined in this paper. Indeed, most of the mechanisms we typically rely on for human subjects protection in research do not address issues of access over which the host of the data platform has no control (e.g., IRBs do not have the authority to resist government mandated access). It is also of concern that the recent report on National and Transnational Security Implications of Big Data in the Life Sciences cited above further notes that “Beyond access controls, encryption, and other common data and cyber security technologies, no solutions exist that prevent or mitigate attacks on databases or the cyber infrastructure that support Big Data in the life sciences, which could result in consequences to the life science, commercial, and health sectors.” (p. 17) .
If concerns about unintended use of health research data are to be taken seriously, and if current safeguards are indeed insufficient, what might be some appropriate steps to take in guarding against particular forms of unintended consequences? At this point, we have no concrete solutions to offer. Our aim in this paper has been to raise issues, which we believe have been neglected in existing ELSI discussions on the topic. Our hope is that this paper will generate more vigorous debate of these issues among ELSI and other scholars.
Along with others we believe that a key consideration lies in fostering greater public discourse and transparency about these issues [153–155] and in the development of strong and independent governance structures for biomedical data and sample repositories [32, 156, 157]. However, to date little effort has gone toward articulating the particularities of how such governance might look like. What efforts have gone towards articulating governance structures for biobanks point towards greater public participation and control of biomedical data and samples at an institutional level [158, 159]. Winickoff’s proposal for the use of charitable trust models to structure biobanks and their relationship with tissue donors provides excellent guidance in this regard, with increased emphasis on responsible stewardship on the part of the biobank, and increased possibilities for meaningful involvement in governance on the part of donors . However, even these models do not protect from many of the issues we discussed here, nor are they implementable for all forms of data collections.
To address the problem of the unsanctioned secondary use of health data at a governmental level, health data governance needs to have deep democratic roots. These governance structures need to be sufficiently strong and independent to be able to withstand governmental and other equally strong pressures to redirect use of data resources away from the originally intended purposes without legitimate democratic scrutiny. With regard to transparency and public discourse, recent efforts to include a voice in biobank policy via deliberative public engagements are a good start , and similar methodologies could be developed for other data collections, as has been proposed for implementing predictive analytics in healthcare . Community-led groups constructing health research platforms also provide important precedents with regard to alternative models for governing health research and data . However, while these efforts do create mechanisms for the direct involvement of lay publics, patients, and research participants in the governance of health data collections, they have so far been limited in the extent to which they elevate debate of the issues to truly national levels. Moreover, deliberative and participatory mechanisms that help inform the governance of health data collections do not in themselves provide protection against government or court ordered access.
Secondary uses of health data are not necessarily undesirable. For instance, their use in helping to identify victims in mass casualty events, while certainly not unanimously acceptable, is likely to find strong societal support (see also , for other beneficial secondary uses of data and  for suggestions on minimizing potential harms). In other cases, such as the hypothetical example of using health data collections to inform health resource allocation, the degree of societal support would likely change over time and depend on contextual factors such as dominant ideological commitments and economic conditions. Support for singling out high users of health care, for instance, may vary depending on whether the underlying purpose is deemed discriminatory or supportive. Yet other potential uses, such as those relating to human rights abuses, should be guarded against no matter what the dominant societal commitments are at any given time in any given place. No matter that the probability of such abuses might be assessed as being very small, the outcomes should they occur would be catastrophic (as illustrated in historical examples). Frustratingly, it is these types of unforeseen and unintended abuses of health data that will likely be the most difficult to guard against. Many of the examples of adverse uses we have discussed in this paper might be guarded against with adequate legal protections within jurisdictions and strong binding data sharing and custodianship agreements between jurisdictions. However, these protections will not guard against strong ideological shifts resulting in changes in government. Developing institutional, legal, and other safeguards to protect against possible encroachment of future governments seems daunting to say the least. And perhaps it is not possible. But at minimum, discourse about these issues needs to occur on political levels at which meaningful democratic guidance can be deliberated. These kinds of activities are not yet sufficient to address fully the concerns we have articulated here, but they point in the right direction. In all likelihood, effective ways to safeguard against (adverse) unintended and unforeseen uses of health data collections will require at a minimum: a) a combination of legal frameworks based on broad and inclusive deliberations on a societal level, b) technical infrastructure in line with these frameworks, which would make it difficult for changing governments to significantly amend the purpose(s) of the health databases, and c) policy at the level of biobanks and other health data platforms, which raises awareness of the possibility of encroachment on the resource for non-health research purposes, as well as providing more fine-grained dynamic control in regulating details about data usage. We realize that this is a no small task, but are of the opinion that now is the time to consider debating the need for such safeguards.
Centers for disease control and prevention (U.S.A.)
Canadian Institute for Health Information
Database of genotypes and phenotypes (U.S.A.)
Ethical, legal, social implications
Electronic medical record
Institutional review board
National Health Service (U.K.)
National Institutes of Health (U.S.A.)
National Security Agency (U.S.A.)
Research ethics board
Murtagh MJ, Ipek D, Harris JR, Burton PR. Realizing the promise of population biobanks: a new model for translation. Hum Genet. 2011;130(3):333–45.
Collins FS, Varmus H. A new initiative on precision medicine. N Engl J Med. 2015;372(9):793–5.
National Institute of Health: Precision Medicine Initiative Cohort Program. https://www.nih.gov/precision-medicine-initiative-cohort-program. Accessed 11 Dec 2015.
Budin-Ljøsne I, Mascalzoni D, Soini S, Machado H, Kaye J, Bentzen H, Rial-Sebbag E, D’Abramo F, Witt M, Schamps G, Katić V, Krajnovic D, Harris J. Feedback of individual genetic results to research participants: is it feasible in Europe? Biopreserv Biobank. 2016;14(3):241–8.
Budin-Ljøsne I, Harris JR, Kaye J, Knoppers BM, Tassé AM. ELSI challenges and strategies of national biobank infrastructures. Norsk epidemiologi. 2012;21(2):155–60.
Cadigan RJ, Lassiter D, Haldeman K, Conlon I, Reavely E, Henderson GE. Neglected ethical issues in biobank management: results from a US study. Life Sci Soc Policy. 2013;9(1):1–13.
Knoppers BM, Ma’n HZ, Sénécal K. Return of genetic testing results in the era of whole-genome sequencing. Nat Rev Genet. 2015;16(9):553–9.
Master Z, Nelson E, Murdoch B, Caulfield T. Biobanks, consent and claims of consensus. Nat Methods. 2012;9(9):885–8.
Middleton A, Morley KI, Bragin E, Firth HV, Hurles ME, Wright CF, Parker M. Attitudes of nearly 7000 health professionals, genomic researchers and publics toward the return of incidental results from sequencing research. Eur J Hum Genet. 2016;24:21–9.
Otten E, Plantinga M, Birnie E, Verkerk MA, Lucassen AM, Ranchor AV, Van Langen IM. Is there a duty to recontact in light of new genetic technologies? A systematic review of the literature. Genet Med. 2015;17(8):668–78. doi:10.1038/gim.2014.173.
Virani AH, Longstaff H. Ethical considerations in biobanks: how a public health ethics perspective sheds new light on old controversies. J Genet Couns. 2014;24(3):428–32.
Bentzen HB. Biologisk materiale som personopplysning. Lov Data. 2013;115:12–6.
Bygrave LA. The Body as data? Biobank regulation via the ‘back door’ of data protection law. Law Innov Technol. 2010;2(1):1–25.
Bygrave LA. Information concepts in law: Generic dreams and definitional daylight. Oxf J Leg Stud. 2015;35(1):91–120.
McGuire AL, Basford M, Dressler LG, Fullerton SM, Koenig BA, Li R, McCarty CA, et al. Ethical and practical challenges of sharing data from genome-wide association studies: the eMERGE Consortium experience. Genome Res. 2011;21(7):1001–7.
Nguyen S, Terry SF. Free the data: the end of genetic data as trade secrets. Genet Test Mol Biomarkers. 2013;17(8):579.
Watson PH, Wilson-McManus JE, Barnes RO, Giesz SC, Png A, Hegele RG, et al. Evolutionary concepts in biobanking-the BC BioLibrary. J Transl Med. 2009;7(1):95.
National Institute of Health: Data Sharing Policy. http://grants.nih.gov/grants/policy/data_sharing/. Accessed 11 Dec 2015.
Yeaman S. Mandated data archiving greatly improves access to research data. FASEB J. 2013;27(4):1304–8.
PLOS: Data Availability. http://journals.plos.org/plosone/s/data-availability. Accessed 14 Dec 2015.
Nature: Authors & Referees. http://www.nature.com/authors/policies/availability.html. Accessed 15 Dec 2015.
The Canadian Longitudinal Study on Ageing. https://www.clsa-elcv.ca/. Accessed 11 Dec 2015.
Asslaber M, Zatloukal K. Biobanks: transnational, European and global networks. Brief Funct Genomic Proteomic. 2007;6:193–201.
Simeon-Dubach D, Watson P. Biobanking 3.0: Evidence based and customer focused biobanking. Clin Biochem. 2014;47(4–5):300–8.
Elger BS, Caplan AL. Consent and anonymization in research involving biobanks: Differing terms and norms present serious barriers to an international framework. EMBO Rep. 2006;7(7):661–6.
The Global Alliance for Genomics and Health. https://genomicsandhealth.org, Accessed 11 Dec 2015.
Murdoch TB, Detsky AS. The inevitable application of big data to health care. JAMA. 2013;309(13):1351–2.
Wu ST, Kaggal V, Dligach D, Masanz JJ, Chen P, Becker L, et al. A common type system for clinical natural language processing. J Biomed Semantics. 2013;4:1.
Trinidad SB, Fullerton SM, Bares JM, Jarvik GP, Larson EB, Burke W. Genomic research and wide data sharing: views of prospective participants. Genet Med. 2010;12(8):486–95.
Moodley K, Sibanda N, February K, Rossouw T. “It’s my blood”: ethical complexities in the use, storage and export of biological samples: perspectives from South African research participants. BMC Med Ethics. 2014;15(1):1–7.
Garrison N, Sathe N, Antommaria A, Holm I, Sanderson S, Smith M, et al. A systematic literature review of individuals’ perspectives on broad consent and data sharing in the United States. Genet Med. 2015;7:663–71.
Caulfield T, McGuire AL, Cho M, Buchanan JA, Burgess MM, Danilczyk U, et al. Research ethics recommendations for whole-genome research: consensus statement. PLoS Biol. 2008;6:73.
Kaye J, Stranger M, editors. Principles and Practice in Biobank Governance. Farnham: Ashgate; 2009.
Tindana P, de Vries J. Broad consent for genomic research and biobanking: perspectives from low-and middle-income countries. Annu Rev Genomics Hum Genet. 2016;12:43.
Ramos EM, Din-Lovinescu C, Bookman EB, McNeil LJ, Baker CC, Godynskiy G, et al. A mechanism for controlled access to GWAS data: experience of the GAIN Data Access Committee. Am J Hum Genet. 2013;92(4):479–88.
Centre for Disease Control and Prevention: Ambulatory Health Care Data. http://www.cdc.gov/nchs/ahcd.htm. Accessed 11 Dec 2015.
Mossialos E, Wenzel M, Osborn R, Anderson C. International profiles of health care systems 2014. The Commonwealth Fund. 2015. http://www.commonwealthfund.org/~/media/files/publications/fund-report/2015/jan/1802_mossialos_intl_profiles_2014_v7.pdf. Accessed 12 Dec 2015
Adler-Milstein J, Jha AK. Sharing clinical data electronically: a critical challenge for fixing the health care system. JAMA. 2012;307(16):1695–6.
Nhyder. http://www.dr.dk/nyheder/indland/fortrolige-sundhedsdata-samles-ulovligt-i-database. Accessed 11 Dec 2015.
Pitt JJ. Newborn screening. Clin Biochem Rev. 2010;31(2):57.
Drabiak-Syed, K. (2010, March 12). Newborn blood spot banking: Approaches to consent. Indiana University Center for Bioethics: PredictER Law and Policy Update. http://bioethics.iu.edu/programs/predicter/legal-updates/newborn-blood-spot-banking/. Accessed 15 Dec 2015
Maschke KJ. Disputes over research with residual newborn screening blood specimens. Hastings Cent Rep. 2009;39(4). http://www.thehastingscenter.org/disputes-over-research-with-residual-newborn-screening-blood-specimens/.
Kharaboyan L, Avard D, Knoppers BM. Storing newborn blood spots: modern controversies. J Law Med Ethics. 2004;32:741.
Webster D. Storage and use of residual dried blood spots. Southeast Asian J Trop Med Public Health. 2003;34 Suppl 3:49–51.
Cunningham S, O’Doherty KC, Sénécal K, Secko D, Avard D. Public concerns regarding the storage and secondary uses of residual newborn bloodspots: an analysis of print media, legal cases, and public engagement activities. J Community Genet. 2015;6(2):117–28.
Botkin J, Rothwell E, Anderson R, Stark L, Goldenberg A, Lewis M, et al. Public attitudes regarding the use of residual newborn screening specimens for research. Pediatrics. 2012;129(2):231–8.
Burgess MM, O’Doherty K, Secko DM. Biobanking in BC: Enhancing discussions of the future of personalized medicine through deliberative public engagement. Pers Med. 2008;5(3):285–96.
Ashley EA. The new precision medicine initiative: a new national effort. JAMA. 2015;313(21):2119–20.
Kalokairinou L, Howard H, Borry P. Science and Regulation. Changes on the horizon for consumer genomics in the EU. Science. 2014;346(6207):296–298.
Geransar R, Einsiedel E. Evaluating online direct-to-consumer marketing of genetic tests: informed choices or buyers beware? Genet Test. 2008;12(1):13–23.
Goddard KA, Robitaille J, Dowling NF, Parrado AR, Fishman J, Bradley LA, et al. Health-related direct-to-consumer genetic tests: a public health assessment and analysis of practices related to Internet-based tests for risk of thrombosis. Public Health Genomics. 2009;12(2):92–104.
Limdi NA, Veenstra DL. Expectations, validity, and reality in pharmacogenetics. J Clin Epidemiol. 2010;63(9):960–9.
Nordgren A, Juengst ET. Can genomics tell me who I am? Essentialistic rhetoric in direct-to-consumer DNA testing. N Genet Soc. 2009;28(2):157–72.
Christofides E, O’Doherty K. Company disclosure and consumer perceptions of the privacy risks of direct-to-consumer genetic testing. New Genetics and Society. 2016 (in press)
Darnovsky M. 23AndMe’s dangerous business model. New York Times. 2015. http://www.nytimes.com/roomfordebate/2015/03/02/23andme-and-the-promise-of-anonymous-genetic-testing-10/23andmes-dangerous-business-model-17. Accessed 11 Dec 2015
Vanhala, Reijonsaari, & PricewaterhouseCoopers Oy. Direct-to-consumer genome services and their business models. Sitra Finland. 2013. http://www.sitra.fi/julkaisut/muut/Direct_to_consumer_genome_data_services_and_their_business_models.pdf. Accessed 11 Dec 2015
Telus: Health Analytics. https://www.telushealth.co/health-solutions/health-analytics/overview/. Accessed 11 Dec 2015.
Christofides E, Muise A, Desmarais S. Information disclosure and control on Facebook: Are they two sides of the same coin or two different processes? Cyberpsychol Behav. 2009;12(3):341–5.
Acquisti A, Gross R. Predicting Social Security Numbers from public data. Proc Natl Acad Sci U S A. 2009;106(27):10975–80.
Jernigan C, Mistree BF. Gaydar: Facebook friendships expose sexual orientation. First Monday. 2009;14(10).
Kahn JP, Vayena E, Mastroianni AC. Opinion: Learning as we go: Lessons from the publication of Facebook’s social-computing research. Proc Natl Acad Sci U S A. 2014;111(38):13677–9.
Apple: Research Kit. https://www.apple.com/ca/researchkit/. Accessed 11 Dec 2015.
Savage N. Mobile data: Made to measure. Nature. 2015;527(7576):S12–3.
Goyal S, Cafazzo JA. Mobile phone health apps for diabetes management: current evidence and future developments. QJM. 2013;106(12):1067–1069.
Cortez NG, Cohen IG, Kesselheim AS. FDA regulation of mobile health technologies. N Engl J Med. 2014;371(4):372–9.
Huckvale K, Prieto JT, Tilney M, Benghozi PJ, Car J. Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment. BMC Med. 2015;13(1):214.
Szwoch M. Design elements of affect aware video games. Proceedings of the Mulitimedia, Interaction, Design and Innnovation. New York: ACM; 2015;18. doi:10.1145/2814464.2814482.
Anderson K, Burford O, Emmerton L. Mobile health apps to facilitate self-care: a qualitative study of user experiences. PLoS One. 2016;11(5):e0156164.
Peppet S. Regulating the internet of things: first steps toward managing discrimination, privacy, security and consent. Tex Law Rev. 2014;93:85.
Cohen IG, Amarasingham R, Shah A, Xie B, Lo B. The legal and ethical concerns that arise from using complex predictive analytics in health care. Health Aff. 2014;33(7):1139–47.
Henry D, Fitzpatrick T. Liberating the data from clinical trials. BMJ. 2015;351:h4601.
Graves S. Confidentiality, electronic health records, and the clinician. Perspect Biol Med. 2013;56(1):105–25.
Rohlfs RV, Fullerton SM, Weir BS. Familial identification: Population structure and relationship distinguishability. PLoS Genet. 2012;8(2):e1002469.
Waldo A. The Texas newborn blood spot saga has reached a sad – and preventable – conclusion. Genomics Law Report. 2010. http://www.genomicslawreport.com/index.php/2010/03/16/the-texas-newborn-bloodspot-saga-has-reached-a-sad-and-preventable-conclusion/. Accessed 15 Dec 2015
Ramshaw E. DSHS turned over hundreds of DNA samples to feds. The Texas Tribune. 2010. http://www.texastribune.org/2010/02/22/dshs-turned-over-hundreds-of-dna-samples-to-feds/. Accessed 15 Dec 2015
Unsgaard E, Meloy JR. The assassination of the Swedish Minister of Foreign Affairs. J Forensic Sci. 2011;56(2):555–9.
SOU 2010:81. Statens Offentliga Utredningar. En ny biobankslag. [SOU 2010:81. Swedish Government Official Reports. A new Biobank Act.]. p. 500-501.
Rt. 2006. p. 90. The Supreme Court of Norway decision.
Rt. 2013 p. 565. The Supreme Court of Norway decision.
2004/05:SOU14. Socialutskottet betänkande. Användning av PKU-biobanken för identifiering av avlidna med anledning av naturkatastrofen i Sydostasien. [Committee on Health and Welfare Report. Use of the PKU Biobank for Identification of Deceased in the Natural Disaster in South East Asia].
Pass KA, Thoene J, Watson MS. Emergency preparedness for newborn screening and genetic services. Genet Med. 2009;11(6):455–64.
Capps B. The public interest, public goods, and third-party access to UK Biobank. Public Health Ethics. 2012;5(3):240–51.
Levi M, Wall DS. Technologies, security, and privacy in the post‐9/11 European information society. J Law Soc. 2004;31(2):194–220.
Kluge EHW. Secure e-health: managing risks to patient health data. Int J Med Inform. 2007;76(5):402–6.
Canadian woman refused U.S. entry because of depression: CBC News. 2013. http://www.cbc.ca/news/canada/toronto/canadian-woman-refused-u-s-entry-because-of-depression-1.2444960. Accessed 12 Dec 2015.
Bridge S. Canadians with mental illnesses denied U.S. entry: CBC News. 2011. http://www.cbc.ca/news/canada/canadians-with-mental-illnesses-denied-u-s-entry-1.1034903. Accessed 12 Dec 2015.
Kaye J. Police collection and access to DNA samples. Genomics Soc Policy. 2006;2(1):16–27.
Crawford K, Schultz J. Big data and due process: toward a framework to redress predictive privacy harms. Boston Coll Law Rev. 2014;55:93–128.
Joh EE. Policing by numbers: big data and the Fourth Amendment. Wash Law Rev. 2014;89(35):35–68.
Maclin T. (2015). Government Analysis of Shed DNA Is a Search under the Fourth Amendment. Texas Law Review. 2015. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2685766 Texas Tech Law Review. 2015. Accessed 5 July 2016.
Murphy E. Back to the Future: The Curious Case of United States v. Jones. Ohio State. J Crim Law. 2012;10:325.
Lazer D, Mayer-Schönberger V. Statutory frameworks for regulating information flows: drawing lessons for the DNA data banks from other government data systems. J Law Med Ethics. 2006;34(2):366–74.
Hansson S, Bjorkman B. Bioethics in Sweden. Camb Q Healthc Ethics. 2006;15:285–93.
Beskow LM, Dame L, Costello EJ. Certificates of confidentiality and the compelled disclosure of research data. Science. 2008;322(5904):1054–5.
Klein R, Day P, Redmayne S. Managing scarcity: priority setting and rationing in the National Health Service. Buckingham: Open University Press; 1996.
Barker R. 2030 The future of medicine: Avoiding a medical meltdown. Oxford: Oxford University Press; 2011.
Canadian Organization for Rare Disorders: Our work. https://www.raredisorders.ca/our-work/. Accessed 12 Dec 2015.
Canadian Institute for Health Information. Drug expenditure in Canada, 1985 to 2012. Ottawa: CIHI; 2013. http://publications.gc.ca/collections/collection_2013/icis-cihi/H115-27-2012-eng.pdf. Accessed 12 Dec 2015.
Ramsey SD. How State And Federal Policies As Well As Advances In Genome Science Contribute To The High Cost Of Cancer Drugs. Health Aff. 2015;34(4):571–5.
NHS: Meeting Minutes. http://www.hra.nhs.uk/documents/2015/05/198543.pdf. Accessed 15 Dec 2015.
Hong CS, Siegel AL, Ferris TG. Caring for high-need, high-cost patients: what makes for a successful care management program? Issue Brief (Commonw Fund). 2014;19:1–9.
Centre for Care Innovations: San Francisco Health Network. http://www.careinnovations.org/programs-grants/health-homes-for-complex-patients/san-francisco-health-network. Accessed 12 Dec 2015.
Borlard S. NHS to hunt out patients that are costing too much: bosses will trawl records to identify most frequent visitors to A&E. Daily Mail. 2015. http://www.dailymail.co.uk/news/article-3117561/NHS-hunt-patients-costing-Bosses-trawl-records-identify-frequent-visitors-E.html. Accessed 12 Dec 2015
Matthews-King A. GP records to be shared without patient permission to tackle ‘high cost’ patients. Pulse. 2015. http://www.pulsetoday.co.uk/your-practice/practice-topics/it/gp-records-to-be-shared-without-patient-permission-to-tackle-high-cost-patients/20010180.article#.VZqFefmurs4. Accessed 12 Dec 2015
Joly Y, Braker M, Le Huynh M. Genetic discrimination in private insurance: global perspectives. N Genet Soc. 2010;29(4):351–68.
Hampton T. Congress passes bill to ban discrimination based on individual’s genetic makeup. JAMA. 2008;299(21):2493.
Medicare & Medicaid Services. Rights and protections. https://www.healthcare.gov/health-care-law-protections/rights-and-protections. Accessed 5 July 2016.
Van Hoyweghen I, Horstman K. European practices of genetic information and insurance: lessons for the Genetic Information Nondiscrimination Act. JAMA. 2008;300(3):326–7.
Hoy M, Witt J. Welfare effects of banning genetic information in the life insurance market: the case of BRCA1/2 genes. J Risk Insur. 2007;74(3):523–46.
Marks DF, Murray M, Evans B, Vida Estacio E. Health Psychology. Theory, Research and Practice (4th Ed.). London: Sage Publications; 2015.
Lunze K, Paasche-Orlow MK. Financial incentives for healthy behavior: ethical safeguards for behavioral economics. Am J Prev Med. 2013;44(6):659–65.
Mello MM, Rosenthal MB. Wellness programs and lifestyle discrimination- the legal limits. N Engl J Med. 2008;359(2):192.
Schmidt H, Voigt K, Wikler D. Carrots, sticks, and health care reform—problems with wellness incentives. N Engl J Med. 2010;362(2):e3.
Bell K, McCullough L, Salmon A, Bell J. ‘Every space is claimed’: smokers’ experiences of tobacco denormalisation. Sociol Health Illn. 2010;32(6):914–29.
Kwong M. Travel insurance and extreme sports: how Canadians can protect themselves. CBC News. 2014. http://www.cbc.ca/news/canada/travel-insurance-and-extreme-sports-how-canadians-can-protect-themselves-1.2618483. Accessed 15 Dec 2015
Abelson J, Giacomini M, Lehoux P, Gauvin FP. Bringing ‘the public’ into health technology assessment and coverage policy decisions: from principles to practice. Health Policy. 2007;82(1):37–50.
Hofmann B. Toward a procedure for integrating moral issues in health technology assessment. Int J Technol Assess Health Care. 2005;21(3):312–8.
Tsekleves E. Beware a future where health monitoring by wearables is the norm. The Guardian. 2015, June 4. https://www.theguardian.com/media-network/2015/jun/04/health-monitoring-wearables-technology-norm.
Pagliery J.2016. http://money.cnn.com/2015/04/08/technology/security/insurance-data-tracking/. Accessed 5 July 2016.
Nelson J.2015. http://money.cnn.com/2015/04/08/technology/security/insurance-data-tracking/. Accessed 5 July 2016.
Seltzer W, Anderson M. The dark side of numbers: the role of population data systems in human rights abuses. Soc Res. 2001;68(2):481–513.
Tankersley J Klement S. It’s not just Donald Trump: Half of Republicans share his views on immigrants and refugees. Washington Post. November 24 2015. https://www.washingtonpost.com/news/wonk/wp/2015/11/24/its-not-just-donald-trump-half-of-republicans-shares-his-views-on-immigrants-and-refugees/. Accessed 11 Dec 2015.
The terrorist in the data; Cyber-security. The Economist. 2015; 417(8966). http://www.economist.com/news/briefing/21679266-how-balance-security-privacy-after-paris-attacks-terrorist-data.
Australian Law Reform Commission: Essentially Yours. 2013. http://www.alrc.gov.au/publications/report-96. Accessed 15 Dec 2015
Berger KM, Roderick J. National and transnational security implications of big data in the life sciences. American Association for the Advancement of Sciences. November 10 2014. http://www.aaas.org/report/national-and-transnational-security-implications-big-data-life-sciences. Accessed 11 Dec 2015.
Global Alliance for Genomics and Health. https://genomicsandhealth.org/category/search-topics/data-sharing. Accessed 11 Dec 2015.
Schrems judgment. http://curia.europa.eu/juris/document/document.jsf?docid=169195&mode=req&pageIndex=1&dir=&occ=first&part=1&text=&doclang=EN&cid=527510. Accessed 11 Dec 2015.
Carter JG, Rip M. Homeland security and public health: a critical integration. Crim Just Policy Rev. 2013;24(5):573–600.
Marchant G. Should we screen kids brains and genes to ID future criminals? Slate. 17 October 2012. http://www.slate.com/articles/technology/future_tense/2012/10/should_kids_brains_and_genes_be_screened_to_detect_future_criminals.html. Accessed 11 Dec 2015.
Kreek MJ, Nielsen DA, Butelman ER, LaForge KS. Genetic influences on impulsivity, risk taking, stress responsivity and vulnerability to drug abuse and addiction. Nat Neurosci. 2005;8(11):1450–7.
Morozov E. To save everything, click here: Technology, solutionism, and the urge to fix problems that don’t exist. UK: Penguin; 2013.
Nissenbaum H. A contextual approach to privacy online. Daedalus. 2011;140(4):32–48.
Ben-Shahar O, Schneider CE. More than you wanted to know: The Failure of Mandated Disclosure. Princeton: Princeton University Press; 2014.
Kushida CA, Nichols DA, Jadrnicek R, Miller R, Walsh JK, Griffin K. Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies. Med Care. 2012;50:S82–101.
Wolf L, Patel M, Williams B, Austin J, Dame L. Certificates of confidentiality: protecting human subject research data in law and practice. Minn J Law Sci Technol. 2013;14:1.
45 CFR 46.111(2). http://www.hhs.gov/ohrp/humansubjects/guidance/45cfr46.html. Accessed 15 Dec 2015.
Council of Europe. Details of Treaty No. 164. https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/164. (2015). Accessed 5 July 2016.
The Biotechnology Centre of Oslo. Laws and Regulations. http://app.uio.no/ub/ujur/oversatte-lover/data/lov-20080620-044-eng.pdf. (2008). Accessed 5 July 2016.
Emanual EJ, Weiker C. Protecting communities in research. In: Childress JF, Meslin EM, Shapiro HT, editors. Belmont Revisited. Washington: Georgetown University; 2005.
Abbott L, Grady C. A systematic review of the empirical literature evaluating IRBs: what we know and what we still need to learn. J Empir Res Hum Res Ethics. 2011;6(1):3–19.
Ferguson A, Master Z. Multisite ethics review: problems and potential solutions. Bioethique Online. 2016;5:7.
Barocas S, Nissenbaum H. Big data’s end run around anonymity and consent. In: Lane J, Stodden V, Bender S, Nissenbaum H, editors. Privacy, big data, and the public good: frameworks for engagement. New York: Cambridge University Press; 2014. p. 44-75.
Laurie G, Sethi N. Towards principles-based approaches to governance of health-related research using personal data. Eur J Risk Regul. 2013;4(1):43–57.
Malin B, Karp D, Scheuermann RH. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research. J Invest Med. 2010;58(1):11.
Eriksson S, Helgesson G. Potential harms, anonymization, and the right to withdraw consent to biobank research. Eur J Hum Genet. 2005;13(9):1071–6.
Ohm P. Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Rev. 2010;57:1701–77.
Kaye J. The tension between data sharing and the protection of privacy in genomics research. Annu Rev Genomics Hum Genet. 2012;13:415–31.
Gymrek M, McGuire AL, Golan D, Halperin E, Erlich Y. Identifying personal genomes by surname inference. Science. 2013;339(6117):321–4.
Homer N, Szelinger S, Redman M, Duggan D, Tembe W, Muehling J, et al. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet. 2008;4(8):e1000167.
Rothstein MA. Is deidentification sufficient to protect health privacy in research? Am J Bioeth. 2010;10(9):3–11.
Kaye J, Curren L, Anderson N, Edwards K, Fullerton SM, Kanellopoulou N, et al. From patients to partners: participant-centric initiatives in biomedical research. Nat Rev Genet. 2012;13:371–6.
Burgess MM. From ‘trust us’ to participatory governance: Deliberative publics and science policy. Public Underst Sci. 2014;23(1):48–52.
Lemke AA, Halverson C, Ross LF. Biobank participation and returning research results: perspectives from a deliberative engagement in south side Chicago. Am J Med Genet A. 2012;158A(5):1029–37.
Meslin EM, Cho MK. Research ethics in the era of personalized medicine: updating science’s contract with society. Public Health Genomics. 2010;13(6):378–84.
Kaye J, Stranger M. Principles and practice in biobank governance. Farnham: Ashgate; 2009.
Koenig BA. Have we asked too much of consent? Hastings Cent Rep. 2014;44(4):33–4.
O’Doherty KC, Burgess MM, Edwards K, Gallagher RP, Hawkins AK, Kaye J, et al. From consent to institutions: designing adaptive governance for genomic biobanks. Soc Sci Med. 2011;73:367–74.
Winickoff D. From benefit sharing to power sharing: partnership governance in population genomics research. In: Kaye J, Stranger M, editors. Principles and practice in biobank governance. Farnham: Ashgate; 2009. p. 53e66.
Winickoff D, Winickoff M. The charitable trust as a model for genomic biobanks. N Engl J Med. 2003;349:1180–4.
O’Doherty KC, Burgess MM. Public deliberation to develop ethical norms and inform policy for biobanks: lessons learnt and challenges remaining. Res Ethics. 2013;9(2):55–77.
Li AM, Terry SF. Linking Personal Health Data to Genomic Research. Genet Test Mol Biomarkers. 2015;19(1):1–2.
Tene O, Polonetsky J. Privacy in the age of big data: a time for big decisions. Stanford Law Rev. 2012;64:63.
We would like to thank members of the Discourse, Science, Publics research group at the University of Guelph for helpful comments on a previous version of this paper. We thank Sharon Terry for background information about federal US agencies’ interests in the security of health data platforms. We also express our gratitude to three reviewers, Zubin Master, Gert Helgesson, and Glenn Cohen, for important insights that helped us to refine our argument.
Heidi Beate Benzen was funded by The Research Council of Norway (BIOTEK2021/238999). Kieran O’Doherty and Emily Christofides were supported by a Canadian Institutes of Health Emerging Team Grant. These funders were not involved in any way in the design of the study, or the collection, analysis, and interpretation of data.
Availability of data and materials
KO conceived the study and conducted primary drafting. EC and JY drafted sections of the manuscript. HB, WB, NH, BK, DW were all involved in drafting and critical reviewing of multiple drafts of the manuscript. All authors read and approved the final manuscript.
The authors declare that they have no competing interests.
Consent for publication
Ethics approval and consent to participate