from Section 2 - Research ethics
Published online by Cambridge University Press: 05 September 2012
Introduction
Certificates of Confidentiality have existed to protect research data for over 40 years, yet they are rarely used (Cooper et al., 2004: 217). Relatively few researchers seek and obtain certificates, even in fields such as genetics where most researchers acknowledge collecting sensitive data. As Professor Mark Rothstein points out in his chapter on protecting privacy in this field of research (Chapter 6 of this volume), “[g]enome researchers often analyze and manipulate vast data sets derived from the 3.2 billion base-pair human genome” and involving the genetic material of thousands of individuals. These very large data sets often include extensive phenotypic data on individuals, including their identities and medical, behavioral, and social histories. In research focusing on alcohol and drug dependence, data collected may include evidence of illegal activities, as well as risky activity, dependence, or addiction. Any such evidence, if disclosed, could have serious negative consequences on participants’ employment and education opportunities and on their relationships within families and communities. Such databases could also provide tempting targets for law enforcement under a number of different scenarios (Earley and Strong, 1995: 728), from officials seeking information on possible child abuse or domestic violence (Marshall et al., 2003) to requests to search the database for a match to evidence left at a crime scene or on a victim.
This chapter will focus on Certificates of Confidentiality as one tool to protect the privacy and confidentiality of research data, particularly from the types of third-party requests arising from the legal system (subpoenas and court orders). First, it will review the history of Certificates of Confidentiality. Second, it will consider arguments for their use, particularly in genetic research on addiction. Third, it will review critiques of Certificates of Confidentiality, including whether they are necessary, whether they are effective, and whether they can be relied on to protect subjects’ sensitive information.
To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.