Add like
Add dislike
Add to saved papers

3LGM2IHE: Requirements for data-protection-compliant research infrastructures. A systematic comparison of theory and practice-oriented implementation.

Objectives The TMF (Technology, Methods, and Infrastructure for Networked Medical Research) Data Protection Guide (TMF-DP) makes path-breaking recommendations on the subject of data protection in research projects. It includes comprehensive requirements for applications such as patient lists, pseudonymisation services and consent management services. Nevertheless, it lacks a structured, categorised list of requirements for simplified application in research projects and systematic evaluation. The DFG-founded 3LGM2IHE project ("Three-layer Graph-based meta model - Integrating the Healthcare Enterprise (IHE)") aims to define modeling paradigms and implement modeling tools for planning healthcare information systems. In addition, one of the goals is to create and publish 3LGM² information system architecture design patterns (short "design patterns") for the community as design models in terms of a framework. A structured list of data protection-related requirements based depicted from the TMF-DP is a precondition to integrate functions (3LGM² Domain Layer) and building blocks (3LGM² Logical Tool Layer) in 3LGM² design patterns. Methods In order to structure the continuous text of the TMF-DP, requirement types were defined in a first step. In a second step dependencies and delineations of the definitions were identified. In a third step, the requirements from the TMF-DP were systematically extracted. Based on the identified lists of requirements, a fourth step included the comparison of the identified requirements with exemplary open source tools as provided by the "Independent Trusted Third Party of the University Medicine Greifswald" (TTP tools). Results As a result, four lists of requirements were created, which contain requirements for the 'patient list', the 'pseudonymisation service' and the 'consent management', as well as cross-component requirements from the TMF-DP chapter 6 in a structured form. Further to requirements (A), possible variants (B) of implementations (to fulfill a single requirement) and recommendations (C) were identified. A comparison of the requirements lists with the functional scopes of the open source tools E-PIX (record linkage), gPAS (pseudonym management) and gICS (consent management) has shown that these fulfill more than 80% of the requirements. Conclusions A structured set of data protection-related requirements facilitates a systematic evaluation of implementations with respect to the fulfillment of the TMF-DP guidelines. These re-usable lists provide a decision aid for the selection of suitable tools for new research projects. As a result, these lists form the basis for the development of data protection-related 3LGM²-design patterns as part of the 3LGM2IHE-project.

Full text links

We have located links that may give you full text access.
Can't access the paper?
Try logging in through your university/institutional subscription. For a smoother one-click institutional access experience, please use our mobile app.

Related Resources

For the best experience, use the Read mobile app

Mobile app image

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app

All material on this website is protected by copyright, Copyright © 1994-2024 by WebMD LLC.
This website also contains material copyrighted by 3rd parties.

By using this service, you agree to our terms of use and privacy policy.

Your Privacy Choices Toggle icon

You can now claim free CME credits for this literature searchClaim now

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app