<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v23i6e26631</article-id>
      <article-id pub-id-type="pmid">34100760</article-id>
      <article-id pub-id-type="doi">10.2196/26631</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Secondary Use of Clinical Data in Data-Gathering, Non-Interventional Research or Learning Activities: Definition, Types, and a Framework for Risk Assessment</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Kukafka</surname>
            <given-names>Rita</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Swire</surname>
            <given-names>Peter</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Heryawan</surname>
            <given-names>Lukman</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Jungkunz</surname>
            <given-names>Martin</given-names>
          </name>
          <degrees>Dr</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Section for Translational Medical Ethics, Department of Medical Oncology</institution>
            <institution>National Center for Tumor Diseases</institution>
            <institution>Heidelberg University Hospital</institution>
            <addr-line>Im Neuenheimer Feld 460</addr-line>
            <addr-line>Heidelberg, 69120</addr-line>
            <country>Germany</country>
            <phone>49 6221 56 35059</phone>
            <email>martin.jungkunz@med.uni-heidelberg.de</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-1891-9790</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Köngeter</surname>
            <given-names>Anja</given-names>
          </name>
          <degrees>MA</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-0459-5059</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Mehlis</surname>
            <given-names>Katja</given-names>
          </name>
          <degrees>Dr</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6532-9876</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Winkler</surname>
            <given-names>Eva C</given-names>
          </name>
          <degrees>Prof., MD, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-7460-0154</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Schickhardt</surname>
            <given-names>Christoph</given-names>
          </name>
          <degrees>Dr</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2038-1456</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Section for Translational Medical Ethics, Department of Medical Oncology</institution>
        <institution>National Center for Tumor Diseases</institution>
        <institution>Heidelberg University Hospital</institution>
        <addr-line>Heidelberg</addr-line>
        <country>Germany</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Section for Translational Medical Ethics</institution>
        <institution>National Center for Tumor Diseases</institution>
        <institution>German Cancer Research Center (DKFZ)</institution>
        <addr-line>Heidelberg</addr-line>
        <country>Germany</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Martin Jungkunz <email>martin.jungkunz@med.uni-heidelberg.de</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>6</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>8</day>
        <month>6</month>
        <year>2021</year>
      </pub-date>
      <volume>23</volume>
      <issue>6</issue>
      <elocation-id>e26631</elocation-id>
      <history>
        <date date-type="received">
          <day>21</day>
          <month>12</month>
          <year>2020</year>
        </date>
        <date date-type="rev-request">
          <day>8</day>
          <month>2</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>10</day>
          <month>3</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>6</day>
          <month>5</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Martin Jungkunz, Anja Köngeter, Katja Mehlis, Eva C Winkler, Christoph Schickhardt. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 08.06.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2021/6/e26631" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>The <italic>secondary use of clinical data in data-gathering, non-interventional research or learning activities</italic> (<italic>SeConts</italic>) has great potential for scientific progress and health care improvement. At the same time, it poses relevant risks for the privacy and informational self-determination of patients whose data are used.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>Since the current literature lacks a tailored framework for risk assessment in <italic>SeConts</italic> as well as a clarification of the concept and practical scope of <italic>SeConts</italic>, we aim to fill this gap.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>In this study, we analyze each element of the concept of <italic>SeConts</italic> to provide a synthetic definition, investigate the practical relevance and scope of <italic>SeConts</italic> through a literature review, and operationalize the widespread definition of risk (as a harmful event of a certain magnitude that occurs with a certain probability) to conduct a tailored analysis of privacy risk factors typically implied in <italic>SeConts</italic>.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>We offer a conceptual clarification and definition of <italic>SeConts</italic> and provide a list of types of research and learning activities that can be subsumed under the definition of <italic>SeConts</italic>. We also offer a proposal for the classification of <italic>SeConts</italic> types into the categories <italic>non-interventional (observational) clinical research</italic>, <italic>quality control and improvement</italic>, or <italic>public health research</italic>. In addition, we provide a list of risk factors that determine the probability or magnitude of harm implied in <italic>SeConts</italic>. The risk factors provide a framework for assessing the privacy-related risks for patients implied in <italic>SeConts</italic>. We illustrate the use of risk assessment by applying it to a concrete example.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>In the future, research ethics committees and data use and access committees will be able to rely on and apply the framework offered here when reviewing projects of secondary use of clinical data for learning and research purposes.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>secondary use</kwd>
        <kwd>risk assessment</kwd>
        <kwd>clinical data</kwd>
        <kwd>ethics</kwd>
        <kwd>risk factors</kwd>
        <kwd>risks</kwd>
        <kwd>privacy</kwd>
        <kwd>electronic health records</kwd>
        <kwd>research</kwd>
        <kwd>patient data</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>The secondary use of clinical data for research purposes is increasingly recognized as a promising and crucial tool for improving health care and advancing medical research. Several initiatives strive to use data from medical care for secondary research and learning activities [<xref ref-type="bibr" rid="ref1">1</xref>]. The US Institute of Medicine has called for a transformation toward a learning health care system (LHCS) to improve quality, expedite translation, and reduce costs [<xref ref-type="bibr" rid="ref2">2</xref>]. The American Society of Clinical Oncology is pioneering the linkage of patient, provider, and research data with their quality improvement portal CancerLinQ [<xref ref-type="bibr" rid="ref3">3</xref>]. In Germany, the national Medical Informatics Initiative aims to establish a national network of data integration centers to collect, aggregate, and analyze clinical data from all university hospitals in Germany.</p>
      <p>There are numerous advantages of the secondary use of clinical data (ie, data derived from patient care) for research and learning activities. First, the clinical data are readily available. There is no need for any physical intervention or data collection through surveys. Costs for data aggregation, staff, and materials are considered to be low; data can be collected quickly [<xref ref-type="bibr" rid="ref4">4</xref>]. Data have a high level of generalization due to the real-life setting in which they are collected, and this facilitates representative sampling while simultaneously increasing external validity [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref6">6</xref>]. Moreover, large sample sizes can be obtained by aggregating the data from different sites. For example, this benefits research on rare diseases [<xref ref-type="bibr" rid="ref7">7</xref>]. Moreover, interventional studies that cannot be conducted prospectively due to ethical reasons may be performed retroactively [<xref ref-type="bibr" rid="ref8">8</xref>], for instance, by systematically analyzing experimental therapies such as off-label use of drugs. Most importantly, patients can contribute their clinical data to research or learning activities without being exposed to immediate physical risks [<xref ref-type="bibr" rid="ref5">5</xref>]. However, the secondary use of clinical data in research or learning activities entails data-associated risks that require further investigation.</p>
      <p>This paper focuses on the most relevant aspects for patients in particular and for the trustworthiness and sustainability of secondary use of clinical data in general: risks concerning patients’ privacy and informational self-determination. The European Union General Data Protection Regulation (GDPR) requires data processors to carry out an “assessment of the impact of the envisaged processing operations on the protection of personal data” where there is a high risk to the “rights and freedoms of natural persons” (Article 35, 1, GDPR). An appropriate framework for risk assessment of the secondary use of clinical data in research or learning activities is lacking, as is a conceptual basis for such secondary data use. We aim to fill this gap by developing a framework for risk assessment that supports decision makers in research ethics committees and data use and access committees, as well as scientists, bioethicists, and funders who deal with the ethics and governance of secondary use of clinical data in data-gathering, non-interventional research or learning activities (ie, research and learning activities that rely solely on the collection of existing data). We will develop the risk assessment framework on a strong conceptual and empirical basis of two preceding elementary steps: (1) an analytical clarification of the concept of secondary use of clinical data in data-gathering, non-interventional research or learning activities (<italic>SeConts</italic>); and (2) an illustration of the types of research and learning activities that can be subsumed under this concept.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <p>In this study, we proceed in three main steps, each with a methodological approach. In <italic>step one</italic>, our methodological approach to clarify the concept of <italic>SeConts</italic> is to investigate the <italic>intension.</italic> In other words, what does the concept of <italic>SeConts</italic> mean? We first analyze each element of the concept (analysis) and then compile them for a comprehensive definition of the concept (synthesis). As the application of this methodological approach to clarify the concept cannot easily be separated from the result itself (the definitional clarification of the concept), we decided not to separate them and thus present both parts in the <italic>Results</italic> section.</p>
      <p>Building on the clarification of the concept of <italic>SeConts</italic> (step 1), <italic>step 2</italic> examines its practical relevance. Regarding our methodological approach, we investigate the <italic>extension</italic> of the concept of <italic>SeConts</italic>, that is, the range of <italic>objects</italic> to which the concept can be applied. We examine concrete types of research or learning activities that can be subsumed under this concept. These types of research or learning activities were inferred from a scoping review (a), in which we searched PubMed and Google Scholar between October and November 2019 for bioethical literature that deals with the expected risks and benefits of secondary use of clinical data for biomedical research. The search terms used were <italic>ethics</italic>, <italic>secondary use</italic>, <italic>re-use</italic>, <italic>clinical data</italic>, <italic>electronic health records</italic>, <italic>risks</italic>, and <italic>benefits</italic> in different combinations. We limited our search to publications in English. We found numerous types of research or learning activities that, according to the authors, solely used clinical data. Next, we searched the biomedical literature for concrete studies (b) to find examples of previously identified types of research or learning activities. Relevant publications were identified after reading abstracts. After reading the full texts of the identified publications, we categorized them into the types of <italic>SeConts</italic> developed before (a).</p>
      <p>On the basis of step 1 (conceptual clarification of <italic>SeConts</italic>) and step 2 (examination of the practical relevance of <italic>SeConts</italic>), we develop a framework for the systematic assessment of risks implied in <italic>SeConts</italic> in <italic>step 3</italic>. Operationalizing the general concept of risk to tailor it to <italic>SeConts</italic> presents a key methodological challenge when developing a risk assessment framework. We apply a widespread definition of risk as a <italic>harmful event of a certain magnitude</italic> that occurs with a certain <italic>probability</italic> [<xref ref-type="bibr" rid="ref9">9</xref>-<xref ref-type="bibr" rid="ref11">11</xref>]. According to this definition, risk assessment ideally results in a number. If we bet US $10 on a single number out of 37 in the roulette, the probability of losing is 1−(1/37) and the magnitude of harm is US $10. The resulting risk could therefore be quantified by the number of 9.7, which is 10×[1−(1/37)]. Although this quantitative understanding of risk is intuitively plausible, it is fraught with several difficulties in the context of <italic>SeConts</italic> concerning the quantification of <italic>the probability</italic> and <italic>magnitude of harm</italic>.</p>
      <p>In terms of quantifying the <italic>probability</italic> of a harming event in the context of <italic>SeConts</italic>, there is neither a stochastic rule (as in the roulette example) nor empirical data that would allow an estimate of the probability of these events. Reports indicate that there have been data breaches (defined here as: <italic>all types of events in which the confidentiality and planned protection of data is violated, whether through technical failure, human error, or deliberate unethical or criminal acts</italic>) in the health care system in the past [<xref ref-type="bibr" rid="ref12">12</xref>-<xref ref-type="bibr" rid="ref14">14</xref>] that may suggest that such events could also occur in the context of <italic>SeConts</italic>. However, they do not allow for an assessment of their likelihood. Similarly, there is little information about the probability of further misuse of data stolen in the course of a breach. The <italic>magnitude of harm</italic> caused by the misuse of data is equally difficult to quantify. This is due to the fact that possible harm is predominantly of an immaterial social and psychological nature.</p>
      <p>In the field of data science and in bioethics, various approaches have been developed to address the problem of operationalizing risks without recourse to quantification [<xref ref-type="bibr" rid="ref15">15</xref>-<xref ref-type="bibr" rid="ref20">20</xref>]. However, these approaches are neither designed nor transferable to <italic>SeConts</italic>. In this paper, we therefore propose a nonquantitative approach to operationalize both the <italic>probability</italic> and <italic>magnitude of harm</italic> for the assessment of risks within <italic>SeConts</italic>. We (1) identify risk factors in relation to data and their use within <italic>SeConts</italic> that increase or decrease the probability and magnitude of harm, (2) assess their individual severity, and (3) subsequently estimate the overall risk of a specific form of <italic>SeConts</italic>.</p>
      <p>Similar to existing initiatives for secondary use of clinical data, such as the Medical Informatics Initiative [<xref ref-type="bibr" rid="ref21">21</xref>] or CancerLinQ [<xref ref-type="bibr" rid="ref3">3</xref>], we assume the following data flow from patients to <italic>SeConts</italic> (<xref rid="figure1" ref-type="fig">Figure 1</xref>): (1) Clinical data from electronic health records (EHRs) are deidentified, that is, identifying attributes (eg, names, addresses) are removed or replaced with a code. (2) Deidentified data are transferred to a central data warehouse and stored. (3) Deidentified data stored in the central data warehouse can be made available to researchers upon request to enable <italic>SeConts</italic>. Regarding risks to the confidentiality of EHRs that contain directly identifying data, there is evidence of leaks and attacks on EHRs. However, these risks affect every care unit that works with EHRs and are not specific to <italic>SeConts</italic>. Therefore, the risks to the confidentiality of EHRs are not the focus of our study.</p>
      <fig id="figure1" position="float">
        <label>Figure 1</label>
        <caption>
          <p>Flowchart of the secondary use of clinical data in data-gathering, non-interventional research or learning activities.</p>
        </caption>
        <graphic xlink:href="jmir_v23i6e26631_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <p>Regarding the operationalization of <italic>probability</italic>, we assume that the most negative consequences for the individual patient are only expected if the patient can be identified from the data. Therefore, we assume unauthorized reidentification as a prerequisite for possible harm in connection with <italic>SeConts</italic>. According to our understanding, factors that increase the <italic>probability of unauthorized reidentification</italic> also increase the probability of misuse. We identify two categories of factors that directly or indirectly determine the <italic>probability of unauthorized reidentification</italic>: data-specific and contextual factors.</p>
      <p>In terms of operationalizing the <italic>magnitude</italic> <italic>of harm</italic>, we distinguish different types of data according to their harm potential (see studies by Dyke at al [<xref ref-type="bibr" rid="ref20">20</xref>] and Rumbold and Pierscionek [<xref ref-type="bibr" rid="ref22">22</xref>]). To do this, we identify risk factors in the data that determine the extent of harm that may result from the misuse of the data. In other words, we provide an analytical answer to the question of what data aspects determine the degree of harm in the event of misuse. This approach is in line with the risk-based distinction between different categories of data in the GDPR (Article 9 GDPR).</p>
      <p>How did we arrive at the factors that determine the <italic>probability of unauthorized reidentification</italic> and <italic>magnitude of harm</italic>? In the <italic>first step</italic>, we built on existing literature. As a basis for the factors determining the <italic>probability of unauthorized reidentification</italic>, we focused on the literature from different areas: literature on ethical, legal, and social implications of <italic>SeConts</italic>; literature on data security, data protection, and the assessment of reidentification risks; and national German and European data protection laws and regulations. For factors that determine the <italic>magnitude of harm</italic>, we analyzed the literature on genetic data that are generally classified as very sensitive, to learn what makes these data sensitive and transfer this knowledge, mutatis mutandis, on other types of data. In the <italic>second step</italic>, we extracted the individual factors—for both the <italic>probability of unauthorized reidentification</italic> and the <italic>magnitude of harm</italic>—from the literature and categorized them inductively. In the <italic>third step</italic>, we cross-referenced the factors with qualitative interviews conducted with experts from research, care, medical informatics, patient advocacy, and politics on the topic of perceived risk potentials of <italic>SeConts</italic>, part of which are to be published elsewhere [<xref ref-type="bibr" rid="ref23">23</xref>]. In the presentation of the individual factors below, we refer to the literature on which they are based. Factors without a literature reference are taken from expert interviews that have not yet been published.</p>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Conceptual Clarifications and Definition of Secondary Use of Clinical Data in Data-Gathering, Non-Interventional Research or Learning Activities</title>
        <p>Secondary use of health data is defined by the American Medical Informatics Association as “non-direct care use of PHI [personal health information] including but not limited to analysis, research, quality/safety measurement, public health, payment, provider certification or accreditation, and marketing and other business including strictly commercial activities” [<xref ref-type="bibr" rid="ref24">24</xref>]. On the basis of a systematic scoping review, Robertson and colleagues categorized secondary use by distinguishing between four types of secondary use of clinical data: research, improving quality and safety of care, informing financial management, and education [<xref ref-type="bibr" rid="ref25">25</xref>]. These and other similar classifications [<xref ref-type="bibr" rid="ref26">26</xref>-<xref ref-type="bibr" rid="ref28">28</xref>] help in understanding the broad spectrum of secondary uses of clinical data and illustrate that it is not limited to research. However, as pertains to the focus of this paper, that is, <italic>the secondary use of clinical data in data-gathering, non-interventional research or learning activities</italic>, the generic classifications lack further specifications and detail.</p>
        <p>The term <italic>secondary use</italic> (or reuse) implies that there is also a primary use. Primary use encompasses the generation and use of data within the context of individual health care in hospitals and doctors’ offices to serve direct care needs. Secondary use refers to the use of these data for purposes other than individual care. Two points of criticism could be made against the distinction between primary and secondary use and the implied distinction between care and research. First, the distinction between care and research is notoriously difficult and widely discussed. Second, if secondary use of clinical data was to be implemented in the future as a standard in the health care system (ie, all health care data would be made available for possible research), this could lead to a tendency to collect data more systematically or collect more data than necessary in the care context, thereby blurring the distinction between data generation for care (primary use) and data generation for research (secondary use). In arguing against these two criticisms, however, we find that (1) ethical and legal codes are still fundamentally based on the distinction between care and research, which is unlikely to be abandoned in the coming years as blurred boundaries in governance and regulation are difficult to manage. Furthermore, we argue (2) that even if data are collected with the additional motivation of secondary use, the generation and collection of data would be driven by the primary goal of individual care.</p>
        <p><italic>Clinical data</italic> refers to data generated and collected in clinical contexts for patient care (diagnoses, anamnesis, treatment, medication, and so on) as well as data for accounting purposes or patient management, such as age, employment status, and other sociodemographic information. Clinical data also include data generated in the course of nonroutine treatment (off-label or experimental therapies) as long as it is collected for the primary objective of individual care. In terms of clinical data, we also include data reported from health care services and units to health insurance. In contrast to the widely used term health data, clinical data includes neither data gathered by (common, ie, nonclinical) smart devices and smartphone apps or research data understood as data generated for research purposes.</p>
        <p>In contrast to research that generates data, <italic>SeConts</italic> only <italic>gathers existing clinical data.</italic> The gathering of data in <italic>SeConts</italic> can be done either by collecting clinical data of different patients from one institution or several institutions or by collecting only the results of analyses of clinical data carried out in the institution of primary use (decentralized analysis).</p>
        <p><italic>SeConts</italic> is <italic>non-interventional</italic> as it does not use data from interventions carried out with the aim or priority of data generation for research. <italic>SeConts</italic> solely uses existing data from medical care. The data used in <italic>SeConts</italic> may originate from interventions, but only from interventions carried out for the sake of individual diagnosis and treatment.</p>
        <p>Both the terms <italic>research</italic> and <italic>learning activities</italic> refer to investigations in which the acquisition of generalizable knowledge beyond the needs and logic of individual care is the sole or primary intension. Research and learning activities cannot be clearly separated, but a rough distinction can be made in terms of their respective objectives. Research primarily aims at acquiring scientifically generalizable knowledge to be shared within the scientific community through scientific publications. Research usually indirectly improves health care and is realized through publications and by implementing practical conclusions based on research results. Learning activities, on the other hand, are designed to acquire knowledge about current care practices (eg, in a defined care unit) to derive appropriate and immediate measures to directly improve a specific health care unit or service. When talking about improving health care, the question arises whether <italic>SeConts</italic> has the potential to directly benefit the individual patient whose clinical data are reused. A direct (therapeutic) benefit is only possible under certain circumstances, for example, infection control of a clinical unit or research on a chronic disease. Younger patients with such a chronic disease could possibly benefit in several years from research that improves treatment of that very disease. However, as such benefits seem rather unlikely and exceptional, we understand <italic>SeConts</italic> as activities that are neither intended nor expected to directly benefit the individual patient whose data are used. In addition, there are ethical reasons for this narrow definition of <italic>SeConts</italic>, namely, to avoid any possibility of therapeutic misunderstanding.</p>
        <p>In summary, the central concept of this paper, that is, <italic>SeConts</italic> can be defined as activities that:</p>
        <list list-type="order">
          <list-item>
            <p>exclusively use data produced for the purposes of and in the context of health care.</p>
          </list-item>
          <list-item>
            <p>exclusively collect and do not generate data, that is, they are not based on data generated by interventions carried out primarily for the sake of research.</p>
          </list-item>
          <list-item>
            <p>aim to acquire generalizable knowledge that goes beyond the needs and logic of individual care.</p>
          </list-item>
          <list-item>
            <p>aim to directly improve health care units or services or publish their results for the promotion of biomedical science.</p>
          </list-item>
        </list>
        <p>In a nutshell, <italic>SeConts</italic> describes <italic>activities that solely use data produced for the sake of health care and in the context of health care to improve biomedical science or services.</italic></p>
      </sec>
      <sec>
        <title>Overview of Different Types of Secondary Use of Clinical Data in Data-Gathering, Non-Interventional Research or Learning Activities</title>
        <p>Having clarified the concept of <italic>SeConts</italic> in the previous section, we now examine the scope and practical relevance of the concept of <italic>SeConts</italic> as previously defined. Which studies fall under the concept of <italic>SeConts</italic> (scope)? What is their practical relevance to medical research and improving medical care? We explore these questions in the next section. The literature review carried out to investigate the scope and practical relevance of research or learning activities that fall within our definition of <italic>SeConts</italic> (step 1) led to the following results: many types of research or learning activities common in the field of quality control and quality improvement can be subsumed under the concept of <italic>SeConts</italic> (in particular, under the term <italic>learning activities</italic>). Examples include <italic>improvement of infection control</italic>, which can be done by monitoring clinical data in hospitals to identify patients at high risk of infection [<xref ref-type="bibr" rid="ref29">29</xref>]. Clinical data can also be used to create computerized algorithms for the <italic>early detection of possible hazards from germs</italic> [<xref ref-type="bibr" rid="ref30">30</xref>]. These activities can be considered a component of the comprehensive ideal for transforming a particular health care institution into an LHCS.</p>
        <p>At the national level, clinical data are used for <italic>public health surveillance</italic>. For instance, data from EHRs are searched for indicators of influenza in primary care to detect a pandemic in its early phase [<xref ref-type="bibr" rid="ref31">31</xref>]. <italic>Epidemiological studies</italic> focus on the distribution of diseases as well as their causes and effects in populations, such as studies on the epidemiology of a certain infection to inform and improve vaccination initiatives [<xref ref-type="bibr" rid="ref32">32</xref>]. In <italic>outcomes research</italic>, the effects (outcome) of certain interventions are investigated, such as the effects of a nationwide antismoking law on childbirth in the area of public health [<xref ref-type="bibr" rid="ref33">33</xref>] or, on a clinical care level, evaluating the quality of care [<xref ref-type="bibr" rid="ref34">34</xref>]. In <italic>health services research</italic>, investigators can use clinical data to explore the mean costs associated with (treatment of) a certain disease [<xref ref-type="bibr" rid="ref35">35</xref>]. A well-established form of secondary use of clinical data is <italic>registry studies</italic> analyzing collections of data on all patients affected by a particular disease (registries) such as cancer registries [<xref ref-type="bibr" rid="ref36">36</xref>].</p>
        <p>Clinical data are also reused in clinical research in the form of <italic>in-silico hypothesis testing</italic>, where clinical trials are modeled with the help of data from EHRs [<xref ref-type="bibr" rid="ref37">37</xref>]. Moreover, clinical data can be used for <italic>comparative effectiveness research</italic> [<xref ref-type="bibr" rid="ref38">38</xref>] to compare “the benefits and harms of alternative methods to prevent, diagnose, treat, and monitor a clinical condition or to improve the delivery of care” [<xref ref-type="bibr" rid="ref39">39</xref>]. <italic>Evaluation of experimental therapies</italic> can be conducted in terms of <italic>SeConts</italic>, for instance, by sharing data from single off-label (or compassionate) use from different hospitals. The secondary use of data from these therapies can help inform other physicians with similar patients about the course and outcome of different experimental therapeutic approaches [<xref ref-type="bibr" rid="ref40">40</xref>]. Other studies that reuse clinical data in the sense of <italic>SeConts</italic> are <italic>drug safety and efficacy studies</italic> [<xref ref-type="bibr" rid="ref41">41</xref>]. In addition, some basic research is conceivable using existing clinical data, such as <italic>studies on risk factors</italic> for certain diseases that can be linked to single influencing or moderating factors [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]. Another form of secondary use of clinical data lies in the area of <italic>informatics research</italic>, which uses clinical data to develop new software tools that have the potential to improve patient care or analyze and improve data security within a health system [<xref ref-type="bibr" rid="ref44">44</xref>].</p>
        <p>In addition to the different studies mentioned above, clinical data can be used in an <italic>explorative</italic> manner, which can be understood as encompassing three (potentially subsequent) steps. First, data can be analyzed (possibly using artificial intelligence) to <italic>generate hypotheses</italic> for future studies; second, in the case of new research ideas resulting from this, the data can be used to <italic>check feasibility</italic>; and third, to <italic>identify potential participants</italic> for recruitment of upcoming studies [<xref ref-type="bibr" rid="ref45">45</xref>].</p>
        <p>To further clarify the scope and concept of <italic>SeConts</italic> (by means of definitio ex negativo), we also want to mention two areas beyond the concept of <italic>SeConts</italic>: prospective clinical trials (eg, randomized controlled trials) and all other forms of studies that include interventions carried out for the sake of generating data; genome wide association studies in so far as they combine clinical data (phenotypes) with sequencing data generated for research purposes (genotypes).</p>
        <p>Thus far, we have illustrated that there are many types of research or learning activities that can be conducted in the sense of <italic>SeConts</italic>. These types of research or learning activities display huge heterogeneity with respect to study designs, research questions, and contexts. Even the names of the types show this heterogeneity, as they refer to very different attributes describing the respective type of <italic>SeConts</italic>: some names refer to a specific method or study design (eg, in-silico hypothesis testing), whereas others refer to a subject area (eg, epidemiology). Given this heterogeneity, the question arises as to whether the different types of <italic>SeConts</italic> can be categorized in a way that allows for a better overview. The literature that attempts to capture the potential applications of secondary use of clinical data does not systematically distinguish between different types of research and learning activities [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. Therefore, we searched for criteria or a particular logic that would provide some kind of categorization of the different types of <italic>SeConts</italic>. Some criteria that provide useful approaches to classification in other biomedical contexts are inappropriate. For example, although categorization by medical specialty seems conceivable at first glance, we determined it to be unhelpful on closer inspection. With all the different specialties that exist in medicine, such a categorization does not provide any reduction of heterogeneity. Categorization into common typologies of biomedicine, such as <italic>basic research</italic>, <italic>clinical research</italic>, and <italic>translational research</italic>, is also not useful, because learning activities, as described above, cannot be clearly assigned here. Ultimately, we found a categorization in terms of the <italic>object of investigation</italic> (ie, the entity about which <italic>SeConts</italic> seeks to produce knowledge) using three levels most appropriate. These three levels are familiar from the social sciences: micro level, meso level, and macro level. The object of investigation can be either patients (micro level), clinical care units such as clinical departments or single hospitals—a specific delimited patient population (meso level), or the general public (macro level). Taking the <italic>object of investigation</italic> as a criterion, we can attribute each type of research or learning activities to a general area of application: <italic>non-interventional (observational) clinical research</italic> focusing on individuals, <italic>quality control and improvement</italic> (and similar uses contributing to the creation of an LHCS) focusing on clinical units, and <italic>public health research</italic> focusing on the general public. <xref ref-type="table" rid="table1">Table 1</xref> sums up all types of the aforementioned research or learning activities, including the object of investigation and area of application. It also shows that some types of research or learning activities are not limited to a single object of investigation or area of application.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Possible types of research or learning activities within secondary use of clinical data in data-gathering, non-interventional research or learning activities.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="300"/>
            <col width="300"/>
            <col width="400"/>
            <thead>
              <tr valign="top">
                <td>Type of research or learning activities</td>
                <td>Object of investigation</td>
                <td>Area of application</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Improvement of infection control</td>
                <td>Clinical unit</td>
                <td>Quality control and improvement</td>
              </tr>
              <tr valign="top">
                <td>Early detection of possible hazards from germs</td>
                <td>Clinical unit</td>
                <td>Quality control and improvement</td>
              </tr>
              <tr valign="top">
                <td>Public health surveillance</td>
                <td>General public</td>
                <td>Public health research</td>
              </tr>
              <tr valign="top">
                <td>Epidemiology</td>
                <td>General public</td>
                <td>Public health research</td>
              </tr>
              <tr valign="top">
                <td>Outcomes research</td>
                <td>Patients or clinical unit</td>
                <td>Public health research or quality control and improvement</td>
              </tr>
              <tr valign="top">
                <td>Health services research</td>
                <td>General public</td>
                <td>Public health research</td>
              </tr>
              <tr valign="top">
                <td>Register studies</td>
                <td>General public</td>
                <td>Public health research</td>
              </tr>
              <tr valign="top">
                <td>In-silico hypothesis testing</td>
                <td>Patients</td>
                <td>Non-interventional (observational) clinical research</td>
              </tr>
              <tr valign="top">
                <td>Comparative effectiveness research</td>
                <td>Patients</td>
                <td>Non-interventional (observational) clinical research</td>
              </tr>
              <tr valign="top">
                <td>Experimental therapy evaluation</td>
                <td>Patients</td>
                <td>Non-interventional (observational) clinical research</td>
              </tr>
              <tr valign="top">
                <td>Drug safety and efficacy studies</td>
                <td>Patients</td>
                <td>Non-interventional (observational) clinical research</td>
              </tr>
              <tr valign="top">
                <td>Studies on risk factors</td>
                <td>Patients</td>
                <td>Non-interventional (observational) clinical research</td>
              </tr>
              <tr valign="top">
                <td>Medical informatics research</td>
                <td>Patients, clinical unit, or general public</td>
                <td>Possible in all three areas of application</td>
              </tr>
              <tr valign="top">
                <td>Explorative use</td>
                <td>Patients, clinical unit, or general public</td>
                <td>Possible in all three areas of application</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Tailored Framework for Risk Assessment of Secondary Use of Clinical Data in Data-Gathering, Non-Interventional Research or Learning Activities</title>
        <sec>
          <title>Risks for Informational Self-determination and Confidentiality</title>
          <p>In the previous section, we addressed two desiderata of the current literature on <italic>SeConts</italic> by defining our understanding of <italic>SeConts</italic> and clarifying its scope and practical relevance. These steps allow us to offer what we consider to be the third desideratum: a detailed analysis of risks for patients implied in <italic>SeConts</italic> as well as a framework to assess these risks. The risks to patients associated with the data are critical to <italic>SeConts</italic> because if they were to materialize, they could also have a major impact on the role, trustworthiness, and reputation of doctors, hospitals, and the public health system. <italic>SeConts</italic> implies potential risks for patients because of their (potentially reidentifiable and sensitive) clinical data being used. We assume that <italic>SeConts</italic> will usually rely on clinical data that cannot be classified as anonymous data. Even if direct identifiers are removed from data or replaced by a code (deidentification), the possibility of reidentifying a specific person in the data can rarely be excluded (see the list of potential risk factors below). In most cases, <italic>SeConts</italic> will use deidentified personal (or person-related) data; they imply risks for patients’ right to <italic>informational self-determination</italic>.</p>
          <p>The term informational self-determination refers to “a person’s ability to freely decide whether and how personal data and information about her are collected, stored, multiplied, processed, and transferred by third parties” [<xref ref-type="bibr" rid="ref46">46</xref>]. We regard informational self-determination as an instrumental value, that is, a means of protecting liberal individual and social rights and values such as equality or personal autonomy [<xref ref-type="bibr" rid="ref47">47</xref>-<xref ref-type="bibr" rid="ref49">49</xref>]. The protection of informational self-determination is particularly important in the health care sector: clinical data are highly sensitive as they contain information about the health status of a person and can therefore be highly susceptible to possible misuse. The confidentiality of the data is crucial for the patient-physician relationship and communication.</p>
          <p><italic>SeConts</italic> can have a negative impact on the patient’s ability to exercise informational self-determination in two ways (<xref rid="figure2" ref-type="fig">Figure 2</xref>): (1) the fear of a loss of informational self-determination and (2) its actual loss in case of data breaches in the meaning defined above (which, in turn, will most likely reinforce the fear of a loss of informational self-determination among patients).</p>
          <fig id="figure2" position="float">
            <label>Figure 2</label>
            <caption>
              <p>Possible negative impact of the secondary use of clinical data in data-gathering, non-interventional research or learning activities on the patient’s ability to exercise informational self-determination.</p>
            </caption>
            <graphic xlink:href="jmir_v23i6e26631_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>With regard to fear (1), it is important to stress that informational self-determination is not only impaired if there are indications that third parties have accessed the data without authorization (and might or do use them against the data subject). Informational self-determination is already undermined if data subjects have reasons to develop a sense of vague uncertainty about the confidentiality of personal data [<xref ref-type="bibr" rid="ref50">50</xref>] (chilling effect [<xref ref-type="bibr" rid="ref51">51</xref>]). The fear of loss of informational self-determination alone can already have negative consequences. For instance, the fear that their data are not protected from unauthorized access can lead to patients not disclosing all the information that could be important for their personal care [<xref ref-type="bibr" rid="ref52">52</xref>,<xref ref-type="bibr" rid="ref53">53</xref>] due to a lack of confidence in their physician.</p>
          <p>Concerning actual losses of informational self-determination (2), data breaches are a serious threat. A study carried out between 2010 and 2013 revealed a total of 949 data breaches in American hospitals involving almost 30 million patient records [<xref ref-type="bibr" rid="ref14">14</xref>]. Even if the reported data breaches occurred in the context of patient care, and not in the context of <italic>SeConts</italic>, they uncover general problems with the protection of clinical data. As assumed by several authors [<xref ref-type="bibr" rid="ref52">52</xref>,<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref55">55</xref>], the negative consequences of data breaches, including unauthorized reidentification, could range from minor annoyances through personalized advertising to serious harms such as identity theft, stigmatization, blackmail, or discrimination, as well as other forms of data use without patient consent, such as the sale of data or use in studies in which patients have not consented.</p>
        </sec>
        <sec>
          <title>Criteria to Assess Risk: Probability of Unauthorized Reidentification and Magnitude of Harm</title>
          <p>In the previous chapter, we outlined the potential risks to patients’ informational self-determination associated with <italic>SeConts</italic>. On the basis of our approach to assessing these risks (probability and magnitude of harm, see <italic>Methods</italic> section), we present a list of relevant factors that determine the <italic>probability of unauthorized reidentification</italic> and the <italic>magnitude of harm</italic>. These factors are partly interrelated and cannot always be clearly distinguished. <xref rid="figure3" ref-type="fig">Figure 3</xref> provides an overview of the relevant factors, which we discuss in more detail below.</p>
          <fig id="figure3" position="float">
            <label>Figure 3</label>
            <caption>
              <p>Factors of risk assessment for the secondary use of clinical data in data-gathering, non-interventional research or learning activities.</p>
            </caption>
            <graphic xlink:href="jmir_v23i6e26631_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>There are three data-specific factors that determine the probability of unauthorized reidentification:</p>
          <list list-type="order">
            <list-item>
              <p><italic>Uniqueness</italic> of a data set [<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref57">57</xref>]: Even after removing identifying attributes (name, date of birth, etc), unauthorized reidentification is possible, as the combination of attributes of a person’s medical record can be identifying. Therefore, the more unambiguously a person is represented in a data set by the combination of individual attributes, the higher the probability of unauthorized reidentification. Statistically, the smaller the number of cases in a data set, the more likely it is to correctly assign one data set to a specific individual. In addition, a larger number of variables (attributes of patients) in a data set allows for a more unique combination of attributes that again increases the probability of unauthorized reidentification [<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref59">59</xref>]. Concepts such as <italic>k</italic>-anonymity [<xref ref-type="bibr" rid="ref60">60</xref>], <italic>l</italic>-diversity [<xref ref-type="bibr" rid="ref61">61</xref>], and<italic>t</italic>-closeness [<xref ref-type="bibr" rid="ref62">62</xref>] aim to mitigate these risks by defining standards for data sets to reduce the probability of unauthorized reidentification.</p>
            </list-item>
            <list-item>
              <p><italic>Stability over time</italic> [<xref ref-type="bibr" rid="ref63">63</xref>]: The more stable the attributes described in the data, the more likely it is to link the data set to a specific person. If an attribute described in the data is not permanent and is likely to change between each measurement (eg, blood pressure or blood glucose levels), it is impossible to use the associated data to uniquely assign it to an individual patient.</p>
            </list-item>
            <list-item>
              <p><italic>Interpretability:</italic> Certain types of data require special skills or technical tools to understand them. Thus, the degree to which data is easier or more difficult to interpret determines the number of people who are able to misuse the data. For example, anyone can interpret data relating to obesity, but laypersons are currently unable to interpret data from genetic sequencing or magnetic resonance imaging.</p>
              <p>However, the interpretability of data is a dynamic factor. Modern software development suggests that the interpretation of certain data might soon be supported by self-learning algorithms that may allow laypersons to interpret complex data such as genomic data or magnetic resonance imaging. <italic>Interpretability</italic> is directly related to the possible contexts in which data are used.</p>
            </list-item>
          </list>
          <p>In addition to the data-specific factors regarding the probability of unauthorized reidentification in the context of <italic>SeConts</italic>, seven contextual factors must be considered.</p>
          <list list-type="order">
            <list-item>
              <p><italic>Third-party data:</italic> Personal data of patients stored by third parties, such as voting registers or records from residents’ registration offices, can be used for reidentification when linked to clinical data [<xref ref-type="bibr" rid="ref64">64</xref>-<xref ref-type="bibr" rid="ref66">66</xref>]. Therefore, the availability of third-party data makes unauthorized reidentification easier [<xref ref-type="bibr" rid="ref63">63</xref>], especially when the factor of uniqueness of the data set is high.</p>
            </list-item>
            <list-item>
              <p><italic>Data protection level:</italic> Every act of data exchange with other institutions or countries or jurisdictions brings with it the possibility of weaker data protection standards. The legally required data protection level that is binding to the recipient must therefore be taken into account [<xref ref-type="bibr" rid="ref67">67</xref>].</p>
            </list-item>
            <list-item>
              <p><italic>Technical and organizational measures:</italic> Adequate measures need to be taken by the data recipient to protect the data. Here, the data protection level of the recipient, for example, according to approved codes of conduct (Article 40, EU-GDPR) or a data protection certification (Article 42, EU-GDPR), can be used as a benchmark.</p>
            </list-item>
            <list-item>
              <p><italic>Technological capabilities:</italic> The factor <italic>technological capabilities</italic> describes the technical means available to the respective data recipient to perform unauthorized reidentification. These include self-learning algorithms or other forms of artificial intelligence [<xref ref-type="bibr" rid="ref68">68</xref>].</p>
            </list-item>
            <list-item>
              <p><italic>Retention periods</italic>: The longer the data are stored, the higher the risk of a data breach that can lead to unauthorized reidentification. Therefore, the retention (and deletion) periods specified by the data recipient are relevant factors in estimating the probability of unauthorized reidentification.</p>
            </list-item>
            <list-item>
              <p><italic>Trustworthiness:</italic> The factor <italic>trustworthiness</italic> is determined by several aspects [<xref ref-type="bibr" rid="ref67">67</xref>]: the existence of binding (sanctionable) contracts that determine the terms of data use and access; the existence of ethical or legal codes on the part of the data recipient [<xref ref-type="bibr" rid="ref22">22</xref>]; the primary interest of the receiver, for example, monetary or public interests; the verifiability of the use of the data in accordance with the applicable regulations or contracts.</p>
            </list-item>
            <list-item>
              <p><italic>Data sharing model:</italic> Depending on the data sharing model, data are disclosed to a different number of people; for example, data can be disclosed only to a small work group, a consortium, or can be uploaded to a public database. Every person with access to the data increases the probability of unauthorized reidentification.</p>
            </list-item>
          </list>
          <p>Together with the aforementioned factors determining the probability of unauthorized reidentification, the following five factors must be considered to determine the magnitude of possible harm.</p>
          <list list-type="order">
            <list-item>
              <p><italic>Predictive potential:</italic> The predictive potential of data refers to the extent to which a data set contains information that allows insights regarding future health status [<xref ref-type="bibr" rid="ref69">69</xref>-<xref ref-type="bibr" rid="ref71">71</xref>]. If a data set has a time-limited relevance, it can be considered less problematic than a data set that allows conclusions to be drawn about a person’s expected state of health for the next 30 years. Information with predictive potential could be, for example, the diagnosis of a chronic disease, but also the documentation of traumatic events that make a posttraumatic stress disorder diagnosis very likely within the next few years. In contrast, information about a fracture, for instance, does not necessarily provide information about future health status.</p>
            </list-item>
            <list-item>
              <p><italic>Potential for discrimination:</italic> Some data have obvious potential for discrimination because they contain information that can be used against individuals and groups. For example, it is conceivable that some employers discriminate against employees (eg, by not renewing contracts) if they know that the employee is affected by an illness (or has a disposition to illness) that is likely to lead to a longer absence of the employee in the future. Furthermore, stigmatization is possible [<xref ref-type="bibr" rid="ref20">20</xref>]. For example, the disclosure of an HIV diagnosis can lead to stigmatization (through prejudice or social rejection).</p>
            </list-item>
            <list-item>
              <p><italic>Scope:</italic> The factor <italic>scope</italic> describes whether the information, and thus the possible risk in the data is limited to the data subject or whether it allows inferences about family members (eg, in the case of genomic information [<xref ref-type="bibr" rid="ref69">69</xref>]) or colleagues (eg, information on diseases related to certain working conditions) [<xref ref-type="bibr" rid="ref70">70</xref>].</p>
            </list-item>
            <list-item>
              <p><italic>Coverage:</italic> The factor <italic>coverage</italic> describes the data in terms of the period in which they were collected. Data from a single hospital visit cover a less extensive period than data documenting the entire medical history, for example, as collected by insurance companies. A complete medical history is likely to provide a more multifaceted picture of a person’s life than data collected on a single point in time and can therefore potentially cause greater harm in the event of misuse.</p>
            </list-item>
            <list-item>
              <p><italic>Informative potential in the future:</italic> Some data types can be expected to contain more information than can currently be made available. For example, we currently assume that the information content of genomic data is still largely unknown [<xref ref-type="bibr" rid="ref70">70</xref>]. However, the constant progress in the field of genomic research suggests that in the future, we will be able to retrieve significantly more information from genomic data than is the case today, which can potentially cause greater harm in case of misuse.</p>
            </list-item>
          </list>
        </sec>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Application and Use of the Risk Assessment</title>
        <p>After introducing the individual factors that determine the <italic>probability of unauthorized reidentification</italic> and the <italic>magnitude of harm</italic> implied by <italic>SeConts</italic>, questions arise concerning their application and use. How do these factors form a comprehensive framework for risk assessment in the context of <italic>SeConts</italic>? How can the framework be applied? How can the assessment results be used? Who may apply and use this framework?</p>
        <p>With our risk assessment, we intend to support the analysis, evaluation, and potential decision-making process of research ethics committees and data use and access committees, as well as scientists, bioethicists, and funders investigating the ethical acceptability of requests for concrete types of <italic>SeConts</italic>. We recommend the following procedure with five consecutive steps to apply and use the risk assessment framework.</p>
        <sec>
          <title>Application of the Risk Assessment (Steps 1 and 2)</title>
          <p>The first two steps concern the application of the risk assessment framework:</p>
          <list list-type="bullet">
            <list-item>
              <p>Step 1—<italic>identification and evaluation of single risk factors:</italic> A concrete projected study is examined in light of all factors determining the probability of unauthorized reidentification and magnitude of harm listed in <xref rid="figure3" ref-type="fig">Figure 3</xref>. The individual severity of each factor is evaluated, that is, whether and to what extent the factor is present and relevant in the specific study (plans) by classifying it as low, midrange, or high. We advise <italic>against</italic> converting these levels into numbers (eg, low=1, medium=2, and high=3), as this would falsely suggest a mathematical accuracy and cardinal order and could lead to a misinterpretation.</p>
            </list-item>
            <list-item>
              <p>Step 2—<italic>comprehensive evaluation of risks for patients:</italic> An overview of the evaluation of the single factors leads to a comprehensive picture of the risk profile of the concrete study. At this point, the methodological question of the relationship between the individual factors arises: Is the same importance attached to each factor, or are some factors considered more important than others and therefore given greater weight when moving from the estimates of the individual factors to a more comprehensive picture? We do not consider it plausible to state a priori that some factors are more important or should count more than other factors. As a default approach to a comprehensive evaluation of risks for patients in practice, we recommend that all factors be weighted equally. In particular circumstances, practical reasoning might suggest that the estimation of a single factor as <italic>high</italic> still does not adequately reflect the importance of that factor in the assessment of the comprehensive evaluation of risks for patients. In this case, more weight could be given to this factor, or it could even be treated as a decisive or exclusionary criterion. This might be appropriate, for instance, if a study plans to store very large and detailed sets of personal data in an open access data repository (factor <italic>data sharing model</italic>).</p>
            </list-item>
          </list>
          <p>The fact that we advise against using numbers to evaluate the individual factors (step 1) already excludes the possibility of summing up numerical values as part of a comprehensive evaluation of risks for patients and presenting the risk (step 2) in a single number. Such a numerical approach would unreasonably suggest a mathematical or empirical reliability or precision that is not justified by the framework. Instead, a comprehensive evaluation of risks for patients is based on a rough summary of the evaluations of the single factors, considering their individual weight within the evaluated study. The results of the comprehensive evaluation of risks for patients can again be presented as low, midrange, or high, depending on the distribution of the individual factors.</p>
        </sec>
        <sec>
          <title>Use of the Tailored Risk Assessment (Steps 3-5)</title>
          <p>Steps 3-5 concern the use of the risk assessment framework:</p>
          <list list-type="bullet">
            <list-item>
              <p>Step 3—<italic>complete risk assessment:</italic> It is important to be aware of the fact that the risk assessment addresses data-related risks for patients, which we deem to be the central and most important kind of risk from <italic>SeConts</italic>, but which are potentially still not the only kind of risk. Therefore, to gain a complete and comprehensive understanding, risks for other stakeholders (such as physicians and institutions) need to be taken into consideration.</p>
            </list-item>
            <list-item>
              <p>Step 4—<italic>comprehensive ethical evaluation:</italic> The complete risk assessment of a study is only one part of the comprehensive ethical evaluation. Typically, comprehensive ethical evaluation needs to include other aspects, in particular, the potential benefits of the envisaged study (to analyze and assess the risk-benefit ratio).</p>
            </list-item>
            <list-item>
              <p>Step 5—<italic>reducing the risk profile by mitigating single factors:</italic> The comprehensive ethical evaluation (step 4) can lead to three evaluation results of a planned study: (1) unethical and thus to be rejected, (2) ethically problematic but approvable under certain conditions, and (3) ethically sound and thus to be approved. In the case of (2), the applicant may be required to take specific measures to mitigate data-related risk to the data subjects. Tailored risk reduction measures should be chosen in light of the identification and evaluation of single risk factors (step 1) and against the backdrop of the comprehensive evaluation of risks for patients (step 2). Possible risk reduction measures may, for example, include modifying the data set to reduce the factor <italic>uniqueness</italic>, for example, by aggregating information (eg, age groups instead of age). In addition, special data sharing contracts can be applied to reduce the number of people who have access to the data (factor <italic>data sharing model</italic>).</p>
            </list-item>
          </list>
        </sec>
        <sec>
          <title>A Practical Example of the Application of the Risk Assessment</title>
          <p>After presenting the application and use, in the following section, we illustrate our risk assessment (steps 1 and 2) by applying it to a concrete study. Our example is a study on the epidemiology of Streptococcus pneumoniae infections [<xref ref-type="bibr" rid="ref32">32</xref>] that we mentioned above in our list of examples for <italic>SeConts</italic>. According to the different areas of application (<italic>non-interventional [observational] clinical research</italic>, <italic>quality control and improvement</italic>, <italic>public health research</italic>) of <italic>SeConts</italic> we introduced above, the study can be classified as public health research. It gathers data from medical charts on “demographic characteristics, clinical syndromes, underlying conditions [eg, chronic diseases], and outcomes of illness” [<xref ref-type="bibr" rid="ref32">32</xref>]. <xref rid="figure4" ref-type="fig">Figure 4</xref> illustrates the application of the risk assessment framework for each factor (step 1) to a concrete example (For the sake of complete illustration of the risk assessment framework, we have added certain features to the study context where the study does not provide detailed information.).</p>
          <fig id="figure4" position="float">
            <label>Figure 4</label>
            <caption>
              <p>Practical example of a study on the epidemiology of Streptococcus pneumoniae infections.</p>
            </caption>
            <graphic xlink:href="jmir_v23i6e26631_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>In accordance with the application of our risk assessment approach, the results are as follows: (1) The probability of unauthorized reidentification can be considered relatively low because the majority of the relevant factors were assessed as low and (2) the magnitude of harm is in the midrange because most factors relevant to harm magnitude were assessed to be low or midrange. The comprehensive evaluation (step 2) shows that the overall risk for patients can be considered relatively low to midrange. After taking into account risks for other stakeholders (step 3), as well as the potential benefits of the study and other ethically relevant points (step 4), reviewers could request further mitigation of single risk factors (step 5). In our example, however, this is only possible to a limited extent because not all risk factors can be addressed without rendering the study itself impossible.</p>
        </sec>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Having presented our risk assessment, its application and use, and illustrating its applicability by means of a concrete example, we will address the limitations and possible criticisms of our framework. Two objections can be raised against the risk assessment approach. First, we classify a priori certain data types according to their harm potential as a basis for operationalizing the <italic>magnitude of harm</italic>. However, it can be argued that such an a priori classification does not take into account the information that can be inferred from the data beyond the apparent information content [<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref73">73</xref>]: Information that is considered potentially harmful (eg, sexual orientation, religious beliefs) can be derived from information that would probably be considered harmless a priori (eg, Facebook likes) [<xref ref-type="bibr" rid="ref74">74</xref>]. We are aware that our a priori classification of data does not consider possible inferences that can be drawn from data in the future. However, there is an important difference in whether data contain information about a certain diagnosis or whether this diagnosis can only be assumed with a certain probability. Likewise, possible inferences that can be drawn from the data can rarely be predicted a priori. Therefore, our approach is limited to identifying the types of data that have a clear potential to cause harm themselves.</p>
        <p>A second possible criticism of the proposed approach is conceivable. Regardless of whether information is inferred indirectly from data or whether the information is contained directly in it, the same data can entail different levels of individual risk for different people. Risk assessment, such as the one we present here, cannot reflect these different levels of individual risk. Both the probability of unauthorized reidentification and the possible magnitude of harm can be very different for the same data types in different people. The x-ray of a patellar luxation may be considered as nonsensitive information for most people, especially as it does not contain any identifying information. Nevertheless, a professional soccer player might disagree, as the information in the data contains the risk of unauthorized reidentification (due to possible analog and comparable x-rays of his club) and could be potentially harmful to his career (eg, through discrimination in relation to a possible contract extension). Our approach cannot depict these individually possible risks and can only provide guidelines for the assessment of generally expected risks. The risks of individual persons with special risk profiles must be addressed using individual measures. Among other things, this calls for the establishment of a suitable information and consent procedure or an opt-out option that allows persons with an individually high risk to decide for themselves whether this risk is too high or not. Which model of informed consent may be appropriate is not the subject of this study.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>In this paper, we addressed three desiderata of the current literature on <italic>SeConts.</italic> In the first step, we clarified the concept of <italic>SeConts.</italic> To this end, we analyzed each element of the concept and then provided a comprehensive definition of <italic>SeConts</italic> as <italic>activities that solely use data produced for the sake of health care and in the context of health care to improve biomedical science or services.</italic></p>
        <p>In the second step, we illustrated the scope and practical relevance of <italic>SeConts</italic> by providing a list of concrete types of research or learning activities that can be subsumed under the concept. These types of research or learning activities were roughly classified as either <italic>non-interventional (observational) clinical research</italic>, <italic>quality control and improvement</italic>, or <italic>public health research</italic>.</p>
        <p>In the third step, we provided a framework for risk assessment for <italic>SeConts</italic>, focusing on the risks for patients related to informational self-determination. By operationalizing the concept of risk for application to <italic>SeConts</italic>, we identified factors that determine the <italic>probability of unauthorized reidentification</italic> as well as the <italic>magnitude of harm</italic> of a potential harming event implied in <italic>SeConts</italic>. We then discussed the application and use of our risk assessment framework and presented a practical example of a concrete study to illustrate its application.</p>
        <p>Through our conceptual clarification of <italic>SeConts</italic>, we created a basis for understanding what <italic>SeConts</italic> means. The analysis of its scope shows that <italic>SeConts</italic> can realize its potential in a broad field of medical research. This illustrates the high practical relevance of <italic>SeConts</italic>. The risk assessment presented can be applied as an essential building block for an ethical evaluation of concrete <italic>SeConts</italic> conducted by research ethics committees and data use and access committees, as well as scientists, bioethicists, and funders. It can thus benefit the safe secondary use of clinical data in data-gathering, non-interventional research or learning activities.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">DFG</term>
          <def>
            <p>Deutsche Forschungsgemeinschaft</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">EHR</term>
          <def>
            <p>electronic health record</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">GDPR</term>
          <def>
            <p>General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">LHCS</term>
          <def>
            <p>learning health care system</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">LinCDat</term>
          <def>
            <p>Learning from Clinical Data</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">SeConts</term>
          <def>
            <p>secondary use of clinical data in data-gathering, non-interventional research or learning activities</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This paper was developed within the framework of the project <italic>Learning from Clinical Data (LinCDat)</italic> funded by the Deutsche Forschungsgemeinschaft (DFG; German Research Foundation)—406103282. Project funding was awarded to ECW. The funders had no role in the study design, data collection and analysis, decision to publish, or preparation of the manuscript. No additional external funding was received for this study. We would like to thank our project partners Kai Cornelius and Markus Spitz (University of Heidelberg, Germany). We also thank Nikolaus Kleindienst (Central Institute of Mental Health, Mannheim, Germany) and Adrian Thorogood (University of Luxemburg) for conceptual counseling and Vincent Lotz (National Center for Tumor Diseases, Heidelberg University Hospital, Germany) for his assistance in researching the literature and linguistic correction of the manuscript.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>MJ, CS, and ECW conceptualized the manuscript. MJ drafted the manuscript, and CS supervised the preparation. AK and KM have revised the manuscript.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Warren-Gash</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <source>Linking and sharing routine health data for research in England</source>
          <year>2017</year>
          <publisher-loc>Cambridge</publisher-loc>
          <publisher-name>PHG Foundation</publisher-name>
          <fpage>1</fpage>
          <lpage>25</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <collab>Institute of Medicine</collab>
            <collab>Committee on the Learning Health Care System in America</collab>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Saunders</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Stuckhardt</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>McGinnis</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Best care at lower cost: the path to continuously learning health care in America</source>
          <year>2013</year>
          <publisher-loc>Washington, D.C</publisher-loc>
          <publisher-name>The National Academies Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schilsky</surname>
              <given-names>RL</given-names>
            </name>
            <name name-style="western">
              <surname>Michels</surname>
              <given-names>DL</given-names>
            </name>
            <name name-style="western">
              <surname>Kearbey</surname>
              <given-names>AH</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>PP</given-names>
            </name>
            <name name-style="western">
              <surname>Hudis</surname>
              <given-names>CA</given-names>
            </name>
          </person-group>
          <article-title>Building a rapid learning health care system for oncology: the regulatory framework of CancerLinQ</article-title>
          <source>J Clin Oncol</source>
          <year>2014</year>
          <month>08</month>
          <day>01</day>
          <volume>32</volume>
          <issue>22</issue>
          <fpage>2373</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1200/jco.2014.56.2124</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Martin-Sanchez</surname>
              <given-names>FJ</given-names>
            </name>
            <name name-style="western">
              <surname>Aguiar-Pulido</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Lopez-Campos</surname>
              <given-names>GH</given-names>
            </name>
            <name name-style="western">
              <surname>Peek</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Sacchi</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Secondary use and analysis of big data collected for patient care</article-title>
          <source>Yearb Med Inform</source>
          <year>2017</year>
          <month>08</month>
          <day>19</day>
          <volume>26</volume>
          <issue>01</issue>
          <fpage>28</fpage>
          <lpage>37</lpage>
          <pub-id pub-id-type="doi">10.1055/s-0037-1606529</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brakewood</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Poldrack</surname>
              <given-names>RA</given-names>
            </name>
          </person-group>
          <article-title>The ethics of secondary data analysis: considering the application of Belmont principles to the sharing of neuroimaging data</article-title>
          <source>Neuroimage</source>
          <year>2013</year>
          <month>11</month>
          <day>15</day>
          <volume>82</volume>
          <fpage>671</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1016/j.neuroimage.2013.02.040</pub-id>
          <pub-id pub-id-type="medline">23466937</pub-id>
          <pub-id pub-id-type="pii">S1053-8119(13)00174-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lucero</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Kearney</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Cortes</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Arcia</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Appelbaum</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Fernández</surname>
              <given-names>RL</given-names>
            </name>
            <name name-style="western">
              <surname>Luchsinger</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Benefits and risks in secondary use of digitized clinical data: views of community members living in a predominantly ethnic minority urban neighborhood</article-title>
          <source>AJOB Empir Bioeth</source>
          <year>2015</year>
          <month>09</month>
          <day>11</day>
          <volume>6</volume>
          <issue>2</issue>
          <fpage>12</fpage>
          <lpage>22</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26101782"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/23294515.2014.949906</pub-id>
          <pub-id pub-id-type="medline">26101782</pub-id>
          <pub-id pub-id-type="pmcid">PMC4475405</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Elger</surname>
              <given-names>BS</given-names>
            </name>
            <name name-style="western">
              <surname>Iavindrasana</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lo Iacono</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Müller</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Roduit</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Summers</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Wright</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Strategies for health data exchange for secondary, cross-institutional clinical research</article-title>
          <source>Comput Methods Programs Biomed</source>
          <year>2010</year>
          <month>09</month>
          <volume>99</volume>
          <issue>3</issue>
          <fpage>230</fpage>
          <lpage>51</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cmpb.2009.12.001</pub-id>
          <pub-id pub-id-type="medline">20089327</pub-id>
          <pub-id pub-id-type="pii">S0169-2607(09)00304-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>LM</given-names>
            </name>
          </person-group>
          <article-title>Ethics and subsequent use of electronic health record data</article-title>
          <source>J Biomed Inform</source>
          <year>2017</year>
          <month>07</month>
          <volume>71</volume>
          <fpage>143</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(17)30121-1"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2017.05.022</pub-id>
          <pub-id pub-id-type="medline">28578074</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(17)30121-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aven</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>On how to define, understand and describe risk</article-title>
          <source>Reliab Eng Syst Safe</source>
          <year>2010</year>
          <month>6</month>
          <volume>95</volume>
          <issue>6</issue>
          <fpage>623</fpage>
          <lpage>31</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ress.2010.01.011</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alaszewski</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Harrison</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Manthorpe</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Risk, Health and Welfare: Policies, Strategies and Practice</source>
          <year>1998</year>
          <publisher-loc>Milton Keynes</publisher-loc>
          <publisher-name>Open University Press</publisher-name>
          <fpage>1</fpage>
          <lpage>176</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nida-Rümelin</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Nida-Rümelin</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Ethik des Risikos. Die Bereichsethiken und ihre theoretische Fundierung</article-title>
          <source>Angewandte Ethik</source>
          <year>2005</year>
          <publisher-loc>Stuttgart</publisher-loc>
          <publisher-name>Alfred Kröner Verlag</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <collab>Verizon</collab>
          </person-group>
          <article-title>Verizon: 2019 Data Breach Investigations Report</article-title>
          <source>Computer Fraud &#38; Security</source>
          <year>2019</year>
          <month>06</month>
          <volume>2019</volume>
          <issue>6</issue>
          <fpage>4</fpage>
          <pub-id pub-id-type="doi">10.1016/S1361-3723(19)30060-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Floyd</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Grieco</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Reid</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Mining hospital data breach records: cyber threats to U.S. Hospitals</article-title>
          <source>Proceedings of the IEEE Conference on Intelligence and Security Informatics (ISI)</source>
          <year>2016</year>
          <conf-name>IEEE Conference on Intelligence and Security Informatics (ISI)</conf-name>
          <conf-date>Sept. 28-30, 2016</conf-date>
          <conf-loc>Tucson, AZ, USA</conf-loc>
          <pub-id pub-id-type="doi">10.1109/isi.2016.7745441</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Musen</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Chou</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Data breaches of protected health information in the United States</article-title>
          <source>J Am Med Assoc</source>
          <year>2015</year>
          <month>04</month>
          <day>14</day>
          <volume>313</volume>
          <issue>14</issue>
          <fpage>1471</fpage>
          <lpage>3</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/25871675"/>
          </comment>
          <pub-id pub-id-type="doi">10.1001/jama.2015.2252</pub-id>
          <pub-id pub-id-type="medline">25871675</pub-id>
          <pub-id pub-id-type="pii">2247135</pub-id>
          <pub-id pub-id-type="pmcid">PMC4479128</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
          <article-title>Datenschutz-Folgenabschätzung. Methodik und Fallstudie</article-title>
          <source>Der Bayerische Landesbeauftragte für den Datenschutz</source>
          <year>2019</year>
          <access-date>2021-06-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.datenschutz-bayern.de/technik/orient/oh_dsfa_beispiel.pdf">https://www.datenschutz-bayern.de/technik/orient/oh_dsfa_beispiel.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Bitkom - AK Datenschutz</collab>
          </person-group>
          <source>Bitcom e.V</source>
          <year>2017</year>
          <access-date>2021-05-26</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bitkom.org">https://www.bitkom.org</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Datenschutzgruppe nach Artikel 29</collab>
          </person-group>
          <source>Leitlinien zur Datenschutz-Folgenabschätzung (DSFA) und Beantwortung der Frage, ob eine Verarbeitung im Sinne der Verordnung 2016/679 "wahrscheinlich ein hohes Risiko mit sich bringt?"</source>
          <year>2017</year>
          <access-date>2021-05-26</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.datenschutz-bayern.de/technik/orient/wp248.pdf">https://www.datenschutz-bayern.de/technik/orient/wp248.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rid</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Emanuel</surname>
              <given-names>EJ</given-names>
            </name>
            <name name-style="western">
              <surname>Wendler</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Evaluating the risks of clinical research</article-title>
          <source>J Am Med Assoc</source>
          <year>2010</year>
          <month>10</month>
          <day>06</day>
          <volume>304</volume>
          <issue>13</issue>
          <fpage>1472</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1001/jama.2010.1414</pub-id>
          <pub-id pub-id-type="medline">20924013</pub-id>
          <pub-id pub-id-type="pii">304/13/1472</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rid</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wendler</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>A framework for risk-benefit evaluations in biomedical research</article-title>
          <source>Kennedy Inst Ethics J</source>
          <year>2011</year>
          <month>06</month>
          <volume>21</volume>
          <issue>2</issue>
          <fpage>141</fpage>
          <lpage>79</lpage>
          <pub-id pub-id-type="doi">10.1353/ken.2011.0007</pub-id>
          <pub-id pub-id-type="medline">21696094</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dyke</surname>
              <given-names>SO</given-names>
            </name>
            <name name-style="western">
              <surname>Dove</surname>
              <given-names>ES</given-names>
            </name>
            <name name-style="western">
              <surname>Knoppers</surname>
              <given-names>BM</given-names>
            </name>
          </person-group>
          <article-title>Sharing health-related data: a privacy test?</article-title>
          <source>NPJ Genom Med</source>
          <year>2016</year>
          <month>08</month>
          <day>17</day>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>160241</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/npjgenmed.2016.24"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/npjgenmed.2016.24</pub-id>
          <pub-id pub-id-type="medline">27990299</pub-id>
          <pub-id pub-id-type="pmcid">PMC5158304</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="web">
          <article-title>Bundesministerium für Bildung und Forschung</article-title>
          <source>Medizininformatik Initiative</source>
          <access-date>2021-05-26</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.medizininformatik-initiative.de">https://www.medizininformatik-initiative.de</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rumbold</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Pierscionek</surname>
              <given-names>BK</given-names>
            </name>
          </person-group>
          <article-title>What are data? A categorization of the data sensitivity spectrum</article-title>
          <source>Big Data Res</source>
          <year>2018</year>
          <month>07</month>
          <volume>12</volume>
          <fpage>49</fpage>
          <lpage>59</lpage>
          <pub-id pub-id-type="doi">10.1016/j.bdr.2017.11.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Köngeter</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Jungkunz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Winkler</surname>
              <given-names>EC</given-names>
            </name>
            <name name-style="western">
              <surname>Schickhardt</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Mehlis</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Richter</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Loh</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Buyx</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kielmansegg</surname>
              <given-names>Sv</given-names>
            </name>
          </person-group>
          <article-title>Sekundärnutzung klinischer Daten aus der Patientenversorgung für Forschungszwecke - Eine qualitative Interviewstudie zu Nutzen- und Risikopotenzialen aus Sicht von Expertinnen und Experten für den deutschen Forschungskontext</article-title>
          <source>Datenreiche Medizin und das Problem der Einwilligung. Ethische, rechtliche und sozialwissenschaftliche Perspektiven</source>
          <year>2021</year>
          <publisher-loc>Heidelberg</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Safran</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Bloomrosen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hammond</surname>
              <given-names>WE</given-names>
            </name>
            <name name-style="western">
              <surname>Labkoff</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Markel-Fox</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tang</surname>
              <given-names>PC</given-names>
            </name>
            <name name-style="western">
              <surname>Detmer</surname>
              <given-names>DE</given-names>
            </name>
            <collab>Expert Panel</collab>
          </person-group>
          <article-title>Toward a national framework for the secondary use of health data: an American Medical Informatics Association White Paper</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2007</year>
          <volume>14</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/17077452"/>
          </comment>
          <pub-id pub-id-type="doi">10.1197/jamia.M2273</pub-id>
          <pub-id pub-id-type="medline">17077452</pub-id>
          <pub-id pub-id-type="pii">M2273</pub-id>
          <pub-id pub-id-type="pmcid">PMC2329823</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Robertson</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Nurmatov</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Sood</surname>
              <given-names>HS</given-names>
            </name>
            <name name-style="western">
              <surname>Cresswell</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Sheikh</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A systematic scoping review of the domains and innovations in secondary uses of digitised health-related data</article-title>
          <source>J Innov Health Inform</source>
          <year>2016</year>
          <month>11</month>
          <day>10</day>
          <volume>23</volume>
          <issue>3</issue>
          <fpage>611</fpage>
          <lpage>19</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://dx.doi.org/10.14236/jhi.v23i3.841"/>
          </comment>
          <pub-id pub-id-type="doi">10.14236/jhi.v23i3.841</pub-id>
          <pub-id pub-id-type="medline">28059695</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>American Medical Informatics Association</collab>
          </person-group>
          <source>Secondary uses and re-uses of healthcare data: taxonomy for policy formulation and planning</source>
          <year>2007</year>
          <access-date>2021-05-26</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.amia.org/sites/amia.org/files/2007-Policy-Meeting-amia-taxonomy-Secondary-Data-Use-Version.pdf">https://www.amia.org/sites/amia.org/files/2007-Policy-Meeting-amia-taxonomy-Secondary-Data-Use-Version.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ienca</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ferretti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hurst</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Puhan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lovis</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Vayena</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Considerations for ethics review of big data health research: a scoping review</article-title>
          <source>PLoS One</source>
          <year>2018</year>
          <month>10</month>
          <day>11</day>
          <volume>13</volume>
          <issue>10</issue>
          <fpage>e0204937</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0204937"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0204937</pub-id>
          <pub-id pub-id-type="medline">30308031</pub-id>
          <pub-id pub-id-type="pii">PONE-D-18-13445</pub-id>
          <pub-id pub-id-type="pmcid">PMC6181558</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brook</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Rosman</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Holman</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Public good through data linkage: measuring research outputs from the Western Australian Data Linkage System</article-title>
          <source>Aust N Z J Public Health</source>
          <year>2008</year>
          <month>02</month>
          <volume>32</volume>
          <issue>1</issue>
          <fpage>19</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1753-6405.2008.00160.x</pub-id>
          <pub-id pub-id-type="medline">18290908</pub-id>
          <pub-id pub-id-type="pii">AZPH160</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>RS</given-names>
            </name>
            <name name-style="western">
              <surname>Burke</surname>
              <given-names>JP</given-names>
            </name>
            <name name-style="western">
              <surname>Classen</surname>
              <given-names>DC</given-names>
            </name>
            <name name-style="western">
              <surname>Gardner</surname>
              <given-names>RM</given-names>
            </name>
            <name name-style="western">
              <surname>Menlove</surname>
              <given-names>RL</given-names>
            </name>
            <name name-style="western">
              <surname>Goodrich</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Stevens</surname>
              <given-names>LE</given-names>
            </name>
            <name name-style="western">
              <surname>Pestotnik</surname>
              <given-names>SL</given-names>
            </name>
          </person-group>
          <article-title>Computerized identification of patients at high risk for hospital-acquired infection</article-title>
          <source>Am J Infect Control</source>
          <year>1992</year>
          <month>2</month>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>4</fpage>
          <lpage>10</lpage>
          <pub-id pub-id-type="doi">10.1016/s0196-6553(05)80117-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pittet</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Safran</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Harbarth</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Borst</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Copin</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Rohner</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Scherrer</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Auckenthaler</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Automatic alerts for methicillin-resistant surveillance and control: role of a hospital information system</article-title>
          <source>Infect Control Hosp Epidemiol</source>
          <year>2015</year>
          <month>01</month>
          <day>02</day>
          <volume>17</volume>
          <issue>8</issue>
          <fpage>496</fpage>
          <lpage>502</lpage>
          <pub-id pub-id-type="doi">10.1017/s0195941700004641</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hippisley-Cox</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Harcourt</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Heaps</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Painter</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Porter</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Pringle</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Developing a national primary care-based early warning system for health protection--a surveillance tool for the future? Analysis of routinely collected data</article-title>
          <source>J Public Health (Oxf)</source>
          <year>2007</year>
          <month>03</month>
          <volume>29</volume>
          <issue>1</issue>
          <fpage>75</fpage>
          <lpage>82</lpage>
          <pub-id pub-id-type="doi">10.1093/pubmed/fdl078</pub-id>
          <pub-id pub-id-type="medline">17158478</pub-id>
          <pub-id pub-id-type="pii">fdl078</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Robinson</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Baughman</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Rothrock</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Barrett</surname>
              <given-names>NL</given-names>
            </name>
            <name name-style="western">
              <surname>Pass</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lexau</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Damaske</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Stefonek</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Barnes</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Patterson</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zell</surname>
              <given-names>ER</given-names>
            </name>
            <name name-style="western">
              <surname>Schuchat</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Whitney</surname>
              <given-names>CG</given-names>
            </name>
            <collab>Active Bacterial Core Surveillance (ABCs)/Emerging Infections Program Network</collab>
          </person-group>
          <article-title>Epidemiology of invasive Streptococcus pneumoniae infections in the United States, 1995-1998: opportunities for prevention in the conjugate vaccine era</article-title>
          <source>J Am Med Assoc</source>
          <year>2001</year>
          <month>04</month>
          <day>04</day>
          <volume>285</volume>
          <issue>13</issue>
          <fpage>1729</fpage>
          <lpage>35</lpage>
          <pub-id pub-id-type="doi">10.1001/jama.285.13.1729</pub-id>
          <pub-id pub-id-type="medline">11277827</pub-id>
          <pub-id pub-id-type="pii">joc01710</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Been</surname>
              <given-names>JV</given-names>
            </name>
            <name name-style="western">
              <surname>Mackay</surname>
              <given-names>DF</given-names>
            </name>
            <name name-style="western">
              <surname>Millett</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Pell</surname>
              <given-names>JP</given-names>
            </name>
            <name name-style="western">
              <surname>van Schayck</surname>
              <given-names>OC</given-names>
            </name>
            <name name-style="western">
              <surname>Sheikh</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Impact of smoke-free legislation on perinatal and infant mortality: a national quasi-experimental study</article-title>
          <source>Sci Rep</source>
          <year>2015</year>
          <month>08</month>
          <day>13</day>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>13020</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/srep13020"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/srep13020</pub-id>
          <pub-id pub-id-type="medline">26268789</pub-id>
          <pub-id pub-id-type="pii">srep13020</pub-id>
          <pub-id pub-id-type="pmcid">PMC4534797</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Baker</surname>
              <given-names>DW</given-names>
            </name>
            <name name-style="western">
              <surname>Persell</surname>
              <given-names>SD</given-names>
            </name>
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Soman</surname>
              <given-names>NS</given-names>
            </name>
            <name name-style="western">
              <surname>Burgner</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Liss</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Kmetik</surname>
              <given-names>KS</given-names>
            </name>
          </person-group>
          <article-title>Automated review of electronic health records to assess quality of care for outpatients with heart failure</article-title>
          <source>Ann Intern Med</source>
          <year>2007</year>
          <month>02</month>
          <day>20</day>
          <volume>146</volume>
          <issue>4</issue>
          <fpage>270</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.7326/0003-4819-146-4-200702200-00006</pub-id>
          <pub-id pub-id-type="medline">17310051</pub-id>
          <pub-id pub-id-type="pii">146/4/270</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hay</surname>
              <given-names>JW</given-names>
            </name>
            <name name-style="western">
              <surname>Hay</surname>
              <given-names>AR</given-names>
            </name>
          </person-group>
          <article-title>Inflammatory bowel disease: costs-of-illness</article-title>
          <source>J Clin Gastroenterol</source>
          <year>1992</year>
          <month>06</month>
          <volume>14</volume>
          <issue>4</issue>
          <fpage>309</fpage>
          <lpage>17</lpage>
          <pub-id pub-id-type="doi">10.1097/00004836-199206000-00009</pub-id>
          <pub-id pub-id-type="medline">1607607</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stattin</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Holmberg</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Johansson</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Holmberg</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Adolfsson</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hugosson</surname>
              <given-names>J</given-names>
            </name>
            <collab>National Prostate Cancer Register (NPCR) of Sweden</collab>
          </person-group>
          <article-title>Outcomes in localized prostate cancer: National Prostate Cancer Register of Sweden follow-up study</article-title>
          <source>J Natl Cancer Inst</source>
          <year>2010</year>
          <month>07</month>
          <day>07</day>
          <volume>102</volume>
          <issue>13</issue>
          <fpage>950</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/20562373"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jnci/djq154</pub-id>
          <pub-id pub-id-type="medline">20562373</pub-id>
          <pub-id pub-id-type="pii">djq154</pub-id>
          <pub-id pub-id-type="pmcid">PMC2897875</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Weiner</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Xie</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Tannen</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Clinical trials in silico: rigorous assessment of treatment effect using electronic health records</article-title>
          <source>AMIA Annu Symp Proc</source>
          <year>2008</year>
          <month>11</month>
          <day>06</day>
          <fpage>1172</fpage>
          <pub-id pub-id-type="medline">18999175</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bronsert</surname>
              <given-names>MR</given-names>
            </name>
            <name name-style="western">
              <surname>Henderson</surname>
              <given-names>WG</given-names>
            </name>
            <name name-style="western">
              <surname>Valuck</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Hosokawa</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Hammermeister</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Comparative effectiveness of antihypertensive therapeutic classes and treatment strategies in the initiation of therapy in primary care patients: a Distributed Ambulatory Research in Therapeutics Network (DARTNet) study</article-title>
          <source>J Am Board Fam Med</source>
          <year>2013</year>
          <volume>26</volume>
          <issue>5</issue>
          <fpage>529</fpage>
          <lpage>38</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jabfm.org/cgi/pmidlookup?view=long&#38;pmid=24004705"/>
          </comment>
          <pub-id pub-id-type="doi">10.3122/jabfm.2013.05.130048</pub-id>
          <pub-id pub-id-type="medline">24004705</pub-id>
          <pub-id pub-id-type="pii">26/5/529</pub-id>
          <pub-id pub-id-type="pmcid">PMC3918237</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stürmer</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Funk</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Poole</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Brookhart</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>Nonexperimental comparative effectiveness research using linked healthcare databases</article-title>
          <source>Epidemiology</source>
          <year>2011</year>
          <month>05</month>
          <volume>22</volume>
          <issue>3</issue>
          <fpage>298</fpage>
          <lpage>301</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/21464649"/>
          </comment>
          <pub-id pub-id-type="doi">10.1097/EDE.0b013e318212640c</pub-id>
          <pub-id pub-id-type="medline">21464649</pub-id>
          <pub-id pub-id-type="pii">00001648-201105000-00006</pub-id>
          <pub-id pub-id-type="pmcid">PMC4012640</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oshikoya</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Wharton</surname>
              <given-names>GT</given-names>
            </name>
            <name name-style="western">
              <surname>Avant</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Van Driest</surname>
              <given-names>SL</given-names>
            </name>
            <name name-style="western">
              <surname>Fenn</surname>
              <given-names>NE</given-names>
            </name>
            <name name-style="western">
              <surname>Lardieri</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doe</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Sood</surname>
              <given-names>BG</given-names>
            </name>
            <name name-style="western">
              <surname>Taketomo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lieu</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Yen</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>McMahon</surname>
              <given-names>AW</given-names>
            </name>
          </person-group>
          <article-title>Serious adverse events associated with off-label use of azithromycin or fentanyl in children in intensive care units: a retrospective chart review</article-title>
          <source>Paediatr Drugs</source>
          <year>2019</year>
          <month>02</month>
          <volume>21</volume>
          <issue>1</issue>
          <fpage>47</fpage>
          <lpage>58</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/30484072"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s40272-018-0318-9</pub-id>
          <pub-id pub-id-type="medline">30484072</pub-id>
          <pub-id pub-id-type="pii">10.1007/s40272-018-0318-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC6387682</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kuter</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Mehta</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hollak</surname>
              <given-names>CE</given-names>
            </name>
            <name name-style="western">
              <surname>Giraldo</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Hughes</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Belmatoug</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Brand</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Muller</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Schaaf</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Giorgino</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Zimran</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Miglustat therapy in type 1 Gaucher disease: clinical and safety outcomes in a multicenter retrospective cohort study</article-title>
          <source>Blood Cells Mol Dis</source>
          <year>2013</year>
          <month>08</month>
          <volume>51</volume>
          <issue>2</issue>
          <fpage>116</fpage>
          <lpage>24</lpage>
          <pub-id pub-id-type="doi">10.1016/j.bcmd.2013.04.005</pub-id>
          <pub-id pub-id-type="medline">23683771</pub-id>
          <pub-id pub-id-type="pii">S1079-9796(13)00085-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mathews</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Forsythe</surname>
              <given-names>AV</given-names>
            </name>
            <name name-style="western">
              <surname>Brady</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Butler</surname>
              <given-names>MW</given-names>
            </name>
            <name name-style="western">
              <surname>Goergen</surname>
              <given-names>SK</given-names>
            </name>
            <name name-style="western">
              <surname>Byrnes</surname>
              <given-names>GB</given-names>
            </name>
            <name name-style="western">
              <surname>Giles</surname>
              <given-names>GG</given-names>
            </name>
            <name name-style="western">
              <surname>Wallace</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>PR</given-names>
            </name>
            <name name-style="western">
              <surname>Guiver</surname>
              <given-names>TA</given-names>
            </name>
            <name name-style="western">
              <surname>McGale</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Cain</surname>
              <given-names>TM</given-names>
            </name>
            <name name-style="western">
              <surname>Dowty</surname>
              <given-names>JG</given-names>
            </name>
            <name name-style="western">
              <surname>Bickerstaffe</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Darby</surname>
              <given-names>SC</given-names>
            </name>
          </person-group>
          <article-title>Cancer risk in 680,000 people exposed to computed tomography scans in childhood or adolescence: data linkage study of 11 million Australians</article-title>
          <source>Br Med J</source>
          <year>2013</year>
          <month>05</month>
          <day>21</day>
          <volume>346</volume>
          <fpage>f2360</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.bmj.com/lookup/pmidlookup?view=long&#38;pmid=23694687"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmj.f2360</pub-id>
          <pub-id pub-id-type="medline">23694687</pub-id>
          <pub-id pub-id-type="pmcid">PMC3660619</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Conway</surname>
              <given-names>PH</given-names>
            </name>
            <name name-style="western">
              <surname>Cnaan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Zaoutis</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Henry</surname>
              <given-names>BV</given-names>
            </name>
            <name name-style="western">
              <surname>Grundmeier</surname>
              <given-names>RW</given-names>
            </name>
            <name name-style="western">
              <surname>Keren</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Recurrent urinary tract infections in children: risk factors and association with prophylactic antimicrobials</article-title>
          <source>J Am Med Assoc</source>
          <year>2007</year>
          <month>07</month>
          <day>11</day>
          <volume>298</volume>
          <issue>2</issue>
          <fpage>179</fpage>
          <lpage>86</lpage>
          <pub-id pub-id-type="doi">10.1001/jama.298.2.179</pub-id>
          <pub-id pub-id-type="medline">17622599</pub-id>
          <pub-id pub-id-type="pii">298/2/179</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yeniterzi</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Aberdeen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Bayer</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wellner</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Hirschman</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Malin</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Effects of personal identifier resynthesis on clinical text de-identification</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2010</year>
          <volume>17</volume>
          <issue>2</issue>
          <fpage>159</fpage>
          <lpage>68</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/20190058"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/jamia.2009.002212</pub-id>
          <pub-id pub-id-type="medline">20190058</pub-id>
          <pub-id pub-id-type="pii">17/2/159</pub-id>
          <pub-id pub-id-type="pmcid">PMC3000784</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Köpcke</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Kraus</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Scholler</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Nau</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Schüttler</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Prokosch</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ganslandt</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Secondary use of routinely collected patient data in a clinical trial: an evaluation of the effects on patient recruitment and data acquisition</article-title>
          <source>Int J Med Inform</source>
          <year>2013</year>
          <month>03</month>
          <volume>82</volume>
          <issue>3</issue>
          <fpage>185</fpage>
          <lpage>92</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2012.11.008</pub-id>
          <pub-id pub-id-type="medline">23266063</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(12)00220-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schickhardt</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Fleischer</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Winkler</surname>
              <given-names>EC</given-names>
            </name>
          </person-group>
          <article-title>Do patients and research subjects have a right to receive their genomic raw data? An ethical and legal analysis</article-title>
          <source>BMC Med Ethics</source>
          <year>2020</year>
          <month>01</month>
          <day>16</day>
          <volume>21</volume>
          <issue>1</issue>
          <fpage>7</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedethics.biomedcentral.com/articles/10.1186/s12910-020-0446-y"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12910-020-0446-y</pub-id>
          <pub-id pub-id-type="medline">31948449</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12910-020-0446-y</pub-id>
          <pub-id pub-id-type="pmcid">PMC6966790</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rössler</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <source>Der Wert des Privaten</source>
          <year>2001</year>
          <publisher-loc>Frankfurt am Main</publisher-loc>
          <publisher-name>Suhrkamp</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fried</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Privacy</article-title>
          <source>Yale Law J</source>
          <year>1968</year>
          <month>01</month>
          <volume>77</volume>
          <issue>3</issue>
          <fpage>475</fpage>
          <lpage>93</lpage>
          <pub-id pub-id-type="doi">10.2307/794941</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Solove</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <source>Understanding Privacy</source>
          <year>2008</year>
          <publisher-loc>Cambridge, MA</publisher-loc>
          <publisher-name>Harvard University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>de Bruin</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>The liberal value of privacy</article-title>
          <source>Law Philos</source>
          <year>2010</year>
          <month>4</month>
          <day>10</day>
          <volume>29</volume>
          <issue>5</issue>
          <fpage>505</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.1007/s10982-010-9067-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rath</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Karlsruhe und der Einschüchterungseffekt? Praxis und Nutzen einer Argumentationsfigur des Bundesverfassungsgerichts</article-title>
          <source>Verfassungsrecht und gesellschaftliche Realität</source>
          <year>2009</year>
          <publisher-loc>Baden-Baden, Germany</publisher-loc>
          <publisher-name>Nomos</publisher-name>
          <fpage>65</fpage>
          <lpage>80</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaplan</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>How Should Health Data Be Used?</article-title>
          <source>Camb Q Healthc Ethics</source>
          <year>2016</year>
          <month>03</month>
          <day>09</day>
          <volume>25</volume>
          <issue>2</issue>
          <fpage>312</fpage>
          <lpage>29</lpage>
          <pub-id pub-id-type="doi">10.1017/s0963180115000614</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Agaku</surname>
              <given-names>IT</given-names>
            </name>
            <name name-style="western">
              <surname>Adisa</surname>
              <given-names>AO</given-names>
            </name>
            <name name-style="western">
              <surname>Ayo-Yusuf</surname>
              <given-names>OA</given-names>
            </name>
            <name name-style="western">
              <surname>Connolly</surname>
              <given-names>GN</given-names>
            </name>
          </person-group>
          <article-title>Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2014</year>
          <volume>21</volume>
          <issue>2</issue>
          <fpage>374</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/23975624"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/amiajnl-2013-002079</pub-id>
          <pub-id pub-id-type="medline">23975624</pub-id>
          <pub-id pub-id-type="pii">amiajnl-2013-002079</pub-id>
          <pub-id pub-id-type="pmcid">PMC3932467</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Benitez</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Malin</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Evaluating re-identification risks with respect to the HIPAA privacy rule</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2010</year>
          <volume>17</volume>
          <issue>2</issue>
          <fpage>169</fpage>
          <lpage>77</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/20190059"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/jamia.2009.000026</pub-id>
          <pub-id pub-id-type="medline">20190059</pub-id>
          <pub-id pub-id-type="pii">17/2/169</pub-id>
          <pub-id pub-id-type="pmcid">PMC3000773</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Laurie</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Jones</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Stevens</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Dobbs</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>A review of evidence relating to harm resulting from uses of health and biomedical data</article-title>
          <source>Nuffield Council on Bioethics</source>
          <year>2014</year>
          <month>02</month>
          <day>15</day>
          <access-date>2021-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.research.ed.ac.uk/en/publications/a-review-of-evidence-relating-to-harm-resulting-from-uses-of-heal">https://www.research.ed.ac.uk/en/publications/a-review-of-evidence-relating-to-harm-resulting-from-uses-of-heal</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bender</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Brand</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Bacher</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Re-identifying register data by survey data: an empirical study</article-title>
          <source>Stat J Unit Nation</source>
          <year>2001</year>
          <month>12</month>
          <day>28</day>
          <volume>18</volume>
          <issue>4</issue>
          <fpage>373</fpage>
          <lpage>81</lpage>
          <pub-id pub-id-type="doi">10.3233/sju-2001-18412</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mokken</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kooiman</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Pannekoek</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Willenborg</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Disclosure risks for microdata</article-title>
          <source>Stat Neerl</source>
          <year>1992</year>
          <month>03</month>
          <volume>46</volume>
          <issue>1</issue>
          <fpage>49</fpage>
          <lpage>67</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1467-9574.1992.tb01326.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dankar</surname>
              <given-names>FK</given-names>
            </name>
            <name name-style="western">
              <surname>El Emam</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Neisa</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Roffey</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Estimating the re-identification risk of clinical data sets</article-title>
          <source>BMC Med Inform Decis Mak</source>
          <year>2012</year>
          <month>07</month>
          <day>09</day>
          <volume>12</volume>
          <fpage>66</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/1472-6947-12-66"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/1472-6947-12-66</pub-id>
          <pub-id pub-id-type="medline">22776564</pub-id>
          <pub-id pub-id-type="pii">1472-6947-12-66</pub-id>
          <pub-id pub-id-type="pmcid">PMC3583146</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Emam</surname>
              <given-names>KE</given-names>
            </name>
            <name name-style="western">
              <surname>Dankar</surname>
              <given-names>FK</given-names>
            </name>
            <name name-style="western">
              <surname>Vaillancourt</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Roffey</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Lysyk</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Evaluating the risk of re-identification of patients from hospital prescription records</article-title>
          <source>Can J Hosp Pharm</source>
          <year>2009</year>
          <month>07</month>
          <volume>62</volume>
          <issue>4</issue>
          <fpage>307</fpage>
          <lpage>19</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22478909"/>
          </comment>
          <pub-id pub-id-type="doi">10.4212/cjhp.v62i4.812</pub-id>
          <pub-id pub-id-type="medline">22478909</pub-id>
          <pub-id pub-id-type="pmcid">PMC2826964</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sweeney</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>K-anonymity: a model for protecting privacy</article-title>
          <source>Int J Unc Fuzz Knowl Based Syst</source>
          <year>2012</year>
          <month>05</month>
          <day>02</day>
          <volume>10</volume>
          <issue>05</issue>
          <fpage>557</fpage>
          <lpage>70</lpage>
          <pub-id pub-id-type="doi">10.1142/S0218488502001648</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Machanavajjhala</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Gehrke</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kifer</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Venkitasubramaniam</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>L-diversity: privacy beyond k-anonymity</article-title>
          <source>Proceedings of the 22nd International Conference on Data Engineering (ICDE'06)</source>
          <year>2006</year>
          <conf-name>22nd International Conference on Data Engineering (ICDE'06)</conf-name>
          <conf-date>April 3-7, 2006</conf-date>
          <conf-loc>Atlanta, GA, USA</conf-loc>
          <pub-id pub-id-type="doi">10.1109/ICDE.2006.1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Venkatasubramanian</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>T-closeness: privacy beyond k-anonymity and l-diversity</article-title>
          <source>Proceedings of the IEEE 23rd International Conference on Data Engineering</source>
          <year>2007</year>
          <conf-name>2007 IEEE 23rd International Conference on Data Engineering</conf-name>
          <conf-date>April 15-20, 2007</conf-date>
          <conf-loc>Istanbul, Turkey</conf-loc>
          <pub-id pub-id-type="doi">10.1109/icde.2007.367856</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Malin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Loukides</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Benitez</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Clayton</surname>
              <given-names>EW</given-names>
            </name>
          </person-group>
          <article-title>Identifiability in biobanks: models, measures, and mitigation strategies</article-title>
          <source>Hum Genet</source>
          <year>2011</year>
          <month>09</month>
          <volume>130</volume>
          <issue>3</issue>
          <fpage>383</fpage>
          <lpage>92</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/21739176"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s00439-011-1042-5</pub-id>
          <pub-id pub-id-type="medline">21739176</pub-id>
          <pub-id pub-id-type="pmcid">PMC3621020</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gymrek</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>McGuire</surname>
              <given-names>AL</given-names>
            </name>
            <name name-style="western">
              <surname>Golan</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Halperin</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Erlich</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Identifying personal genomes by surname inference</article-title>
          <source>Science</source>
          <year>2013</year>
          <month>01</month>
          <day>18</day>
          <volume>339</volume>
          <issue>6117</issue>
          <fpage>321</fpage>
          <lpage>4</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.sciencemag.org/cgi/pmidlookup?view=long&#38;pmid=23329047"/>
          </comment>
          <pub-id pub-id-type="doi">10.1126/science.1229566</pub-id>
          <pub-id pub-id-type="medline">23329047</pub-id>
          <pub-id pub-id-type="pii">339/6117/321</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ellenbogen</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Narayanan</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Identification of anonymous DNA using genealogical triangulation</article-title>
          <source>bioRxiv</source>
          <year>2019</year>
          <fpage>531269</fpage>
          <pub-id pub-id-type="doi">10.1101/531269</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Golle</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Revisiting the uniqueness of simple demographics in the US population</article-title>
          <source>Proceedings of the 5th ACM Workshop on Privacy in Electronic Society</source>
          <year>2006</year>
          <conf-name>CCS06: 13th ACM Conference on Computer and Communications Security 2006</conf-name>
          <conf-date>30 October, 2006</conf-date>
          <conf-loc>Alexandria Virginia USA</conf-loc>
          <fpage>77</fpage>
          <lpage>80</lpage>
          <pub-id pub-id-type="doi">10.1145/1179601.1179615</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arbuckle</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Ritchie</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>The five safes of risk-based anonymization</article-title>
          <source>IEEE Secur Privacy</source>
          <year>2019</year>
          <month>9</month>
          <volume>17</volume>
          <issue>5</issue>
          <fpage>84</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1109/msec.2019.2929282</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Prasser</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Kohlmayer</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Kuhn</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>The importance of context: risk-based de-identification of biomedical data</article-title>
          <source>Methods Inf Med</source>
          <year>2018</year>
          <month>01</month>
          <day>08</day>
          <volume>55</volume>
          <issue>04</issue>
          <fpage>347</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.3414/me16-01-0012</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Naveed</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ayday</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Clayton</surname>
              <given-names>EW</given-names>
            </name>
            <name name-style="western">
              <surname>Fellay</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gunter</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Hubaux</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Malin</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Privacy in the genomic era</article-title>
          <source>ACM Comput Surv</source>
          <year>2015</year>
          <month>09</month>
          <volume>48</volume>
          <issue>1</issue>
          <fpage>6</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26640318"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2767007</pub-id>
          <pub-id pub-id-type="medline">26640318</pub-id>
          <pub-id pub-id-type="pmcid">PMC4666540</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schuol</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Winkler</surname>
              <given-names>EC</given-names>
            </name>
          </person-group>
          <article-title>Umgang mit genomischen Daten in der klinischen Forschung aus ethischer Sicht</article-title>
          <source>Forum</source>
          <year>2016</year>
          <month>9</month>
          <day>29</day>
          <volume>31</volume>
          <issue>5</issue>
          <fpage>402</fpage>
          <lpage>5</lpage>
          <pub-id pub-id-type="doi">10.1007/s12312-016-0124-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <collab>EURAT</collab>
          </person-group>
          <source>Eckpunkte für eine Heidelberger Praxis der Ganzgenomsequenzierung</source>
          <year>2013</year>
          <publisher-loc>Heidelberg</publisher-loc>
          <publisher-name>Marsilius-Kolleg der Universität Heidelberg</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hagendorff</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>From privacy to anti-discrimination in times of machine learning</article-title>
          <source>Ethics Inf Technol</source>
          <year>2019</year>
          <month>8</month>
          <day>5</day>
          <volume>21</volume>
          <issue>4</issue>
          <fpage>331</fpage>
          <lpage>43</lpage>
          <pub-id pub-id-type="doi">10.1007/s10676-019-09510-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wachter</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Mittelstadt</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>A right to reasonable inferences: re-thinking data protection law in the age of big data and AI</article-title>
          <source>Colum Bus L Rev</source>
          <year>2019</year>
          <volume>2</volume>
          <fpage>494</fpage>
          <lpage>620</lpage>
          <pub-id pub-id-type="doi">10.31228/osf.io/mu2kf</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kosinski</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Stillwell</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Graepel</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Private traits and attributes are predictable from digital records of human behavior</article-title>
          <source>Proc Natl Acad Sci U S A</source>
          <year>2013</year>
          <month>04</month>
          <day>09</day>
          <volume>110</volume>
          <issue>15</issue>
          <fpage>5802</fpage>
          <lpage>5</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.pnas.org/cgi/pmidlookup?view=long&#38;pmid=23479631"/>
          </comment>
          <pub-id pub-id-type="doi">10.1073/pnas.1218772110</pub-id>
          <pub-id pub-id-type="medline">23479631</pub-id>
          <pub-id pub-id-type="pii">1218772110</pub-id>
          <pub-id pub-id-type="pmcid">PMC3625324</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
