<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article article-type="editorial" dtd-version="2.0" xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v27i1e67878</article-id>
      <article-id pub-id-type="pmid"/>
      <article-id pub-id-type="doi">10.2196/67878</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Editorial</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Editorial</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Crisis Text Line and Loris.ai Controversy Highlights the Complexity of Informed Consent on the Internet and Data-Sharing Ethics for Machine Learning and Research</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Leung</surname>
            <given-names>Tiffany</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
          <degrees>MPH, MD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution/>
            <institution>JMIR Publications</institution>
            <addr-line>130 Queens Quay East</addr-line>
            <addr-line>Suite 1100-1102</addr-line>
            <addr-line>Toronto, ON, M5A 0P6</addr-line>
            <country>Canada</country>
            <phone>1 416 786 6970</phone>
            <email>geysenba@gmail.com</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6479-5330</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>JMIR Publications</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Gunther Eysenbach <email>geysenba@gmail.com</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2025</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>22</day>
        <month>1</month>
        <year>2025</year>
      </pub-date>
      <volume>27</volume>
      <elocation-id>e67878</elocation-id>
      <history>
        <date date-type="received">
          <day>23</day>
          <month>10</month>
          <year>2024</year>
        </date>
        <date date-type="accepted">
          <day>24</day>
          <month>10</month>
          <year>2024</year>
        </date>
      </history>
      <copyright-statement>©Gunther Eysenbach. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 22.01.2025.</copyright-statement>
      <copyright-year>2025</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2025/1/e67878" xlink:type="simple"/>
      <related-article related-article-type="commentary-article" id="v21i1e11507" ext-link-type="doi" xlink:href="10.2196/11507" vol="21" page="e11507" xlink:type="simple">https://www.jmir.org/2019/1/e11507/</related-article>
      <related-article related-article-type="commentary-article" id="v26i1e42144" ext-link-type="doi" xlink:href="10.2196/42144" vol="26" page="e42144" xlink:type="simple">https://www.jmir.org/2024/1/e42144/</related-article>
      <related-article related-article-type="commentary-article" id="v27i1e59734" ext-link-type="doi" xlink:href="10.2196/59734" vol="27" page="e59734" xlink:type="simple">https://www.jmir.org/2025/1/e59734/</related-article>
      <related-article related-article-type="commentary-article" id="v27i1e64015" ext-link-type="doi" xlink:href="10.2196/64015" vol="27" page="e64015" xlink:type="simple">https://www.jmir.org/2025/1/e64015/</related-article>
      <related-article related-article-type="commentary-article" id="v26i1e67880" ext-link-type="doi" xlink:href="10.2196/67880" vol="26" page="e67880" xlink:type="simple">https://www.jmir.org/2024/1/e67880/</related-article>
      <kwd-group>
        <kwd>data ethics</kwd>
        <kwd>data sharing</kwd>
        <kwd>informed consent</kwd>
        <kwd>disclosure</kwd>
        <kwd>conflict of interest</kwd>
        <kwd>transparency</kwd>
        <kwd>trust</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <p>In January 2019, the <italic>Journal of Medical Internet Research</italic> published a viewpoint paper by Anthony Pisani and colleagues [<xref ref-type="bibr" rid="ref1">1</xref>] related to a noncommercial data-sharing program for academic researchers offered by Crisis Text Line, a not-for-profit technology organization that provides a free 24-7 text line for people in crisis in the United States. Crisis Text Line has been described as a globally prominent online mental health support resource, where people in crisis (eg, with suicidal ideation) can exchange text messages with trained volunteer counselors. As is the case for many internet companies, these digital exchanges are a treasure trove for machine learning, quality improvement, education, and research.</p>
    <p>Nancy Lublin, cofounder and former chief executive officer (CEO) of Crisis Text Line (as well as Loris.ai), gave an example in her 2015 TED talk on the internal use of these data [<xref ref-type="bibr" rid="ref2">2</xref>]:</p>
    <disp-quote>
      <p>We know that if you text the words “numbs” and “sleeve,” there's a 99 percent match for cutting. We know that if you text in the words “mg” and “rubber band,” there's a 99 percent match for substance abuse. And we know that if you text in “sex,” “oral” and “Mormon,” you're questioning if you're gay. Now that's interesting information that a counselor could figure out but that algorithm in our hands means that an automatic pop-up says, “99 percent match for cutting -- try asking one of these questions” to prompt the counselor. Or “99 percent match for substance abuse, here are three drug clinics near the texter.” It makes us more accurate.</p>
    </disp-quote>
    <p>Former Crisis Text Line board member, Danah Boyd, recounts her motivation behind opening up data to researchers, which is the focus of the 2019 paper in the <italic>Journal of Medical Internet Research</italic> [<xref ref-type="bibr" rid="ref3">3</xref>]:</p>
    <disp-quote>
      <p>From early on, researchers came to Crisis Text Line asking for access to data. This prompted even more reflection. We had significant data and we were seeing trends that had significant implications for far more than our service. (...) This then led to the more complicated issue of whether or not to allow external researchers to study our data with an eye towards scholarship. (...) Our texters come to us in their darkest hours. Our data was opening up internal questions right and left about how to best support them. We don’t have the internal resources to analyze the data to answer all of our questions, to improve our knowledge base in ways that can help texters. I knew that having additional help from researchers could help us learn in ways that would improve training of counselors and help people down the line. I also knew that what we were learning internally might be useful to other service providers in the mental health space and I felt queasy that we were not sharing what we had learned to help others.</p>
    </disp-quote>
    <p>The 2019 paper deals with the question of how these textual data could be ethically shared with academic researchers to answer a variety of research questions. As Pisani and colleagues observed, “few companies are willing to take on the potential work and risks involved in noncommercial data sharing, and the scientific and societal potential of their data goes unrealized” [<xref ref-type="bibr" rid="ref1">1</xref>], so to Crisis Text Line’s credit the nonprofit organization applied for a grant from the Robert Wood Johnson Foundation to create a pilot program for data sharing with academic researchers. The paper described “the process of defining core challenges underlying data sharing in technology-academia partnerships; discusses Crisis Text Line’s trial solutions to these challenges; and offers lessons learned that might inform other technology companies’ data-sharing partnerships” [<xref ref-type="bibr" rid="ref1">1</xref>]. This is a viewpoint paper, not an original paper, and the paper in the <italic>Journal of Medical Internet Research</italic> does not use any of the data collected by Crisis Text Line nor does it share the results of the subprojects that Crisis Text Line enabled with their data-sharing program, rather it deals with the meta-question of how such data can be ethically shared with researchers. To that end, Crisis Text Line assembled a data ethics committee consisting of external academic researchers and technology experts (many of whom are coauthors of the paper), convened by then Crisis Text Line’s chief data scientist and Crisis Text Line cofounder, Bob Filbin, who is also a coauthor on the paper. The ethics committee advised Crisis Text Line on processes and assessed the research proposals of other researchers who applied for access to Crisis Text Line’s data. The paper proposes some general guidelines for other organizations that want to share data with third parties in a <italic>noncommercial</italic> context. The paper is seen by many as an important contribution to the complex question of how organizations can ethically share data with academics while preserving the privacy and integrity of the data, as evidenced by the selection of the article as “best paper of 2019” for the 2020 International Medical Informatics Association (IMIA) Yearbook, Special Section on Ethics in Health Informatics [<xref ref-type="bibr" rid="ref4">4</xref>].</p>
    <sec>
      <title>Data Ethics Called in Question</title>
      <p>In November 2021, Tim Reierson, a former volunteer for the Crisis Text Line, and an advocate seeking reform of data ethics at Crisis Text Line and 988 Lifeline, published a 13-page open letter in response to the article published in the <italic>Journal of Medical Internet Research</italic>, where he raised several concerns related to informed consent and an alleged conflict of interest [<xref ref-type="bibr" rid="ref5">5</xref>]; the full document was sent to us in February 2022.</p>
      <p>Reierson’s core concern related to <italic>informed consent</italic> was that the paper described the process where Crisis Text Line provided “texters with a link to an easy-to-understand Terms of Service” (Table 1 in [<xref ref-type="bibr" rid="ref1">1</xref>]), thereby—according to Reierson—“establishing a Terms of Service consent standard.” While we as <italic>Journal of Medical Internet Research</italic> editors agree that offering a terms of service (ToS) link does not necessarily equate to informed consent, we do not agree with the interpretation that this viewpoint paper establishes this as a generalizable “informed consent standard.” Rather, the guidelines proposed in the viewpoint (Table 1 in [<xref ref-type="bibr" rid="ref1">1</xref>]) include that researchers “inform users in an unobtrusive way that anonymized data are shared with select research partners”, which was implemented by Crisis Text Line by referring users to their ToS. But the guidelines proposed in the viewpoint paper also had other critical requirements. Notably, they also require that academics who use (anonymized) Crisis Text Line data for research obtain institutional review board (IRB) approval for their data analysis projects (Table 1 in [<xref ref-type="bibr" rid="ref1">1</xref>]: “Establish a review process that includes outside academics and ethics experts”).</p>
      <p>Informed consent is ideal but not always possible, especially on the internet [<xref ref-type="bibr" rid="ref6">6</xref>]. There are some circumstances, for example, in urgent or emergency care settings, or in public health practice, where informed consent is considered legally effective when considering contextual variables [<xref ref-type="bibr" rid="ref7">7</xref>]. Additionally, secondary use of data that has been de-identified or anonymized (as was the case with Crisis Text Line data) is usually allowable in the absence of explicit consent from the data subject [<xref ref-type="bibr" rid="ref8">8</xref>]. Thus, the critique that the Crisis Text Line clientele can not be expected to read the terms of use is valid, but it is ultimately up to the IRBs to assess the risk—which is a key component mentioned in the Pisani paper [<xref ref-type="bibr" rid="ref1">1</xref>].</p>
      <p>Regarding commercial use, Reierson in his letter to JMIR Publications pointed to the fact that Crisis Text Line had also launched a for-profit subsidiary, Loris.ai, to which Crisis Text Line data was licensed in order to train artificial intelligence (AI) to handle text exchanges for customer service. These events took place after the study period.</p>
      <p>Less than 2 months after Reierson made the letter to JMIR Publications public (but before we had seen it), on January 28, 2022, Politico ran a story bringing public scrutiny to the fact that Crisis Text Line had created Loris.ai as a profit-generating entity [<xref ref-type="bibr" rid="ref9">9</xref>], which was met with widespread public “anger and disgust” [<xref ref-type="bibr" rid="ref3">3</xref>], and prompted a letter from US Federal Communications Commission’s commissioner, Brendan Carr, to Crisis Text Line and Loris.ai demanding they stop this practice immediately [<xref ref-type="bibr" rid="ref10">10</xref>]. Three days later, Crisis Text Line backed down and “ended the data-sharing relationship with Loris” and requested “that Loris delete the data it has received from Crisis Text Line” [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>].</p>
    </sec>
    <sec>
      <title>Publication Ethics and Corrigendum of the Conflicts of Interest Section</title>
      <p>Reierson’s concern regarding the <italic>conflict of interest</italic> was that “Crisis Text Line itself had a vested monetary interest in commercial use of the data through its’ subsidiary Loris.ai, and therefore vested interest in the 2019 paper’s finding [<italic>sic</italic>] that the crisis conversation data is ethically sourced for research purposes.” Here, it is important to note that from our point of view as <italic>Journal of Medical Internet Research</italic> editors, the term “finding” is slightly misleading because this is not an empirical study, rather it is a viewpoint paper, largely written by members of the independent Data Ethics Committee consisting of independent and respected ethicists and academics, describing how Crisis Text Line handled data sharing for research and outlining ethical challenges and how they were addressed by the Crisis Text Line’s Data Ethics Committee.</p>
      <p>From a publication ethics perspective, we are less concerned about the ethics of the arrangement between Crisis Text Line and Loris.ai, but primarily about whether any of the individual contributing authors benefitted (or had the potential to benefit) financially from Loris.ai or had any other ties to Loris.ai, as this would arguably be something that should have been disclosed to the editor and reviewers on submission of the paper [<xref ref-type="bibr" rid="ref13">13</xref>]. Even though the 2019 paper published in the <italic>Journal of Medical Internet Research</italic> was about <italic>noncommercial</italic> data sharing for academic research, any hypothetical ties between authors and a company that benefits from Crisis Text Line data-sharing guidelines could have influenced the viewpoint.</p>
      <p>We shared Tim Reiersons’ letter with the corresponding author and received a reply on March 30, 2022, reassuring us that the academic members of the Data Ethics Committee were uncompensated and that there were no further conflicts of interest to disclose. We had no evidence of any wrongdoing that would require a retraction or even issuing an editorial expression of concern. Still, we wanted readers to be aware of the debate (in particular around informed consent) and invited Tim Reierson to submit a condensed commentary for publication alongside the article [<xref ref-type="bibr" rid="ref14">14</xref>], and we also asked the original authors to respond [<xref ref-type="bibr" rid="ref15">15</xref>]. We also decided to publish a corrigendum [<xref ref-type="bibr" rid="ref16">16</xref>] to clarify author relationships with the noncommercial and commercial entities in greater detail [<xref ref-type="bibr" rid="ref16">16</xref>].</p>
    </sec>
    <sec>
      <title>Informed Consent in the Age of AI and Machine Learning</title>
      <p>The invited commentary by Reierson highlights complex concerns regarding consent for research, data sharing, and machine learning [<xref ref-type="bibr" rid="ref14">14</xref>], which are of course amplified given the initial intent of Crisis Text Line to share data with a <italic>commercial</italic> entity, Loris.ai.</p>
      <p>Tim Reierson asks legitimate questions on whether it is sufficient to have users in crisis accept a ToS document (which in all likelihood nobody reads). Even former board chair of Crisis Text Line, Danah Boyd, readily admitted that a ToS is not consent [<xref ref-type="bibr" rid="ref3">3</xref>]:</p>
      <disp-quote>
        <p>I knew how little data exists in the mental health space, how much we had tried to learn from others, how beneficial knowledge could be to others working in the mental health ecosystem. I also knew that people who came to us in crisis were not consenting to be studied. Yes, there was a terms of service that could contractually permit such use, but I knew darn straight that no one would read it, and advised everyone involved to proceed as such.</p>
      </disp-quote>
      <p>Informed consent is a basic tenet for research; on the other hand, it can be waived when data are deidentified. IRBs routinely grant exemptions to the informed consent ideal when data are deidentified. While such assessments can be made in an academic context, many companies do not have IRBs that could assess the risk or ethical implications if data are analyzed, manually or with machine learning, and the reidentification risks are often not known.</p>
      <p>The question of what the role of informed consent plays when academics or companies use data generated on the internet is one of the most vexing questions of our time and a topic of ongoing debate. It is also precisely why we published the 2019 viewpoint paper by Pisani et al [<xref ref-type="bibr" rid="ref1">1</xref>], which illustrates in an exemplary way how organizations can and should deal with this risk. Ideally, organizations (profit or nonprofit) assemble independent ethics boards, like Crisis Text Line did. Independence is key—the ethics board should consist of independent academics who do not have a stake in the success of the business or organization.</p>
      <p>As Danah Boyd further writes, “There have been heated debates in my field about whether or not it is ethical to use corporate trace data without the consent of users to advance scientific knowledge” [<xref ref-type="bibr" rid="ref3">3</xref>]. Proponents of waiving informed consent requirements for analyzing anonymized big data argue that users implicitly consent to data mining and research by using “free” services—one could argue that people accept this bargain as a trade-off to receiving free services and free information. In the age of generative AI—where large parts of the internet, including discussion boards and other venues that once may have been deemed “private,” are scoured by AI bots—users already may have adjusted their expectations regarding privacy and anonymity.</p>
      <p>However, when it comes to digital health data, there is an important distinction to be made between noncommercial and commercial use of the data, and perhaps this was the cardinal mistake made by Crisis Text Line—to first communicate that data will never be shared with commercial entities, and then change course, assuming that people who may be fine with giving data (even anonymized) for research purposes to a noncommercial entity (including the volunteers at Crisis Text Line) are also OK with having these anonymized data shared with a commercial entity for machine learning purposes. Research in this journal [<xref ref-type="bibr" rid="ref17">17</xref>] has shown that people generally distrust data use in a commercial context (technology companies, pharmaceutical companies) more than data sharing for pure research purposes.</p>
      <p>The debate over informed consent in the use of “deidentified” internet-generated data for research and commercial use is complex, multifaceted, and constantly evolving.</p>
      <p>In a recent 2024 paper [<xref ref-type="bibr" rid="ref18">18</xref>], the authors argue that especially for digital mental health and other vulnerable populations, the standard to deidentify data to waive informed consent may not be sufficient, and other criteria should be used to address social justice issues. To mitigate the “social risk” of using deidentified data for research without explicit permission from participants, the authors urge researchers to consider the following additional guidelines [<xref ref-type="bibr" rid="ref18">18</xref>]:</p>
      <list list-type="bullet">
        <list-item>
          <p>create socially valuable knowledge,</p>
        </list-item>
        <list-item>
          <p>fairly share the benefits and burdens of research,</p>
        </list-item>
        <list-item>
          <p>be transparent about data use,</p>
        </list-item>
        <list-item>
          <p>create mechanisms for withdrawal of data,</p>
        </list-item>
        <list-item>
          <p>ensure that stakeholders can provide input into the design and implementation of the research, and</p>
        </list-item>
        <list-item>
          <p>responsibly report results.</p>
        </list-item>
      </list>
      <p>Balancing these ethical considerations with the practical needs of research and innovation is a challenge that requires ongoing dialogue and thoughtful regulation. Ultimately, finding a middle ground that protects individuals’ rights while fostering scientific and technological advancement is crucial for navigating this complex issue.</p>
    </sec>
    <sec>
      <title>Conclusion</title>
      <p>In summary, the commentary of Reierson [<xref ref-type="bibr" rid="ref14">14</xref>] and the response of Pisani et al [<xref ref-type="bibr" rid="ref15">15</xref>] highlight the difficult ethical questions nonprofit organizations and companies face when obtaining, analyzing, and sharing data with academics, and even more so for commercial use. The paper by Pisani et al [<xref ref-type="bibr" rid="ref1">1</xref>] is commendable in that it lays open how data sharing for research has been handled by a nonprofit organization, and the approach of assembling an external data ethics committee to help vet research proposals from other researchers is exemplary. Unfortunately, this has been somewhat tainted by events that occurred after we published the paper, when it emerged that Crisis Text Line made the controversial decision to also share the data with its commercial subsidiary for machine learning purposes. The Data Ethics Committee members who authored the 2019 <italic>Journal of Medical Internet Research</italic> paper were apparently not involved or consulted on that. We see the controversy around Loris.ai as a separate debate that does not invalidate the guidelines and approach for noncommercial data sharing published in the 2019 paper. Many organizations (including nonprofits, hospitals, and research centers) have business development officers and commercialization units that think about how to harness the data they have to advance knowledge and how to commercialize their data in an ethical manner. As such, in the era of generative AI and machine learning, nonprofits creating spin-offs or holding equity in companies that commercialize deidentified data may become increasingly common, and the Crisis Text Line and Loris.ai case may serve as a cautionary lesson on the negative public perception of such arrangements.</p>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AI</term>
          <def>
            <p>artificial intelligence</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">CEO</term>
          <def>
            <p>chief executive officer</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">IMIA</term>
          <def>
            <p>International Medical Informatics Association</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">IRB</term>
          <def>
            <p>institutional review board</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">ToS</term>
          <def>
            <p>terms of service</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>GE is the founder, chief executive officer, and executive editor of JMIR Publications, editor-in-chief of the <italic>Journal of Medical Internet Research</italic>, receives a salary, and owns equity.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pisani</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Kanuri</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Filbin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Gallo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Gould</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lehmann</surname>
              <given-names>LS</given-names>
            </name>
            <name name-style="western">
              <surname>Levine</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Marcotte</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Pascal</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Rousseau</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Turner</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Yen</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ranney</surname>
              <given-names>ML</given-names>
            </name>
          </person-group>
          <article-title>Protecting user privacy and rights in academic data-sharing partnerships: principles from a pilot program at Crisis Text Line</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>01</month>
          <day>17</day>
          <volume>21</volume>
          <issue>1</issue>
          <fpage>e11507</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/1/e11507/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/11507</pub-id>
          <pub-id pub-id-type="medline">30664452</pub-id>
          <pub-id pub-id-type="pii">v21i1e11507</pub-id>
          <pub-id pub-id-type="pmcid">PMC6354196</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lublin</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>How data from a crisis text line is saving lives</article-title>
          <source>TED</source>
          <year>2015</year>
          <month>05</month>
          <access-date>2024-12-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ted.com/talks/nancy_lublin_how_data_from_a_crisis_text_line_is_saving_lives/transcript?subtitle=en">https://www.ted.com/talks/nancy_lublin_how_data_from_a_crisis_text_line_is_saving_lives/transcript?subtitle=en</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Boyd</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Crisis Text Line, from my perspective</article-title>
          <source>Zephoria</source>
          <year>2022</year>
          <month>01</month>
          <access-date>2024-12-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.zephoria.org/thoughts/archives/2022/01">https://www.zephoria.org/thoughts/archives/2022/01</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Petersen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Subbian</surname>
              <given-names>V</given-names>
            </name>
            <collab>Section Editors Special Section on Ethics in Health Informatics of the International Medical Informatics Association Yearbook</collab>
          </person-group>
          <article-title>Special section on ethics in health informatics</article-title>
          <source>Yearb Med Inform</source>
          <year>2020</year>
          <month>08</month>
          <volume>29</volume>
          <issue>1</issue>
          <fpage>77</fpage>
          <lpage>80</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.thieme-connect.com/DOI/DOI?10.1055/s-0040-1702014"/>
          </comment>
          <pub-id pub-id-type="doi">10.1055/s-0040-1702014</pub-id>
          <pub-id pub-id-type="medline">32823299</pub-id>
          <pub-id pub-id-type="pmcid">PMC7442530</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reierson</surname>
              <given-names>TD</given-names>
            </name>
          </person-group>
          <article-title>Reader concerns about published work Nov 2021</article-title>
          <source>Reform Crisis Text Line</source>
          <year>2021</year>
          <month>11</month>
          <day>24</day>
          <access-date>2024-12-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://reformcrisistextline.com/wp-content/uploads/2022/01/ltr_2019_Paper_to_JMIR_11-24-2021_share.pdf">https://reformcrisistextline.com/wp-content/uploads/2022/01/ltr_2019_Paper_to_JMIR_11-24-2021_share.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eysenbach</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Till</surname>
              <given-names>JE</given-names>
            </name>
          </person-group>
          <article-title>Ethical issues in qualitative research on internet communities</article-title>
          <source>BMJ</source>
          <year>2001</year>
          <month>11</month>
          <day>10</day>
          <volume>323</volume>
          <issue>7321</issue>
          <fpage>1103</fpage>
          <lpage>5</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/11701577"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmj.323.7321.1103</pub-id>
          <pub-id pub-id-type="medline">11701577</pub-id>
          <pub-id pub-id-type="pmcid">PMC59687</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
          <article-title>Informed consent FAQs</article-title>
          <source>US Department of Health and Human Services</source>
          <access-date>2024-12-23</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hhs.gov/ohrp/regulations-and-policy/guidance/faq/informed-consent/index.html">https://www.hhs.gov/ohrp/regulations-and-policy/guidance/faq/informed-consent/index.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>El Emam</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Hintze</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Does anonymization or de-identification require consent under the GDPR?</article-title>
          <source>IAPP</source>
          <year>2019</year>
          <month>01</month>
          <day>29</day>
          <access-date>2024-12-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://iapp.org/news/a/does-anonymization-or-de-identification-require-consent-under-the-gdpr">https://iapp.org/news/a/does-anonymization-or-de-identification-require-consent-under-the-gdpr</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Levine</surname>
              <given-names>AS</given-names>
            </name>
          </person-group>
          <article-title>Suicide hotline shares data with for-profit spinoff, raising ethical questions</article-title>
          <source>Politico</source>
          <year>2022</year>
          <month>01</month>
          <day>28</day>
          <access-date>2024-12-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.politico.com/news/2022/01/28/suicide-hotline-silicon-valley-privacy-debates-00002617">https://www.politico.com/news/2022/01/28/suicide-hotline-silicon-valley-privacy-debates-00002617</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bordelon</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>FCC Commissioner Carr calls for FTC probe of Crisis Text Line</article-title>
          <source>Benton Institute for Broadband &amp; Society</source>
          <year>2022</year>
          <month>03</month>
          <day>29</day>
          <access-date>2024-12-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.benton.org/headlines/fcc-commissioner-carr-calls-ftc-probe-crisis-text-line">https://www.benton.org/headlines/fcc-commissioner-carr-calls-ftc-probe-crisis-text-line</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="web">
          <article-title>An update on data privacy, our community and our service</article-title>
          <source>Crisis Text Line</source>
          <year>2022</year>
          <month>01</month>
          <day>31</day>
          <access-date>2024-12-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.crisistextline.org/blog/2022/01/31/an-update-on-data-privacy-our-community-and-our-service/">https://www.crisistextline.org/blog/2022/01/31/an-update-on-data-privacy-our-community-and-our-service/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hendel</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Crisis Text Line ends data-sharing relationship with for-profit spinoff</article-title>
          <source>Politico</source>
          <year>2022</year>
          <month>01</month>
          <day>31</day>
          <access-date>2024-12-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.politico.com/news/2022/01/31/crisis-text-line-ends-data-sharing-00004001">https://www.politico.com/news/2022/01/31/crisis-text-line-ends-data-sharing-00004001</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
          <article-title>Conflicts of interest</article-title>
          <source>COPE</source>
          <access-date>2024-12-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://publicationethics.org/competinginterests">https://publicationethics.org/competinginterests</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reierson</surname>
              <given-names>TD</given-names>
            </name>
          </person-group>
          <article-title>Commentary on “Protecting User Privacy and Rights in Academic Data-Sharing Partnerships: Principles from a Pilot Program at Crisis Text Line”</article-title>
          <source>J Med Internet Res</source>
          <year>2024</year>
          <month>12</month>
          <day>30</day>
          <fpage>e42144</fpage>
          <pub-id pub-id-type="doi">10.2196/42144</pub-id>
          <pub-id pub-id-type="medline">39753221</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pisani</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Gallo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Gould</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Kanuri</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Marcotte</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Pascal</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Rousseau</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Rousseau</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Filbin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Turner</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Authors' reply: commentary on “Protecting User Privacy and Rights in Academic Data-Sharing Partnerships: Principles From a Pilot Program at Crisis Text Line”</article-title>
          <source>J Med Internet Res</source>
          <year>2025</year>
          <month>01</month>
          <day>22</day>
          <fpage>e59734</fpage>
          <pub-id pub-id-type="doi">10.2196/59734</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <collab>JMIR Editorial Office</collab>
          </person-group>
          <article-title>Correction: protecting user privacy and rights in academic data-sharing partnerships: principles from a pilot program at Crisis Text Line</article-title>
          <source>J Med Internet Res</source>
          <year>2024</year>
          <month>12</month>
          <day>20</day>
          <volume>26</volume>
          <fpage>e67880</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2024//e67880/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/67880</pub-id>
          <pub-id pub-id-type="medline">39705678</pub-id>
          <pub-id pub-id-type="pii">v26i1e67880</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Biasiotto</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Viberg Johansson</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Alemu</surname>
              <given-names>MB</given-names>
            </name>
            <name name-style="western">
              <surname>Romano</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Bentzen</surname>
              <given-names>HB</given-names>
            </name>
            <name name-style="western">
              <surname>Kaye</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ancillotti</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Blom</surname>
              <given-names>JMC</given-names>
            </name>
            <name name-style="western">
              <surname>Chassang</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hallinan</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Jónsdóttir</surname>
              <given-names>GA</given-names>
            </name>
            <name name-style="western">
              <surname>Monasterio Astobiza</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rial-Sebbag</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Rodríguez-Arias</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Shah</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Skovgaard</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Staunton</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Tschigg</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Veldwijk</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Mascalzoni</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Public preferences for digital health data sharing: discrete choice experiment study in 12 European countries</article-title>
          <source>J Med Internet Res</source>
          <year>2023</year>
          <month>11</month>
          <day>23</day>
          <volume>25</volume>
          <fpage>e47066</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2023//e47066/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/47066</pub-id>
          <pub-id pub-id-type="medline">37995125</pub-id>
          <pub-id pub-id-type="pii">v25i1e47066</pub-id>
          <pub-id pub-id-type="pmcid">PMC10704315</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Herington</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Pisani</surname>
              <given-names>AR</given-names>
            </name>
          </person-group>
          <article-title>Expanding the role of justice in secondary research using digital psychological data</article-title>
          <source>Am Psychol</source>
          <year>2024</year>
          <month>01</month>
          <volume>79</volume>
          <issue>1</issue>
          <fpage>123</fpage>
          <lpage>136</lpage>
          <pub-id pub-id-type="doi">10.1037/amp0001190</pub-id>
          <pub-id pub-id-type="medline">38236220</pub-id>
          <pub-id pub-id-type="pii">2024-44313-010</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
