NIH | National Cancer Institute | NCI Wiki  

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 50 Next »

Contents of This Page

Administrative Resources

NCI Wiki

http://wiki.nci.nih.gov/display/MIDI/MIDI+Task+Group

Action: Request access to the NCI Wiki as follows:

  1. Click https://userregistration.nci.nih.gov/protected/itrust/access-request
  2. Select either Research Organization or Google. Start by clicking Research Organization and looking for your organization. If your organization is not found or you do not want to authenticate using your organization account, use Google.
  3. Complete and submit the form.
    For the "Which application do you need to access?" question, answer https://wiki.nci.nih.gov/display/MIDI/Medical+Imaging+De-Identification+Home. For the Access level question, answer "Read/Write." For the Justification question, answer "Member of MIDI Task Group."

Shared Bibliography

Please accept the Mendeley invitation to the MIDI private group.

Be sure to create an Elsevier account with the email address David used to invite you. If you want to use an existing Elsevier account, please send David the email address associated with it, so that he can send the invitation to the private group to that address.

Please add relevant publications to the shared bibliography. David will continue to maintain this bibliography.

2021 MIDI Task Group Meeting Notes

January 11, 2022 Meeting

Interim Report Best Practices And Recommendations Extract as of 20220107

  • Fred asked if the report should be focused on the US given that the details can differ geographically.
  • Data created from European persons may not satisfy GDPR.
  • We should highlight when this is true, along with caveats and any possible workarounds.
  • Fred likes the ideas of universal guidelines to recommend to the EU.
  • We will share the report with international colleagues once it the report is fleshed out.
  • California regulations exclude healthcare data. 
  • Is it fair to focus on ethical and moral concerns as well as the legal concerns? We're trying to reduce the actual re-id risk and harm.
  • So far we're focused on DICOM images.
  • Kathy: Say anything about raw data signals?
  • Wyatt: DICOM SR objects and embedded PDFs? Non-image objects, RT plans.
  • Need a more precise definition for unrecognized. It is the opposite of "what is known to be safe."
  • Specify what constitutes due diligence as you conduct your risk analysis. Can't help the unknown unknowns.
  • Make the definition of collection clear. Collection doesn't communicate "version."
  • "Release" not as good as "collection."
  • "Indirect" and "direct" identifiers, sensitive information–a disease that may make someone discriminate against you or function as an indirect identifier.
  • Ideally, you'd want to quantify the percentage of data elements you will be retaining.
  • The paper will highlight the uncertainty.
  • Steve: Address optional attributes as well.
  • Calibration information can identify the machine used.
  • Consistency of acquisition protocols.
  • Need to consider and determine which options to the profile are selected. 
  • Part 15 and best practices are different.
  • Only got through item 6 in the Summary of Best Practices. Will pick this up at the next meeting. To save time, team members can send David their comments in writing.

Action: Review the Interim Report and email David Clunie your comments.

February 8, 2022 Meeting

Interim Report Best Practices And Recommendations Extract as of 20220208

ITEM 6

  • A paper in BMJ and Trials [Hrynaszkiewicz et al] in which the editor said it's okay to keep three patient characteristics, but more than that requires expert statistical analysis of re-identification risk.
  • For this report, David C. is leaning towards saying that if any characteristics are retained, a statistical analysis should be performed, based on evaluation in IOM Report Sharing Clinical Trial Data: Maximizing Benefits, Minimizing Risk that suggest no empirical basis for rule of two or three quasi-identifiers (Appendix B  [El Emam & Malin]).
  • Fred asks what the risk threshold we are comfortable with. David says we need the analysis first, then compare that against the risk threshold.
  • David recommends this for the report: Choose a risk threshold, do the analysis, and modify/share your data based upon that analysis.
  • Is this a reasonable recommendation given that none of us are doing the statistical analysis routinely?
  • David Gutman: Studies that leave out age and sex are not interesting.
  • Some TCIA collections are useful even without age and sex.
  • HIPAA Safe Harbor is only useful in the US. We are trying to do more than these 18 elements when it comes to de-id.
  • In radiology we have traditionally just relied on lists.
  • Information can be derived or approximated from images. If pixel data render the data unique, change it to make it less recognizable or delete it. The analysis can lead you to a decision on how to handle this.
  • We would be better off recommending this and then over the next several years, hopefully there will be more research into practical ways of doing this. 
  • Invite selected people from the statistical disclosure community to comment on this and say which tools they use. 
  • In Europe, GDPR has gotten to the point where you can't share any data. Do we want to go that route?
  • Rather than get so extreme, maybe just leave age out of this data, or change it to meet the risk threshold.
  • Is there a scalable way to do this?
  • Radiology has been immature about this and has not considered existing research into approaches.
  • David C. recommends that we read the CAR papers: Canadian Association of Radiologists White Paper on De-Identification of Medical Imaging:
  • David G: I realize this is a nuance.. but if we recommend X, and many of the people on this group don't currently do X because it's extremely difficult/nebulous. do we shoot ourselves in the foot? bone density?
  • Fred: Hospitals in different countries. Multiple ethics review boards in the same country. Need a threshold that is agreed upon if you are going to de-id anything.
  • The risk is finite, so we need to pick a threshold.
  • Threshold: Probability of re-id based on threat model. Pick the most conservative one and compute the probability. 
  • Justin: I'd be very interested to try applying one or two of these automated tools David mentioned against a couple of TCIA datasets to see what happens and help inform the recommendation in the report.
  • David C: Yes, let's try this.
  • People need to balance utility and risk and insure themselves in the meantime.
  • Brian: Utility has zero value to legal people. Risk is always increasing because technology gets better and better.
  • Countermeasures which hopefully will keep everything balanced. With released data, unless you are going to pull it back and not release it, the risk always goes up.
  • Should we get a guest speaker for the next meeting? Group says yes.

ITEM 8

ITEM 9

  • This is an obvious item that should be stated.
  • David is undecided how to deal with stratification. Do people agree that it's fine to stratify images and not check each one?
  • Brian checks each one because the metadata is not reliable enough to stratify it. Others agree with looking at everything and not stratifying.

Actions:

  • David Clunie will recruit a statistician with the right expertise to speak with us at the March 8 meeting.
  • David will continue refining the Interim Report.
  • All Task Group members are welcome to email David your comments on the report.

March 1, 2022 Meeting

Presentation by Khaled El Emam on Re-identification Risk Measurement - slides, slides with annotations.

  • definition of identity disclosure
  • quasi-identifiers
  • attack in two directions - population to sample, sample to population
  • risk measure by group size (of 1 = unique)
  • generalize - group size gets bigger - risk reduces - maximum (k-anonymity)(public), average (non-public), unicity
  • risk denominator is not group size in sample but in population
  • risk threshold in identifiability spectrum
  • privacy-utility tradeoff
  • data transformations - generalization, suppression, addition of noise, microaggregation
  • for non-public data, can add controls (privacy, security, contractual)
  • motivated intruder attack

Two publicly available tools:

Papers:

El Emam background and bibliography

Discussion

  •