DNA databanks and consent: A suggested policy option involving an authorization model

نویسندگان

  • Timothy Caulfield
  • Ross EG Upshur
  • Abdallah Daar
چکیده

BACKGROUND Genetic databases are becoming increasingly common as a means of determining the relationship between lifestyle, environmental exposures and genetic diseases. These databases rely on large numbers of research subjects contributing their genetic material to successfully explore the genetic basis of disease. However, as all possible research questions that can be posed of the data are unknown, an unresolved ethical issue is the status of informed consent for future research uses of genetic material. DISCUSSION In this paper, we discuss the difficulties of an informed consent model for future ineffable uses of genetic data. We argue that variations on consent, such as presumed consent, blanket consent or constructed consent fail to meet the standards required by current informed consent doctrine and are distortions of the original concept. In this paper, we propose the concept of an authorization model whereby participants in genetic data banks are able to exercise a certain amount of control over future uses of genetic data. We argue this preserves the autonomy of individuals at the same time as allowing them to give permission and discretion to researchers for certain types of research. SUMMARY The authorization model represents a step forward in the debate about informed consent in genetic databases. The move towards an authorization model would require changes in the regulatory and legislative environments. Additionally, empirical support of the utility and acceptability of authorization is required.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation

Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. Existing modality conflict detection approaches do not consider complex condition attributes such as spatial and temporal constraints. An effective authorization propagation rule is n...

متن کامل

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

Optimal replenishment and credit policy in supply chain inventory model under two levels of trade credit with time- and credit-sensitive demand involving default risk

Traditional supply chain inventory modes with trade credit usually only assumed that the up-stream suppliers offered the down-stream retailers a fixed credit period. However, in practice the retailers will also provide a credit period to customers to promote the market competition. In this paper, we formulate an optimal supply chain inventory model under two levels of trade credit policy with d...

متن کامل

Consenting to Computer Use

The federal Computer Fraud and Abuse Act ("CFAA ") makes it a crime to "access[] a computer without authorization or exceed[] authorized access." Courts and commentators have struggled to explain what types of conduct by a computer user are "without authorization." But this approach is backwards; authorization is not so much a question of what a computer user does, as it is a question of what a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • BMC Medical Ethics

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2003