Preserving participant anonymity during remote preenrollment consent form checking.
نویسندگان
چکیده
BACKGROUND In biomedical research, the consent form must comply with regulatory requirements. Checking for compliance typically has been performed on-site and most frequently after a participant's final enrollment. We use a procedure for remote preenrollment checking of consent forms that protects participant identities. This procedure requires a copy of the consent form that partially masks the fields for participant's name and signature; this copy is faxed to the clinical trials unit for checking. PURPOSE To describe our efforts to identify an appropriate printed masking pattern. We tried several patterns that permit ascertainment of the presence of signatures and names and evaluated each one with respect to degree of masking participant identities. METHODS We assessed the efficiency of a satisfactory pattern through an experiment. We created forms with variants of the masking pattern on the copy to be faxed. We completed the forms with fictitious identities before copies were faxed and checked by clinical research associates. We measured the rate of empty and filled fields detected and the rate of letters and names correctly read. The target was defined as 100% for the rate of empty and filled fields detected and 0% for the rate of letters and names correctly read. RESULTS The best masking pattern allowed the detection of 100% empty and filled fields and the reading of 0% names and 19% letters. Consequently, the consent form with the selected masking pattern has been used routinely in our clinical trials unit. LIMITATIONS We tested only five fictitious identities, five individuals who completed forms, and three who checked forms. Also, we initially considered only four patterns and variations in them. CONCLUSIONS We defined a masking pattern that satisfactorily fulfilled our needs for confidentiality. This and other procedures for remote preenrollment checking of consent form can be a key component of a risk-based monitoring strategy.
منابع مشابه
A Secure Remote Authentication Scheme Preserving User Anonymity with Non-Tamper Resistant Smart Cards
Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Besides, it can avoid unauthorized entities from using the user ID and other intercepted information to forge legal login messages. In 2004, Das et al. first proposed a remote user authentication scheme with smart cards using dynamic ID to protect user anonymity. Later, in 2005, Chien and Che...
متن کاملA Framework for Automatically Checking Anonymity with μCRL (pre-print version)
We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder is able to single out the true originator of a given event or to associate the right event to a given proto...
متن کاملA framework for automatically checking anonymity with CRL
We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder is able to single out the true originator of a given event or to associate the right event to a given proto...
متن کاملCryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
* Corresponding author Summary Even though user anonymity is an important issue in many ecommerce applications, most of smartcard-based remote authentication schemes did not considered user identities protection while authenticating the users. In 2004, Das et al. proposed a remote authentication scheme by preserving the users' anonymity. Their scheme adopted dynamic identification to achieve th...
متن کاملUtility - Preserving k - Anonymity
As technology advances and more and more person-specific data like health information becomes publicly available, much attention is being given to confidentiality and privacy protection. On one hand, increased availability of information can lead to advantageous knowledge discovery; on the other hand, this information belongs to individuals and their identities must not be disclosed without con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Clinical trials
دوره 10 3 شماره
صفحات -
تاریخ انتشار 2013