Skip to main content

METHODS article

Front. Med., 16 May 2024
Sec. Regulatory Science
This article is part of the Research Topic Unlocking The Potential of Health Data Spaces With The Proliferation of New Tools, Technologies and Digital Solutions View all 13 articles

OHDSI-compliance: a set of document templates facilitating the implementation and operation of a software stack for real-world evidence generation

  • Berlin Institute of Health at Charité – Universitätsmedizin Berlin, Center of Health Data Science, Berlin, Germany

Introduction: The open-source software offered by the Observational Health Data Science and Informatics (OHDSI) collective, including the OMOP-CDM, serves as a major backbone for many real-world evidence networks and distributed health data analytics platforms. While container technology has significantly simplified deployments from a technical perspective, regulatory compliance can remain a major hurdle for the setup and operation of such platforms. In this paper, we present OHDSI-Compliance, a comprehensive set of document templates designed to streamline the data protection and information security-related documentation and coordination efforts required to establish OHDSI installations.

Methods: To decide on a set of relevant document templates, we first analyzed the legal requirements and associated guidelines with a focus on the General Data Protection Regulation (GDPR). Moreover, we analyzed the software architecture of a typical OHDSI stack and related its components to the different general types of concepts and documentation identified. Then, we created those documents for a prototypical OHDSI installation, based on the so-called Broadsea package, following relevant guidelines from Germany. Finally, we generalized the documents by introducing placeholders and options at places where individual institution-specific content will be needed.

Results: We present four documents: (1) a record of processing activities, (2) an information security concept, (3) an authorization concept, as well as (4) an operational concept covering the technical details of maintaining the stack. The documents are publicly available under a permissive license.

Discussion: To the best of our knowledge, there are no other publicly available sets of documents designed to simplify the compliance process for OHDSI deployments. While our documents provide a comprehensive starting point, local specifics need to be added, and, due to the heterogeneity of legal requirements in different countries, further adoptions might be necessary.

1 Introduction

1.1 Background

Collecting and analyzing data from real-world healthcare settings at a broad scale can provide new insights into patient outcomes, treatment efficacy, and healthcare practices (1). This usually necessitates bringing together data from several healthcare institutions, which requires the implementation of or mapping to data standards, as well as approaches for ethical and data protection compliant access (2). One common solution for the latter challenge is federation, where the analysis is brought to the data instead of bringing the data to the analysis (3). This is, for example, implemented by SHRINE (4), DataSHIELD (5) and the Observational Health Data Sciences and Informatics (OHDSI) (6) initiative. OHDSI is an international, multidisciplinary community of researchers and healthcare professionals to enable data standardization, analysis, and insight discovery from large-scale health datasets, launched in 2013. The community distributes a set of open-source software tools to represent and analyze data in the Observational Medical Outcomes Partnership (OMOP) Common Data Model (CDM), which makes extensive use of terminologies and ontologies, such as Logical Observation Identifiers Names and Codes (LOINC) or Systematized Nomenclature of Medicine (SNOMED) Clinical Terms (CT) (7). While the term OMOP describes the now discontinued collaboration that originally developed the CDM, the term OMOP-CDM refers to the further developed version that forms the current technical cornerstone of OHDSI. The EHDEN project has funded the deployment of the OMOP-CDM and the OHDSI software stack across Europe (8). Moreover, the OMOP-CDM will also play an important role in the upcoming European Health Data Space (EHDS; see Section “Discussion”). The EHDS is planned as a large-scale ecosystem facilitating better exchange and access to different types of health data throughout the European Union (EU). EHDS pillar I focuses on primary healthcare data use, i.e., data sharing for healthcare delivery. EHDS pillar II focuses on secondary use of health data, e.g., analysis for research, policy-making or drug safety (9).

Setting up an OHDSI node can involve significant efforts, in particular for the required mapping to standards. However, technical and data integration challenges are not the only obstacles faced when connecting to data sharing networks [for one example for the various technical challenges (see 10)]. Legal and regulatory compliance is another important issue (11, 12). National and international data protection laws as well as ethical guidelines must be considered. Important examples include the US Health Insurance Portability and Accountability Act (HIPAA) (13) and the European Union (EU) General Data Protection Regulation (GDPR) (14). To fulfill central requirements, concepts need to be developed and documented for ensuring the confidentiality of the processed healthcare data. An important example is the so-called Record of Processing Activities (ROPA), which needs to be created according to the GDPR, but also according to laws in the United Kingdom (15, 16), Australia (17) or Thailand (18). Amongst other aspects, a ROPA typically describes the processed categories of data and details information flows as well as the technical and organizational security measures implemented, although slight variations might exist between the requirements in different countries. Moreover, information security plays an important role, with relevant standards also requiring documentation of the measures taken (19). Important examples include the International Standards Organization (ISO) Standard 27001 (20), (2) the US National Institute of Standards and Technology (NIST) Cybersecurity Framework (21) or (3) the Health Information Trust Alliance Common Security Framework (HITRUST CSF) (22).

1.2 Objective

It is well known that conceptualizing and documenting the secure operation of data processing platforms can be challenging (23, 24). Research has shown that even reading and comprehending such documents can be difficult (2527). As a result, different guidelines and templates have been developed (see Section Comparison with prior work). However, those are usually generic in nature and not directly applicable to the establishment of an OHDSI node. The objective of the work described in this paper, was to conceptualize an approach specifically for common OHDSI deployments. Moreover, we developed document templates that can be customized to local requirements. We focus on documents for a general OHDSI setup. Depending on the nature of projects that use this infrastructure as well as local requirements, additional documents might be needed for the individual studies performed.

2 Methods

2.1 Overview of the OHDSI tools

The main tools provided by OHDSI are focused on (1) establishing a common data model with clearly defined structure and semantics, as well as (2) assisting medical researchers and data scientists in extracting knowledge from this data. The OMOP-CDM is the central pillar of OHDSI, providing a standardized database schema and a set of terminologies with which heterogeneous data from different sources can be integrated to provide comparability across studies and institutions (28). As a result, OHDSI forms a global network allowing for large-scale distributed studies to be performed. A common database management system for instances of the OMOP-CDM is PostgreSQL (29). In addition, the following tools are provided for data mapping:

WhiteRabbit is a tool to scan and describe source data.

Rabbit in a Hat supports structural mapping between source data and the OMOP-CDM.

USAGI has been designed to support semantic standardization and terminology mapping.

Athena is as a publicly available web service providing access to the vocabulary used by the OMOP-CDM.

We note that OHDSI does not provide a standard tool for extracting, transforming and loading (ETL) data, but focuses on tools for specifying the transformations and mappings needed. A common way of deploying a standard OHDSI stack is the container-based Broadsea distribution (30). An overview of a typical set of components in Broadsea is provided in Figure 1.

Figure 1
www.frontiersin.org

Figure 1. Common architecture of an OHDSI implementation.

As can be seen, a common installation contains the following additional infrastructure components:

• A PostgreSQL database for storing configuration options and study designs.

Apache SOLR for searching through the vocabulary.

OpenLDAP for authentication and authorization.

Based on this basic infrastructure and the CDM, the Broadsea distribution offers further applications for accessing and analyzing the data:

WebAPI is a RESTful service layer for accessing and analyzing data stored in the OMOP-CDM.

ATLAS is a web-based tool for conducting scientific analyses.

ARES is a system facilitating data exploration, characterization, and quality assessments.

RStudio for analyzing data using the statistical programming language R. Broadsea comes with a range of R-packages, such as Shiny for developing interactive web applications and HADES for analyzing data from the OMOP-CDM.

In summary, researchers can work with data stored in the OMOP-CDM through ATLAS and specific R packages. ATLAS provides graphical access to a variety of OHDSI tools and functions, trading usability off against the flexibility of the analyses that can be performed. In addition, analyses can be performed in R using a set of provided packages and APIs, providing more flexibility in working with the data but requiring programming and data science skills.

2.2 Development process

We first identified a set of documents usually required to deploy and operate research systems at German university hospitals. As a basis, these include (1) a description of the processing activities and the technical and organizational measures taken in regards to data protection, (2) an analysis of information security risks and security-related measures taken, (3) a description of processes and responsibilities for maintaining and operating the system. We note that these documents need to be updated regularly following a continuous improvement process.

Next, we related those documents to the systems and processes covered by the common architecture described in the previous section. Data protection aspects were described with a specific focus on systems holding or processing individual-level health data, reflecting requirements by Article 30 GDPR on the content of the description of processing activities. Information security as well as operation of the stack was covered for the complete installation, oriented towards the information security basic protection methodology provided by the German government. Moreover, another document was developed to describe and implement governance processes for use of the data available in the CDM. Finally, we transformed the documents into customizable templates and uploaded them into a version-controlled repository.

3 Results

3.1 Overview

Table 1 provides an overview of the different document templates developed and provided through a GitHub repository (31).

Table 1
www.frontiersin.org

Table 1. Overview of the document templates.

3.2 Record of processing activities

A general description of the software architecture, data flows and processing activities as well as protection measures taken forms the basis of most compliance framework for medical research systems. Thus, as a first component, we developed a template for a Record of Processing Activities (ROPA) for OHDSI installations. As outlined above, ROPAs or related documents are required in most jurisdictions. In this work, we base the content on the requirements outlined in Article 30 of the GDPR and provide information about the personal data processed, the purposes of the processing, retention periods and further relevant details. In the event of legal or data protection audits, the document can be used as a basis to demonstrate compliance and it can also serve as a communication measure for coordinating OHDSI-related activities with an institution’s Data Protection Officer.

3.3 Information security concept

While data protection and the ROPA template emphasizes the handling of personal data in a way that respects the rights and expectations of the data subjects, information security focuses on protecting data from unauthorized access and further threats more relevant to the organization itself than to the data subjects. The well-known ISO/IEC 27000 standard emphasizes confidentiality, integrity, and availability, but also adds further aspects, such as authenticity, accountability, non-repudiation, and reliability (32).

To cover these aspects, we provide a template for describing information security-related properties of OHDSI installations. The template is pragmatic and designed to complement existing information security guidelines at the institution operating the installation. It contains a risk analysis of basic processes carried out with OHDSI installations, such as data transformation, loading, and usage, and systematically describes relevant information security measures. As an example, we use modules from the “Basic Protection” methodology of the Federal Office for Information Security in Germany. While there are some differences to the ISO 27000 set of standards, the “Basic Protection” methodology provides a solid foundation of security controls for achieving ISO 27001 compliance. An organization that already applies ISO 27000 can, for example, benefit from our documents through the included risk assessments and lists of relevant security controls that can inform local information security management processes. The document can also support coordination with an institutions Chief Information Security Officer (CISO).

3.4 Concept of operations

In addition to a sound and secure setup of an OHDSI node, also the operation of the platform needs to be conceptualized and described. Relevant processes also include the continuous improvement process for data protection and information security-related aspects already described above. In addition, the installed components and their configurations need to be kept up to date, user accounts need to be managed and backups need to be performed. The template for an operational concept includes suggestions for those processes, tailored towards the OHDSI components.

3.5 Authorization concept

How access requests by researchers to the OHDSI tools are handled and what governance rules are implemented is an important aspect of compliance. Consequently, we also developed a template for a guideline on how this is implemented. The template describing the access request process describes the duties of administrative personnel responsible for overseeing user access and processes for regular review and removal of outdated permissions. Additionally, it describes the steps researchers must follow to obtain access for conducting studies, including obtaining necessary approvals. In addition to researchers accessing the OHDSI tools, there are further types of personnel involved that need to access the installation for operational purposes. As this is a critical aspect, the proposed template describes all relevant roles, their responsibilities, and access permissions. The template outlines processes for nominating administrators, setting up user access and revoking them upon project completion or staff changes. Moreover, password guidelines and rules for timeouts of sessions are included.

Figure 2 illustrates how the developed document templates cover different components and aspects of a common OHDSI installation. As can be seen, the ROPA focuses on the general setup that processes personal data, while the information security concept and related templates cover all components. Access management focuses specifically on humans involved in the maintenance and use of an installation.

Figure 2
www.frontiersin.org

Figure 2. Role of the different documents in a common OHDSI deployment.

3.6 Customization and document management

We have developed the templates as Markdown files and provide them in the form of a Git repository. Markdown is a lightweight markup language, designed to be easy to write and read, with the ability to present the document content in many different forms. For example, the documents provided can be compiled into PDF files using open-source tools, such as Pandoc. If visual editing is needed, tools like Pandoc can also be used to convert the markdown files into formats suited for word processors, such as the Open Document Format. We recommend to use the templates in their Markdown version, however, as this naturally enables keeping track of changes in versioned repositories, such as Git.

4 Discussion

4.1 Principal results

We presented a set of templates for setting up and maintaining OHDSI installations in compliance with data protection and information security requirements, also covering data governance aspects. The document templates are public available under a permissive license. The templates are meant to provide a starting point and need to be filled out accordingly and potentially extended or modified to comply with local policies or legal requirements. We have successfully executed this process at Charité – Universitätsmedizin Berlin.

4.2 Comparison with related work

Several institutions or research groups have suggested compliance-oriented document templates for data processing in general or for medical research contexts. Examples include data protection guidelines, (see 33) for an example, and templates for institutional review board protocols, (see 34) for an example, and information security aspects, (see 35) as an example. Quite a lot of the documents are tailored towards specific jurisdictions and published in languages other than English [(e.g., 33, 36)]. Our work is different in that it focuses on a typical deployment of a common medical research platform and that its content has been, in large parts, abstracted away from country-specific requirements. Previous work has also focused on compliance for deployments of specific research systems (see the work by Wallace et al. (37) and by Budin-Ljøsne et al. (38) for an example on the DataSHIELD software). To the best of our knowledge, our work is the first to target OHDSI deployments. Governance models have also been studied in the literature. For example, Holmes et al. have presented an overview on governance models for federated research (39). The authors propose a framework with which governance models can be assessed and compared considering different aspects. Pavlenko et al. have focused on data governance for health data warehouses (40).

On a more general level, ethical and legal challenges in data-driven biomedical research have also been studied extensively. For instance, Wang et al. discussed several privacy-enhancing technologies and argue that accountability and informed consent are among the most relevant ethical challenges (41). Arellano et al. conduct a review on privacy regulations, patient perspectives as well as consent practices and their interaction with technology (42). They cover questions, such as under which circumstances consent can be considered ethical. Lamas et al. have argued that ethical and legal frameworks are often not fitting well to common scenarios in the secondary use of health data and the development of health data warehouses (43).

Kalkman et al. have studied the sharing practices for compliance-related documentation (44). The authors found that documents like the ones presented in this work is not common.

The OHDSI software stack addressed in the work described in this paper, is expected to play an important role in the upcoming EHDS and is promoted by a range of institutions. For example, the DARWIN initiative - an infrastructure built by the European Medicines Agency (EMA) to enable the secondary use of real-world data - is based on the OMOP-CDM and can be considered one of the first functional parts of the EHDS (45). The Joint Action Towards the European Health Data Space (TEHDAS) is another project with significant contributions to the shaping of the EHDS. Recently, also Health Level Seven (HL7) International and OHDSI have started a collaboration to work on a joint common data model for sharing information for healthcare and research (46).

4.3 Limitations and future work

One limitation of our work is that it has been designed with European and German requirements in mind, although we aimed at generalizing and abstracting away specifics. We note, however, that there are many similarities between relevant laws and regulations in different parts of the world (cf. similarities between the California Consumer Privacy Act or the EU-US Data Privacy Framework and the GDPR). We stress again that our templates must hence be regarded as a starting point and might need adaptions. In future work, we hope to be able to extend and adjust our templates based on feedback from their application in different contexts and jurisdictions.

Another limitation of our work is that we currently did not explicitly include a document template for a Data Protection Impact Assessment (DPIA). Under the GDPR a DPIA is necessary for processing activities resulting in a high risk for the privacy of the data subjects. If an institution decides that this is needed for an OHDSI installation, tools, such as the one presented in (47), can be used and information from the documents provided through our work can be reused.

One interested area for future work is to more thoroughly study the compliance of data sharing processes within the OHDSI network. For example, it is not trivial to decide when aggregated statistics can be considered to be anonymous data. The OHDSI collective could be supported by a guideline providing legal and technical assessments of commonly used methods.

5 Summary and conclusion

In this paper, we introduced a set of document templates designed to facilitate the implementation and operation of an OHDSI software stack for generating real-world evidence in compliance with data protection and information security requirements. These templates, tailored for typical OHDSI deployments, include crucial documents, such as a Record of Processing Activities, an Information Security Concept, and an Operational Concept. Our work addresses a significant gap by providing a framework adaptable to different institutional and legal requirements, thereby simplifying compliance processes for OHDSI deployments. Despite being primarily oriented towards European and German regulations, our templates can serve as an adaptable starting point for organizations worldwide. Future efforts will focus on refining these templates based on feedback received and extending their scope to further compliance aspects.

Data availability statement

The datasets presented in this study can be found in online repositories. The names of the repository/repositories and accession number(s) can be found below: The templates created can be found in the associated GitHub repository: https://github.com/BIH-MI/ohdsi-compliance.

Author contributions

FW: Conceptualization, Resources, Writing – original draft, Writing – review & editing. HA: Resources, Writing – original draft, Writing – review & editing. FP: Conceptualization, Resources, Writing – original draft, Writing – review & editing.

Funding

The author(s) declare that financial support was received for the research, authorship, and/or publication of this article. This work has been partly funded by the German Federal Ministry of Education and Research under grant number 01ZZ2316B (PrivateAIM).

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

1. Sherman, RE, Anderson, SA, Dal Pan, GJ, Gray, GW, Gross, T, Hunter, NL, et al. Real-world evidence - what is it and what can it tell us? N Engl J Med. (2016) 375:2293–7. doi: 10.1056/NEJMsb1609216

PubMed Abstract | Crossref Full Text | Google Scholar

2. Coorevits, P, Sundgren, M, Klein, GO, Bahr, A, Claerhout, B, Daniel, C, et al. Electronic health records: new opportunities for clinical research. J Intern Med. (2013) 274:547–60. doi: 10.1111/joim.12119

Crossref Full Text | Google Scholar

3. Wirth, FN, Meurers, T, Johns, M, and Prasser, F. Privacy-preserving data sharing infrastructures for medical research: systematization and comparison. BMC Med Inform Decis Mak. (2021) 21:242–55. doi: 10.1186/s12911-021-01602-x

PubMed Abstract | Crossref Full Text | Google Scholar

4. McMurry, AJ, Murphy, SN, MacFadden, D, Weber, G, Simons, WW, Orechia, J, et al. SHRINE: enabling nationally scalable multi-site disease studies. PLoS One. (2013) 8:55811. doi: 10.1371/journal.pone.0055811

Crossref Full Text | Google Scholar

5. Gaye, A, Marcon, Y, Isaeva, J, LaFlamme, P, Turner, A, Jones, EM, et al. DataSHIELD: taking the analysis to the data, not the data to the analysis. Int J Epidemiol. (2014) 43:1929–44. doi: 10.1093/ije/dyu188

PubMed Abstract | Crossref Full Text | Google Scholar

6. Hripcsak, G, Duke, JD, Shah, NH, Reich, CG, Huser, V, Schuemie, MJ, et al. Observational health data sciences and informatics (OHDSI): opportunities for observational researchers. Stud Health Technol Inform. (2015) 216:574–8. doi: 10.3233/978-1-61499-564-7-574

PubMed Abstract | Crossref Full Text | Google Scholar

7. Reich, C, Ostropolets, A, Ryan, P, Rijnbeek, P, Schuemie, M, Davydov, A, et al. OHDSI standardized vocabularies—a large-scale centralized reference ontology for international data harmonization. J Am Med Inform Assoc. (2024) 31:583–90. doi: 10.1093/jamia/ocad247

Crossref Full Text | Google Scholar

8. Voss, EA, Blacketer, C, van Sandijk, S, Moinat, M, Kallfelz, M, van Speybroeck, M, et al. European Health Data & Evidence Network-learnings from building out a standardized international health data network. J Am Med Inform Assoc JAMIA. (2023) 31:209–19. doi: 10.1093/jamia/ocad214

PubMed Abstract | Crossref Full Text | Google Scholar

9. Shabani, M. Will the European health data space change data sharing rules? Science. (2022) 375:1357–9. doi: 10.1126/science.abn4874

PubMed Abstract | Crossref Full Text | Google Scholar

10. Welten, S, Weber, S, Holt, A, Beyan, O, and Decker, S. Will it run?-a proof of concept for smoke testing decentralized data analytics experiments. Front Med. (2023) 10:1305415. doi: 10.3389/fmed.2023.1305415

Crossref Full Text | Google Scholar

11. Vis, DJ, Lewin, J, Liao, RG, Mao, M, Andre, F, Ward, RL, et al. Towards a global cancer knowledge network: dissecting the current international cancer genomic sequencing landscape. Ann Oncol. (2017) 28:1145–51. doi: 10.1093/annonc/mdx037

PubMed Abstract | Crossref Full Text | Google Scholar

12. Khalil, R, Macdonald, JC, Gustafson, A, Aljuburi, L, Bisordi, F, and Beakes-Read, G. Walking the talk in digital transformation of regulatory review. Front Med. (2023) 10:1233142. doi: 10.3389/fmed.2023.1233142

PubMed Abstract | Crossref Full Text | Google Scholar

13. Act Accountability. Health insurance portability and accountability act of 1996. Public Law. (1996) 104:191.

Google Scholar

14. Regulation Protection. Regulation (EU) 2016/679 of the European Parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46. Off J Eur Union OJ. (2016) 59:294.

Google Scholar

16. Data Protection Act (2018) Available at: https://www.legislation.gov.uk/ukpga/2018/12/contents

Google Scholar

18. OneTrust DataGuidance. Comparing privacy laws: GDPR v. Thai Personal Data Protection Act [Internet]. (2024). Available at: https://www.dataguidance.com/sites/default/files/gdpr_v_thailand_updated.pdf

Google Scholar

19. Azmi, R, Tibben, W, and Win, KT. Review of cybersecurity frameworks: context and shared concepts. J Cyber Policy. (2018) 3:258–83. doi: 10.1080/23738871.2018.1520271

Crossref Full Text | Google Scholar

20. ISO/IEC. Information technology - security techniques - information security management systems - requirements (ISO/IEC 27001:2022). Geneva: International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) (2022).

Google Scholar

21. Barrett, MP. Framework for improving critical infrastructure cybersecurity. Gaithersburg: National Institute of Standards and Technology (2018).

Google Scholar

22. HITRUST Alliance. HITRUST common security framework (CSF version 9.0) [Internet]. Frisco: HITRUST Alliance (2021).

Google Scholar

23. Dierks, C, Kircher, P, Husemann, C, Kleinschmidt, J, and Haase, M. Data privacy in european medical research: A contemporary legal opinion. Berlin: MWV Medizinisch Wissenschaftliche Verlagsgesellschaft (2021).

Google Scholar

24. International Association of Privacy Professional. Measuring privacy operations [Internet] (2019). Available at: https://iapp.org/media/pdf/resource_center/measuring_privacy_operations_2019.pdf

Google Scholar

25. Becher, SI, and Benoliel, U. Law in books and law in action: the readability of privacy policies and the GDPR In: K Mathis and A Tor, editors. Consumer law and economics. Berlin: Springer (2021). 179–204. doi: 10.1007/978-3-030-49028-7_9

Crossref Full Text | Google Scholar

26. McDonald, AM, and Cranor, LF. The cost of reading privacy policies. J Law Policy Inf Soc. (2008) 4:543–68.

Google Scholar

27. Benoliel, U, and Becher, S. The duty to read the unreadable. Boston Coll Law Rev. (2019) 60:2255–96. doi: 10.2139/ssrn.3313837

Crossref Full Text | Google Scholar

28. Overhage, JM, Ryan, PB, Reich, CG, Hartzema, AG, and Stang, PE. Validation of a common data model for active safety surveillance research. J Am Med Inform Assoc JAMIA. (2012) 19:54–60. doi: 10.1136/amiajnl-2011-000376

PubMed Abstract | Crossref Full Text | Google Scholar

29. Obe, RO, and Hsu, LS. PostgreSQL: Up and running: A practical guide to the advanced open source database. 3rd ed. Beijing, Boston, Farnham, Sebastopol, Tokyo: O’Reilly (2018). 294 p.

Google Scholar

30. OHDSI. Software Tools (2024). Available at: https://www.ohdsi.org/software-tools/

Google Scholar

31. Wirth, FN, Abu Attieh, H, and Prasser, F. OHDSI compliance. (2024) Available at: https://github.com/BIH-MI/ohdsi-compliance

Google Scholar

32. ISO/IEC. Information technology - security techniques - information security management systems - overview and vocabulary (ISO/IEC 27000:2020). Geneva: International Organization for Standardization (ISO) and international Electrotechnical commission (IEC) (2020).

Google Scholar

33. Pommerening, K, Drepper, J, Helbing, K, and Ganslandt, T. Leitfaden zum Datenschutz in medizinischen Forschungsprojekten: Generische Lösungen der TMF 2.0. Berlin: MWV Medizinisch Wissenschaftliche Verlagsgesellschaft (2014).

Google Scholar

34. National Institutes of Health. Protocol template for secondary research with biospecimens, data and/or medical records only [Internet]. Available at: https://ohsrp.nih.gov/confluence/download/attachments/67273200/Secondary%20Research%20Protocol%20Template.docx?api=v2

Google Scholar

36. Frielitz, F, Storm, N, Hiort, O, Katalinic, A, and von Sengbusch, S. Die Erstellung eines Datenschutzkonzeptes: eine Anleitung für telemedizinische Versorgungsprojekte. Bundesgesundheitsblatt. (2019) 62:479:485. doi: 10.1007/s00103-019-02918-w

Crossref Full Text | Google Scholar

37. Wallace, SE, Gaye, A, Shoush, O, and Burton, PR. Protecting personal data in epidemiological research: DataSHIELD and UK law. Public Health Genomics. (2014) 17:149–57. doi: 10.1159/000360255

PubMed Abstract | Crossref Full Text | Google Scholar

38. Budin-Ljøsne, I, Burton, P, Isaeva, J, Gaye, A, Turner, A, Murtagh, MJ, et al. DataSHIELD: an ethically robust solution to multiple-site individual-level data analysis. Public Health Genomics. (2015) 18:87–96. doi: 10.1159/000368959

Crossref Full Text | Google Scholar

39. Holmes, JH, Elliott, TE, Brown, JS, Raebel, MA, Davidson, A, Nelson, AF, et al. Clinical research data warehouse governance for distributed research networks in the USA: a systematic review of the literature. J Am Med Inform Assoc JAMIA. (2014) 21:730–6. doi: 10.1136/amiajnl-2013-002370

PubMed Abstract | Crossref Full Text | Google Scholar

40. Pavlenko, E, Strech, D, and Langhof, H. Implementation of data access and use procedures in clinical data warehouses. A systematic review of literature and publicly available policies. BMC Med Inform Decis Mak. (2020) 20:157. doi: 10.1186/s12911-020-01177-z

Crossref Full Text | Google Scholar

41. Wang, S, Bonomi, L, Dai, W, Chen, F, Cheung, C, Bloss, CS, et al. Big data privacy in biomedical research. IEEE Trans Big Data. (2016) 6:296–308. doi: 10.1109/TBDATA.2016.2608848

PubMed Abstract | Crossref Full Text | Google Scholar

42. Arellano, AM, Dai, W, Wang, S, Jiang, X, and Ohno-Machado, L. Privacy policy and technology in biomedical data science. Annu Rev Biomed Data Sci. (2018) 1:115–29. doi: 10.1146/annurev-biodatasci-080917-013416

PubMed Abstract | Crossref Full Text | Google Scholar

43. Lamas, E, Barh, A, Brown, D, and Jaulent, MC. Ethical, legal and social issues related to the health data-warehouses: re-using health data in the research and public health research. Stud Health Technol Inform. (2015) 210:719–23. doi: 10.3233/978-1-61499-512-8-719

PubMed Abstract | Crossref Full Text | Google Scholar

44. Kalkman, S, Mostert, M, Udo-Beauvisage, N, van Delden, JJ, and van Thiel, GJ. Responsible data sharing in a big data-driven translational research platform: lessons learned. BMC Med Inform Decis Mak. (2019) 19:283. doi: 10.1186/s12911-019-1001-y

PubMed Abstract | Crossref Full Text | Google Scholar

45. Arlett, P, Kjær, J, Broich, K, and Cooke, E. Real-world evidence in EU medicines regulation: enabling use and establishing value. Clin Pharmacol Ther. (2022) 111:21–3. doi: 10.1002/cpt.2479

PubMed Abstract | Crossref Full Text | Google Scholar

46. OHDSI. HL7 International and OHDSI announce collaboration to provide single common data model for sharing information in clinical care and observational research (2024). Available at: https://www.ohdsi.org/ohdsi-hl7-collaboration/

Google Scholar

47. CNIL The open source PIA software helps to carry out data protection impact assessment (2023). Available at: https://www.cnil.fr/en/open-source-pia-software-helps-carry-out-data-protection-impact-assessment

Google Scholar

Keywords: health data analytics, real-world evidence, observational health data science, regulatory compliance, data protection

Citation: Wirth FN, Abu Attieh H and Prasser F (2024) OHDSI-compliance: a set of document templates facilitating the implementation and operation of a software stack for real-world evidence generation. Front. Med. 11:1378866. doi: 10.3389/fmed.2024.1378866

Received: 30 January 2024; Accepted: 02 May 2024;
Published: 16 May 2024.

Edited by:

Gokce Banu Laleci Erturkmen, Software Research and Development Consulting, Türkiye

Reviewed by:

Pantelis Natsiavas, Institute of Applied Biosciences, Greece
Martin Hofmann-Apitius, Fraunhofer Institute for Algorithms and Scientific Computing (FHG), Germany

Copyright © 2024 Wirth, Abu Attieh and Prasser. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Fabian Prasser, ZmFiaWFuLnByYXNzZXJAY2hhcml0ZS5kZQ==

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.