{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:28:51Z","timestamp":1772908131897,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"1","funder":[{"DOI":"10.13039\/100004431","name":"Directorate-General for Research and Innovation","doi-asserted-by":"publisher","award":["284209"],"award-info":[{"award-number":["284209"]}],"id":[{"id":"10.13039\/100004431","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s12911-016-0325-0","type":"journal-article","created":{"date-parts":[[2016,7,7]],"date-time":"2016-07-07T06:28:47Z","timestamp":1467872927000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Legal assessment tool (LAT): an interactive tool to address privacy and data protection issues for data sharing"],"prefix":"10.1186","volume":"16","author":[{"given":"Wolfgang","family":"Kuchinke","sequence":"first","affiliation":[]},{"given":"Christian","family":"Krauth","sequence":"additional","affiliation":[]},{"given":"Ren\u00e9","family":"Bergmann","sequence":"additional","affiliation":[]},{"given":"T\u00f6resin","family":"Karakoyun","sequence":"additional","affiliation":[]},{"given":"Astrid","family":"Woollard","sequence":"additional","affiliation":[]},{"given":"Irene","family":"Schluender","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Braasch","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Eckert","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Ohmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,7]]},"reference":[{"key":"325_CR1","unstructured":"Obligations of data controllers. http:\/\/ec.europa.eu\/justice\/data-protection\/data-collection\/obligations\/index_en.htm . Accessed 27 Apr 2016."},{"key":"325_CR2","doi-asserted-by":"crossref","first-page":"1144","DOI":"10.1186\/1471-2458-14-1144","volume":"14","author":"WG Panhuis van","year":"2014","unstructured":"van Panhuis WG, Paul P, Emerson C, Grefenstette J, Wilder R, Herbst AJ. Heymann D and Donald S Burke. A systematic review of barriers to data sharing in public health. BMC Public Health. 2014;14:1144\u201353.","journal-title":"BMC Public Health"},{"issue":"1","key":"325_CR3","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1001\/jama.2009.958","volume":"302","author":"LM Lee","year":"2009","unstructured":"Lee LM, Gostin LO. Ethical collection, storage, and use of public health data: a proposal for a national privacy protection. JAMA. 2009;302(1):82\u20134.","journal-title":"JAMA"},{"key":"325_CR4","unstructured":"IMIA Code of Ethics for Health Information Professionals. http:\/\/www.imia-medinfo.org\/new2\/node\/39 . Accessed 27 Apr 2016."},{"key":"325_CR5","first-page":"141","volume":"20","author":"KW Goodman","year":"2013","unstructured":"Goodman KW, Adams S, Berner ES, Embi PJ, Hsiung R, et al. AMIA\u2019s code of professional and ethical conduct. JAMIA. 2013;20:141\u20133.","journal-title":"JAMIA"},{"key":"325_CR6","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1186\/s40504-014-0022-7","volume":"11","author":"M Shabani","year":"2015","unstructured":"Shabani M, Borry P. Challenges of web-based personal genomic data sharing. Life Sciences, Society and Policy. 2015;11:3\u201316.","journal-title":"Life Sciences, Society and Policy"},{"key":"325_CR7","doi-asserted-by":"crossref","first-page":"895","DOI":"10.1007\/s00439-014-1432-6","volume":"133","author":"BM Knoppers","year":"2014","unstructured":"Knoppers BM, Harris JR, Budin-Lj\u00f8sne I, Dove ES. A human rights approach to an international code of conduct for genomic and clinical data sharing. Hum Genet. 2014;133:895\u2013903.","journal-title":"Hum Genet"},{"issue":"1","key":"325_CR8","doi-asserted-by":"crossref","first-page":"11","DOI":"10.2310\/JIM.0b013e3181c9b2ea","volume":"58","author":"B Malin","year":"2010","unstructured":"Malin B, Karp D, Scheuermann RH. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research. J Investig Med. 2010;58(1):11\u20138.","journal-title":"J Investig Med"},{"issue":"Suppl 1","key":"325_CR9","doi-asserted-by":"crossref","first-page":"S3","DOI":"10.1186\/1472-6947-14-S1-S3","volume":"14","author":"F Yu","year":"2014","unstructured":"Yu F, Ji Z. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge. BMC Med Inform Decis Mak. 2014;14 Suppl 1:S3\u201311.","journal-title":"BMC Med Inform Decis Mak"},{"issue":"Suppl 1","key":"325_CR10","doi-asserted-by":"crossref","first-page":"S1","DOI":"10.1186\/1472-6947-14-S1-S1","volume":"14","author":"X Jiang","year":"2014","unstructured":"Jiang X, Zhao Y, Wang X, Malin B, Wang S, Ohno-Machado L, Tang H. A community assessment of privacy preserving techniques for human genomes. BMC Med Inform Decis Mak. 2014;14 Suppl 1:S1.","journal-title":"BMC Med Inform Decis Mak"},{"key":"325_CR11","unstructured":"BioMedBridges. www.biomedbridges.eu\/ . Accessed 27 Apr 2016."},{"key":"325_CR12","unstructured":"ESFRI (European Strategy Forum on Research Infrastructures). http:\/\/ec.europa.eu\/research\/infrastructures\/index_en.cfm?pg=esfri . Accessed 27 Apr 2016."},{"key":"325_CR13","unstructured":"Ohmann C, Kuhn K and WP5: Deliverable D5.1. Tool for the assessment of regulatory and ethical requirements. BioMedBridges (31 December 2013). http:\/\/www.biomedbridges.eu\/sites\/biomedbridges.eu\/files\/documents\/deliverables\/d5-2_report_biomedbridges_deliverable_assessment_tool_edited _final_complete.pdf. Accessed 27 Apr 2016."},{"key":"325_CR14","unstructured":"Information Management Glossary, SourceMedia (2016). http:\/\/www.information-management.com\/glossary\/d.html . Accessed 27 Apr 2016."},{"key":"325_CR15","unstructured":"Large human databases with human data have been created, like the Human Metabolome Database (HMDB), Immuno Polymorphism Database, 1000 Genomes Project, European Genome-phenome Archive. http:\/\/www.hmdb.ca\/ , https:\/\/www.ebi.ac.uk\/ipd\/. http:\/\/www.1000genomes.org\/, https:\/\/www.ebi.ac.uk\/ega\/home. Accessed 27 Apr 2016."},{"key":"325_CR16","volume-title":"European Research Infrastructures with global impact","author":"ESFRI","year":"2013","unstructured":"ESFRI. European Research Infrastructures with global impact. Brussels, Belgium: ESFRI brochure 113. SFRI Secretariat; 2013."},{"key":"325_CR17","unstructured":"e-IRG Report on Data Management. Data Management Task Force. Espoo, Finland: e-IRG secretariat; 2009."},{"key":"325_CR18","unstructured":"Uhlir PF. The Legal Interoperability of Data. NSGIC Conference, 24\u201327 Feb 2013, Annapolis, MD, USA (2013). http:\/\/www.nsgic.org\/public_resources\/02_Uhlir_Legal-Interoperability-of-Data_NSGIC-Conf_Feb13.pdf . Accessed 27 Apr 2016."},{"key":"325_CR19","unstructured":"SMART2007\/0059. Study on the legal framework for interoperable eHealth in Europe. Final report. Version 1.5. Brussels: European Commission (2009)."},{"key":"325_CR20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-00026-8","volume-title":"Opening Science","author":"S Bartling","year":"2014","unstructured":"Bartling S, Friesike S. Opening Science. Heidelberg, Germany: Springer One; 2014."},{"key":"325_CR21","volume-title":"Encyclopedia of Computer Science and Technology","author":"K Pohl","year":"1997","unstructured":"Pohl K. Requirements Engineering: An Overview. In: Encyclopedia of Computer Science and Technology, vol. 36. New York, USA: Marcel Dekker, Inc; 1997."},{"key":"325_CR22","doi-asserted-by":"crossref","unstructured":"Sutcliffe A. Scenario-based requirements engineering. Requirements Engineering Conference 2003. Proceedings. 11th IEEE International; 2003. 320\u2013329.","DOI":"10.1109\/ICRE.2003.1232776"},{"key":"325_CR23","volume-title":"Scenarios, Stories, Use Cases. Through the systems development life-cycle","author":"A Ian","year":"2004","unstructured":"Ian A, Neil M. Scenarios, Stories, Use Cases. Through the systems development life-cycle. Chichester, England: John Wiley & Sons, Ltd; 2004."},{"key":"325_CR24","unstructured":"Interface (computing). https:\/\/en.wikipedia.org\/wiki\/Interface_(computing ). Accessed 29 Apr 2016."},{"key":"325_CR25","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995. No L 281\/31. Luxembourg, Luxembourg; 1995."},{"key":"325_CR26","unstructured":"Guideline for Good Clinical Practice E6(R1). ICH Expert Working Group; 1996."},{"key":"325_CR27","unstructured":"World Intellectual Property Organisation (WIPO). http:\/\/www.wipo.int\/ipstrategies\/en\/ . Accessed 26 Apr 2016."},{"key":"325_CR28","doi-asserted-by":"crossref","first-page":"326","DOI":"10.3414\/ME10-01-0075","volume":"50","author":"H Boussi Rahmouni","year":"2011","unstructured":"Boussi Rahmouni H, Solomonides T, Casassa Mont M, Shiu S, Rahmouni M. A model-driven privacy compliance decision support for medical data sharing in Europe. Methods Inf Med. 2011;50:326\u201336.","journal-title":"Methods Inf Med"},{"issue":"June","key":"325_CR29","first-page":"2997","volume":"4","author":"L Ramingwong","year":"2012","unstructured":"Ramingwong L. A review of requirements engineering processes, problems and models. Int J Eng Sci Technol (IJEST). 2012;4(June):2997\u20133002.","journal-title":"Int J Eng Sci Technol (IJEST)"},{"key":"325_CR30","unstructured":"Legal Assessement Tool (LAT). http:\/\/hhu2.at.xencon.de:8080\/lat\/tool . Accessed 26 Apr 2016."},{"key":"325_CR31","unstructured":"Train-online LAT. http:\/\/www.ebi.ac.uk\/training\/online\/ . Accessed 26 Apr 2016."},{"key":"325_CR32","unstructured":"The Ethical Governance Framework of BioMedBridges. http:\/\/www.biomedbridges.eu\/deliverables\/16 . Accessed 26 Apr 2016."},{"key":"325_CR33","unstructured":"de Maat E, van Engers TM. Mission impossible? Automated norm analysis of legal texts. Legal Knowledge and Information systems, Jurix. 2003 (sixteenth Annual Conference); 2003. p.398."},{"key":"325_CR34","unstructured":"Gaur S, Vo NH, Kashihara K, Baral C. Translating Simple Legal Text to Formal Representations (2015). http:\/\/www.public.asu.edu\/~cbaral\/papers\/shruti2015.pdf . Accessed 26 Apr 2016."},{"key":"325_CR35","doi-asserted-by":"crossref","unstructured":"Poulin D, Bratley P, Fr\u00e9mont J, Mackaay E. Legal interpretation in expert systems. In: Proceedings of the 4th international conference on Artificial intelligence and law. ACM; 1993. pp. 90\u201399.","DOI":"10.1145\/158976.158988"},{"key":"325_CR36","doi-asserted-by":"crossref","unstructured":"Grabmair M, Ashley KD. Towards Modeling Systematic Interpretation of Codified Law. In: Moens MF, Spyns P, editors. Legal Knowledge and Information Systems (JURIX 2005). Amsterdam: IOS Press; 2005. p. 107-8.","DOI":"10.1201\/9780203492451.ch9"},{"key":"325_CR37","doi-asserted-by":"crossref","unstructured":"Breaux TD, Vail MW, Ant\u00f3n A. Towards regulatory compliance: Extracting rights and obligations to align requirements with regulations. In: Requirements Engineering, 14th IEEE International Conference Proceedings (IEEE 2006, September); 2006:49\u201358.","DOI":"10.1109\/RE.2006.68"},{"key":"325_CR38","volume-title":"Ontological Semantics for Data Privacy Compliance: The NEURONA Project","author":"N Casellas","year":"2010","unstructured":"Casellas N, Nieto JE, Mero\u00f1o A, et al. Ontological Semantics for Data Privacy Compliance: The NEURONA Project. Palo Alto, California: 2010 AAAI Spring Symposium Series; 2010."},{"key":"325_CR39","unstructured":"Cappelli A, Lenzi VB, Sprugnoli R, Biagioli C. Modelization of Domain Concepts Extracted from the Italian Privacy Legislation. In: Proceedings of the Workshop on Computational Semantics (IWCS-7); 2007. http:\/\/www.ittig.cnr.it\/Presentazione\/OrganizzazioneLogistica\/biagioli\/Cappelli-et-al.pdf . Accessed 26 Apr 2016."},{"key":"325_CR40","unstructured":"LKIF-Core Ontology - core ontology of basic legal concepts. http:\/\/www.estrellaproject.org\/lkif-core\/ . Accessed 26 Apr 2016."},{"issue":"3","key":"325_CR41","doi-asserted-by":"crossref","first-page":"200","DOI":"10.4236\/jsea.2012.53026","volume":"5","author":"DS Allison","year":"2012","unstructured":"Allison DS, Capretz MAM, ELYamany HF, Wang S. Privacy protection framework with defined policies for service-oriented architecture. J Softw Eng Appl. 2012;5(3):200\u201315. http:\/\/ir.lib.uwo.ca\/electricalpub\/27 . Accessed 26 Apr 2016.","journal-title":"J Softw Eng Appl"},{"key":"325_CR42","volume-title":"Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). NIST, Special Publication 800\u2013122","author":"E McCallister","year":"2010","unstructured":"McCallister E, Grance T, Scarfone K. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). NIST, Special Publication 800\u2013122. Gaithersburg, USA: National Institute of Standards and Technology; 2010."},{"key":"325_CR43","volume-title":"Proc. 22nd IEEE Int. Symp","author":"HB Rahmouni","year":"2009","unstructured":"Rahmouni HB, Solomonides T, Mont MC, Shiu S. Privacy compliance in European healthgrid domains: an ontology-based approach. In: Proc. 22nd IEEE Int. Symp. Albuquerque, NM: On Computer-Based Medical Systems, CBMS 2009; 2009."},{"key":"325_CR44","doi-asserted-by":"crossref","unstructured":"Rahmouni HB, Solomonides T, Mont MC, Shiu S. Ontology-based privacy compliance on European healthgrid domains. In: Proc. 11th Int. Prot\u00e9g\u00e9 Conf. Amsterdam, The Netherlands, 23\u201326 June 2009; 2009. http:\/\/protege.stanford.edu\/conference\/2009\/abstracts\/S13P1Boussi.pdf for extended abstract. Accessed 26 Apr 2016.","DOI":"10.1109\/CBMS.2009.5255423"},{"key":"325_CR45","unstructured":"Home State Compliance. http:\/\/www.bbmri-wp4.eu\/wiki\/index.php\/Home_State_Compliance . Accessed 26 Apr 2016."},{"key":"325_CR46","unstructured":"Nielsen F, Teperek M. How to share personal\/sensitive research data? Repositive, Blog, 29 February 2016, University of Cambridge. Cambridge UK: Future Business Centre. http:\/\/blog.repositive.io\/how-to-share-personal-sensitive-research-data\/ . Accessed 26 Apr 2016"},{"issue":"12","key":"325_CR47","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1016\/j.ijmedinf.2014.08.009","volume":"83","author":"W Kuchinke","year":"2014","unstructured":"Kuchinke W, Ohmann C, Verheij RA, van Veen EB, Arvanitis TN, Taweel A, Delaney BC. A standardised graphic method for describing data privacy frameworks in primary care research using a flexible zone model. Int J Med Inform. 2014;83(12):941\u201357.","journal-title":"Int J Med Inform"},{"key":"325_CR48","unstructured":"Expert Advisory Group on Data Access: Governance of Data Access. London UK: Wellcome Trust (June 2015). http:\/\/eprints.whiterose.ac.uk\/92286\/1\/wtp059343.pdf . Accessed 26 Apr 2016."},{"key":"325_CR49","unstructured":"Governance of data access, London UK: Wellcome Trust. http:\/\/www.wellcome.ac.uk\/About-us\/Policy\/Spotlight-issues\/Data-sharing\/EAGDA\/wtp059350.htm . Accessed 26 Apr 2016."},{"key":"325_CR50","unstructured":"Data Best Practices. Research data. Working with Sensitive Data. Berkeley, CA, USA: University of California Berkeley. http:\/\/researchdata.berkeley.edu\/content\/working-sensitive-data . Accessed 26 Apr 2016."},{"key":"325_CR51","unstructured":"ANDS (Australian National Data Service) Guide: Ethics, consent and data sharing. http:\/\/ands.org.au\/guides\/ethics-consent-and-data-sharing . Accessed 25 Apr 2016."},{"key":"325_CR52","volume-title":"Personal and sensitive research data & the law. UCL Blog (22 January 2016)","author":"N Bhimani","year":"2016","unstructured":"Bhimani N. Personal and sensitive research data & the law. UCL Blog (22 January 2016). London UK: University College London; 2016. https:\/\/blogs.ucl.ac.uk\/rdm\/2016\/01\/personal-and-sensitive-research-data-the-law\/ . Accessed 25 Apr 2016."},{"key":"325_CR53","unstructured":"Regulatory Affairs Database. TREAT-NMD. http:\/\/www.treat-nmd.eu\/industry\/regulatory-affairs\/ . Accessed 28 Apr 2016."},{"key":"325_CR54","unstructured":"ELSI2.0 workspace. https:\/\/elsi2workspace.tghn.org\/ . Accessed 28 Apr 2016."},{"key":"325_CR55","unstructured":"HumGen: International Database on the Legal, Social, and Ethical Aspects of Human Genetics. http:\/\/www.humgen.org\/ . Accessed 01 June 2016."},{"key":"325_CR56","unstructured":"BioPolicy Wiki. http:\/\/www.biopolicywiki.org\/index.php?title=Main_Page . Accessed 01 June 2016."},{"key":"325_CR57","unstructured":"WHO's ELSI Genetics Resource Directory. http:\/\/www.who.int\/genomics\/elsi\/regulatory_data\/en\/ . Accessed 28 Apr 2016."},{"key":"325_CR58","unstructured":"US. DOE ELSI Research. http:\/\/www.ornl.gov\/sci\/techresources\/Human_Genome\/research\/elsi.shtml . Accessed 25 Apr 2016."},{"key":"325_CR59","unstructured":"Center for Transdisciplinary ELSI Research in Translational Genomics (CT2G). http:\/\/www.ct2g.org\/resources.html . Accessed 28 Apr 2016."},{"key":"325_CR60","unstructured":"The International Policy interoperability and data Access Clearinghouse (IPAC) provides a \u201cone stop\u201d screening service for policy interoperability and access authorization. http:\/\/www.p3g.org\/ipac . Accessed 28 Apr 2016."},{"key":"325_CR61","unstructured":"BBMRI\u2019s legal wiki. http:\/\/www.bbmri-wp4.eu\/wiki\/index.php\/Main_Page . Accessed 25 Apr 2016."},{"key":"325_CR62","unstructured":"hSERN (Human Sample Exchange Regulation Navigator). http:\/\/bbmri-eric.eu\/events\/-\/asset_publisher\/wiZaUl5ie56w\/content\/webinar-hsercn . Accessed 29 Apr 2016."},{"key":"325_CR63","unstructured":"Tool for assessment of regulatory and ethical requirements. BioMedBridges (2015). http:\/\/www.biomedbridges.eu\/sites\/biomedbridges.eu\/files\/documents\/deliverables\/user-guide_and_tool-description_biomedbridges_legal-assessment-tool.pdf . Accessed 25 Apr 2016."},{"key":"325_CR64","unstructured":"EU Data Protection Collection. http:\/\/ec.europa.eu\/justice\/data-protection\/data-collection\/obligations\/index_en.htm . Accessed 25 Apr 2016."},{"key":"325_CR65","volume-title":"Tomcat: The Definitive Guide","author":"J Brittain","year":"2007","unstructured":"Brittain J, Darwin IF. Tomcat: The Definitive Guide. Boston, MA, USA: O\u2019Reilly Media, Inc; 2007."},{"key":"325_CR66","volume-title":"Java Virtual Machine Specification","author":"T Lindholm","year":"1999","unstructured":"Lindholm T, Yellin F. Java Virtual Machine Specification. 2nd ed. Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc; 1999.","edition":"2"}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-016-0325-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T00:09:34Z","timestamp":1748995774000},"score":1,"resource":{"primary":{"URL":"http:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/s12911-016-0325-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,7]]},"references-count":66,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["325"],"URL":"https:\/\/doi.org\/10.1186\/s12911-016-0325-0","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,7]]},"article-number":"81"}}