Skip to main content
Forensic Science International: Synergy logoLink to Forensic Science International: Synergy
editorial
. 2023 Feb 27;6:100322. doi: 10.1016/j.fsisyn.2023.100322

Ethical data sharing in forensic research

Carolyn I Allen 1, Samuel H Payne 1, Julie L Valentine 1,
PMCID: PMC10034264  PMID: 36970503

Protecting human research participants is paramount in all scientific fields. In biomedical research, extensive policies and regulations protect the privacy of human subjects. Centralized protected databases exist for researchers to access anonymized data. These safeguards are not as extensive or regulated for academic research in the forensic sciences. Practices like those used in the biomedical field should be implemented by crime labs and police agencies to protect victim privacy.

In biomedical research, robust infrastructure protects the privacy of human research participants. Biobanks and databases steward health information including clinical, demographic, and genetic information [[1], [2], [3], [4], [5]]. Researchers may access the information via a rigorous approval process that vets both the researcher and the scientific hypotheses. Various data dissemination methods and philosophies are debated considering ethical, legal, and practical requirements [[6], [7], [8]]. Explicit legal agreements are signed, including consequences for research malpractice. In addition to the safeguards created by data stewards, individual institutions are required to provide training for researchers [9,10] as well as execute an explicit approval process for each research project whereupon the institution accepts liability (e.g. Institutional Review Boards, IRBs). Moreover, as weaknesses in this process are found, such as re-identification via genomic data [11], new measures are implemented to improve human subject privacy.

In the United States, a centralized protected database does not exist for criminal data, likely due to the decentralized nature of data within the criminal justice system. As such, crime labs within state or municipal jurisdictions do not necessarily participate in a nationalized data warehouse. Therefore, academic collaborators often work directly with a local crime lab or law enforcement agency to obtain data. Currently, enforced standards for ensuring victim privacy in this decentralized data environment in forensic science do not exist. With the skyrocketing popularity of ‘data science’, there is a growing interest in analyzing crime data to improve the justice system. As an example, we note two papers recently published about using machine learning to predict outcomes of evidence from sexual assault kits [12,13]. These efforts used very similar variables in their models, including time between the assault and forensic exam, age of the victim, gender of the victim, and whether a probative DNA profile was generated from the sexual assault kits. Other data - much more sensitive and private data - detailing the victim, assailant, and nature of the crime do exist in both crime labs and law enforcement databases. We fear that the lack of regulatory systems and the lack of education/awareness will lead to inappropriate data release as well as inappropriate publication of private data.

All human data needs to be rigorously protected, regardless of the scientific domain. Considering the safety and privacy of victims and their data should be the focus of crime labs when disseminating information [14]. Within criminal justice, we call on crime labs and law enforcement agencies to maintain victim privacy and be proactive and protective data stewards through strict implementation of the following practices. We obviously object to the release of any data that could be used to identify the victim. This includes but is not limited to the following: name, date of birth, specific crime location, date of crime, date of report/hospitalization, and law enforcement agency and case number. This data should never be contained within a research database. Where variables have research utility, like age of the victim, this information should be anonymized to a range and not a specific value, e.g. age decade especially within smaller datasets. This anonymization practice would broadly apply to information about the date/location of the crime. Additionally, we note that some variables can be combined to become identifiable, such as race or minority genders. Groups with small numbers should not be included in the dataset, as small cohorts can lead to easy identification. If data is released, the variables should be robustly tested for the potential for re-identification.

To complement these anonymization practices, crime labs should implement a vetting process like those used in biomedical research. Before being given access to data, researchers should submit documents detailing their research question, an institutionally approved IRB, method for safeguarding data, and proof of ethical research training. Crime labs can then determine if the researcher and research proposal qualify for access to sensitive data.

Crime labs and/or law enforcement agencies should also be clear with researchers on the publication of datasets in academic journals. Publication of datasets is a growing trend to allow for statistical analysis verification yet must be closely scrutinized to ensure the anonymity of victims and assailants.

As a final topic, we note that in biomedical research, all data is collected/released only after informed consent. However, in the aftermath of a crime, gaining consent from traumatized survivors cannot be pursued. Consent for data collection/release is ever more poignant because the information is about a non-consensual violent act and the survivor's unwilling involvement robs them of the autonomy and mental clarity that would be required for consent in classical ethical frameworks. Data with minors and vulnerable adults should also be guarded with extreme caution. The lack of consent from survivors should be considered carefully by researchers in study design and dissemination of findings.

Protecting the individual is paramount. The guidelines proposed herein will provide a stronger infrastructure to protect victim privacy. Crime labs and law enforcement agencies are stewards over sensitive information and must ensure victims are protected. Anonymizing data, releasing a minimal subset of the data, vetting researchers, and enforcing IRB approval will improve current processes.

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

  • 1.Sudlow C., Gallacher J., Allen N., Beral V., Burton P., Danesh J., et al. UK biobank: an open access resource for identifying the causes of a wide range of complex diseases of middle and old age. PLoS Med. 2015 Mar 31;12(3) doi: 10.1371/journal.pmed.1001779. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 2.Mayo Clinic Biobank - For Researchers. https://www.mayo.edu/research/centers-programs/mayo-clinic-biobank/for-researchers [Internet]. Mayo Clinic. [cited 2022 Apr 8]. Available from:
  • 3.Mailman M.D., Feolo M., Jin Y., Kimura M., Tryka K., Bagoutdinov R., et al. The NCBI dbGaP database of genotypes and phenotypes. Nat. Genet. 2007 Oct;39(10):1181–1186. doi: 10.1038/ng1007-1181. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 4.All of Us Research Program Overview . 2020. National Institutes of Health (NIH) — All of Us.https://allofus.nih.gov/about/program-overview [Internet] [cited 2022 Apr 11]. Available from: [Google Scholar]
  • 5.Carey D.J., Fetterolf S.N., Davis F.D., Faucett W.A., Kirchner H.L., Mirshahi U., et al. The Geisinger MyCode community health initiative: an electronic health record-linked biobank for precision medicine research. Genet. Med. Off. J. Am. Coll. Med. Genet. 2016 Sep;18(9):906–913. doi: 10.1038/gim.2015.187. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 6.Powell K. The broken promise that undermines human genome research. Nature. 2021 Feb;590(7845):198–201. doi: 10.1038/d41586-021-00331-5. [DOI] [PubMed] [Google Scholar]
  • 7.Trinidad S.B., Fullerton S.M., Bares J.M., Jarvik G.P., Larson E.B., Burke W. Genomic research and wide data sharing: views of prospective participants. Genet. Med. 2010 Aug;12(8):486–495. doi: 10.1097/GIM.0b013e3181e38f9e. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 8.Hobbs A., Starkbaum J., Gottweis U., Wichmann H.E., Gottweis H. The privacy-reciprocity connection in biobanking: comparing German with UK strategies. Pub. Health Genom. 2012;15(5):272–284. doi: 10.1159/000336671. [DOI] [PubMed] [Google Scholar]
  • 9.Research, Ethics, and Compliance Training | CITI Program [Internet]. https://about.citiprogram.org/. [cited 2022 Apr 8]. Available from: https://about.citiprogram.org/.
  • 10.Protections (OHRP) O for HR. Human Research Protection Training [Internet]. HHS.gov. 2020 [cited 2022 Apr 8]. Available from: https://www.hhs.gov/ohrp/education-and-outreach/online-education/human-research-protection-training/index.html.
  • 11.Gymrek M., McGuire A.L., Golan D., Halperin E., Erlich Y. Identifying personal genomes by surname inference. Science. 2013 Jan 18;339(6117):321–324. doi: 10.1126/science.1229566. [DOI] [PubMed] [Google Scholar]
  • 12.Wentzlof C.A., Kerka J.E., Albert J.H., Sprague J.E., Maddox L.O. Comparison of decision tree and logistic regression models for utilization in sexual assault kit processing. J. Forensic Sci. 2019;64(2):528–533. doi: 10.1111/1556-4029.13920. [DOI] [PubMed] [Google Scholar]
  • 13.Kerka J.E., Heckman D.J., Albert J.H., Sprague J.E., Maddox L.O. Statistical modeling of the case information from the Ohio attorney general's sexual assault kit testing initiative. J. Forensic Sci. 2018;63(4):1122–1133. doi: 10.1111/1556-4029.13697. [DOI] [PubMed] [Google Scholar]
  • 14.Campbell R., Goodman-Williams R., Javorka M. A trauma-informed approach to sexual violence research ethics and open science. J. Interpers Violence. 2019 Dec 1;34(23–24):4765–4793. doi: 10.1177/0886260519871530. [DOI] [PubMed] [Google Scholar]

Articles from Forensic Science International: Synergy are provided here courtesy of Elsevier

RESOURCES