Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

With MPEG-G any application handling genomic data can check if the actions the user intends to perform are compliant with the consent rules expressed by the owner of the data.  This is possible because in MPEG-G the sequenced data are linked to privacy rules that define the conditions enforced by the owner on data access and use. The compliance verification system can operate locally at the user’s premises or remotely (for example on the data custodian’s repository).

In a typical use case the data analyst submits the relevant information about the action she wants to be performed:

  • the intended use (e.g. not for further use, commercial use, relatives search, forensics, scientific purposes)
  • her identity as contact information and role (e.g. analyst, researcher, healthcare, forensic, not specified)
  • the action to perform (e.g. genetic analysis for diagnostic, analysis for a research project, view information, paternity test, forensic use)
  • the recipient of the results (e.g. contact information and role)
  • the set of genomic regions where the action will be performed

Then the security system checks if the provided user information and privacy rules can be verified. After verification, the system checks if the provided information meets the privacy rules and potentially other data protection rules enforced by the regulator, and performs necessary actions, such as informing the owner or requesting a further confirmation from the owner. Depending on the result of privacy rules evaluation, the system performs the requested action on the genomic data. The system can as well notify the owner about the result, if requested.

Schedule a call

[contact-form-7 id="224" title="contact call"]