#### Beacon “Handovers”
handover objects represent an efficient and - if used properly -
privacy protecting mechanism to enable data delivery, in conjunction with
The advantages of using the “handover” mechanism lie especially in:
Handled in a controled/protected environment one could in pprinciple use e.g.
handover protocol to access the electronic health records (EHR) of patients
for which a specific genomic variantr query resulte din a match, to follow up
on thiose patients’ history & progress, or to initiate interventions based on
accuing evidence related to the matched variant(s).
handover mechanisms is powerful through its flexibility, an obvious
disadvantage lies in the lack of control about the implemented mechanisms. A
good siolution here would be to provide some prototype designs, e.g. “Phenopackets”
formatted delivery of “bio” data.s
h_ohandover object with its
_idobjects of a
The function creates a basic BED file and returns its local path. A standard
use would be to create a link to this file and submit it as
parameter to the UCSC browser.