RDAP 15: Providing access to restricted data in our institutions
Post on 16-Jul-2015
261 Views
Preview:
Transcript
Cover art for Fienberg, et al., Sharing Research Data (Washington, D.C.:
National Academy Press, 1985).
What do we need to keep in mind?
Ethical treatment of human subjects and approvals for data use
agreements
What do we need to keep in mind?
Ethical treatment of human subjects and approvals for data use
agreements
Secure technology for data transport, storage, access, and use
What do we need to keep in mind?
Ethical treatment of human subjects and approvals for data use
agreements
Secure technology for data transport, storage, access, and use
Efficient use of data in secure environment
What do we need to keep in mind?
Ethical treatment of human subjects and approvals for data use
agreements
Secure technology for data transport, storage, access, and use
Efficient use of data in secure environment
Greater good of sharing data
Preliminary recommendations
Ethical treatment of human subjects and approvals for data use agreements
disclosure risks • risky links • informed consent language • cultural context
Preliminary recommendations
Ethical treatment of human subjects and approvals for data use agreements
disclosure risks • risky links • informed consent language • cultural context
Secure technology for data transport, storage, access, and use
IT specs • data use agreement
Preliminary recommendations
Ethical treatment of human subjects and approvals for data use agreements
disclosure risks • risky links • informed consent language • cultural context
Secure technology for data transport, storage, access, and use
IT specs • data use agreement
Efficient use of data in secure environment
(specific!) deidentification activities
Preliminary recommendations
Ethical treatment of human subjects and approvals for data use agreements
disclosure risks • risky links • informed consent language • cultural context
Secure technology for data transport, storage, access, and use
IT specs • data use agreement
Efficient use of data in secure environment
(specific!) deidentification activities
Greater good of sharing data
pre-written appeal to IRB
top related