Top Banner
Providing access to restricted data in our institutions SARAH PICKLE April 23, 2015
27

RDAP 15: Providing access to restricted data in our institutions

Jul 16, 2015

Download

Education

ASIS&T
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: RDAP 15: Providing access to restricted data in our institutions

Providing access to restricted

data in our institutions SARAH PICKLE

April 23, 2015

Page 2: RDAP 15: Providing access to restricted data in our institutions
Page 3: RDAP 15: Providing access to restricted data in our institutions

Cover art for Fienberg, et al., Sharing Research Data (Washington, D.C.:

National Academy Press, 1985).

Page 4: RDAP 15: Providing access to restricted data in our institutions

2015

Page 5: RDAP 15: Providing access to restricted data in our institutions

we have a lot of data that are

restricted.

Page 6: RDAP 15: Providing access to restricted data in our institutions

we have a lot of data that are

restricted.

[how] can we share them?

Page 7: RDAP 15: Providing access to restricted data in our institutions

we have a lot of data that are

restricted.

[how] can we share them?

Page 8: RDAP 15: Providing access to restricted data in our institutions

A framework for documenting

restricted data

Page 9: RDAP 15: Providing access to restricted data in our institutions
Page 10: RDAP 15: Providing access to restricted data in our institutions
Page 11: RDAP 15: Providing access to restricted data in our institutions

Whom do we need to talk to?

Page 12: RDAP 15: Providing access to restricted data in our institutions

Whom do we need to talk to?

Page 13: RDAP 15: Providing access to restricted data in our institutions

Whom do we need to talk to?

Page 14: RDAP 15: Providing access to restricted data in our institutions

Whom do we need to talk to?

Page 15: RDAP 15: Providing access to restricted data in our institutions

Whom do we need to talk to?

Page 16: RDAP 15: Providing access to restricted data in our institutions

Whom do we need to talk to?

Page 17: RDAP 15: Providing access to restricted data in our institutions

Whom do we need to talk to?

Page 18: RDAP 15: Providing access to restricted data in our institutions

What do we need to keep in mind?

Page 19: RDAP 15: Providing access to restricted data in our institutions

What do we need to keep in mind?

Ethical treatment of human subjects and approvals for data use

agreements

Page 20: RDAP 15: Providing access to restricted data in our institutions

What do we need to keep in mind?

Ethical treatment of human subjects and approvals for data use

agreements

Secure technology for data transport, storage, access, and use

Page 21: RDAP 15: Providing access to restricted data in our institutions

What do we need to keep in mind?

Ethical treatment of human subjects and approvals for data use

agreements

Secure technology for data transport, storage, access, and use

Efficient use of data in secure environment

Page 22: RDAP 15: Providing access to restricted data in our institutions

What do we need to keep in mind?

Ethical treatment of human subjects and approvals for data use

agreements

Secure technology for data transport, storage, access, and use

Efficient use of data in secure environment

Greater good of sharing data

Page 23: RDAP 15: Providing access to restricted data in our institutions

Preliminary recommendations

Page 24: RDAP 15: Providing access to restricted data in our institutions

Preliminary recommendations

Ethical treatment of human subjects and approvals for data use agreements

disclosure risks • risky links • informed consent language • cultural context

Page 25: RDAP 15: Providing access to restricted data in our institutions

Preliminary recommendations

Ethical treatment of human subjects and approvals for data use agreements

disclosure risks • risky links • informed consent language • cultural context

Secure technology for data transport, storage, access, and use

IT specs • data use agreement

Page 26: RDAP 15: Providing access to restricted data in our institutions

Preliminary recommendations

Ethical treatment of human subjects and approvals for data use agreements

disclosure risks • risky links • informed consent language • cultural context

Secure technology for data transport, storage, access, and use

IT specs • data use agreement

Efficient use of data in secure environment

(specific!) deidentification activities

Page 27: RDAP 15: Providing access to restricted data in our institutions

Preliminary recommendations

Ethical treatment of human subjects and approvals for data use agreements

disclosure risks • risky links • informed consent language • cultural context

Secure technology for data transport, storage, access, and use

IT specs • data use agreement

Efficient use of data in secure environment

(specific!) deidentification activities

Greater good of sharing data

pre-written appeal to IRB