Researchers invited to make their data public have become a common practice in recent years. Please think carefully when designing confidentiality procedures while you write your minutes. While the IRB campus does not require researchers to disclose their data, we do not advise researchers to guarantee that anonymized data will never be published unless they are absolutely sure that they will not be asked to do so. You should also explain the privacy procedures for your research subjects. Confidentiality refers to agreements you make with subjects about how you collect, store, analyze, use information about yourself and you will talk about it. In contrast, data protection refers to the control of information that someone shares with others. This guide provides an example description of privacy procedures for research topics. Use the 7 questions below to access the corresponding example language. Do not use the samples without criticism, as they may not be suitable for your study. You can request a privacy certificate so that you are not obliged to disclose your data. The information you collect is identifiable, but not sensitive or potentially harmful, and you do not plan to identify the topics in your results. If your study individually collects identifiable information that could harm subjects if disclosed, you must design a privacy plan and describe it in the application of the protocol.
BRI staff will verify the plan in advance and forward it to the Information Technology Security Office (ITSO) for approval. The main risk to researchers in the social and behavioral sciences and humanities is the accidental disclosure of data if: when a coC is granted, the NIH requires that research participants be informed, in the declaration of consent, of the protective measures granted by the CoC and the exceptions to that protection. Click here for more details. For the purposes of this guide, we will refer to both information and biospecialists as “information”. Identifiable participant data should not be published without express permission. It is not enough to simply inform participants that the identified persons they have provided are “treated confidentially”. You need to explain how it is done. Researchers must inform participants if their data is published in an identified or anonymous form, shared with other researchers or used for future research purposes. . . .