Which Of The Following Is A Measure Researchers Can Use To Protect The Confidentiality Of Subject Data? (2023)

1. Protecting Confidentiality - Research

  • The easiest way to protect confidentiality is to collect (or if the data are already collected then use) anonymous data. Anonymous data are data that are not ...

  • Between privacy and confidentiality, confidentiality is arguably the more important one in research.  While privacy is easily assured with proper consent procedures, confidentiality of data takes more effort to maintain.  All information gathered in a research study should be considered “information that an individual has disclosed in a relationship of trust,” and participants have the right to expect that it will not be divulged without their permission. The easiest way to protect confidentiality is to collect (or if the data are already collected then use) anonymous data. Anonymous data are data that are not connected to information that can identify the individual participant. If there is no connection between the participant and their data, even the most sensitive studies can qualify for exemption assuming they are minimally risky. If you are collecting anonymous data, you will need to describe how you collected the data so that identifiers are not linked to the data. If the data are already collected and you can obtain the data without identifiers, you should make an effort to do so. For more information about using data that are already collected, please see Secondary Use of Existing Data.

2. 410. Maintaining Data Confidentiality | Research Integrity

  • Maintaining confidentiality requires safeguarding the information that an individual has disclosed in a relationship of trust and with the expectation that it ...

  • Research involving human participants must include adequate provisions to maintain the confidentiality of research data. Learn more about how the University of Nevada, Reno achieves this.

3. IMPORTANT CONSIDERATIONS FOR PROTECTING HUMAN ...

  • Jul 2, 2019 · Confidentiality represents an agreement that is formed between the researcher and participant, via the informed consent process, that ensures ...

  • JULY-AUGUST 2019 | Purdue’s Human Research Protection Program clarifies the differences between privacy, confidentiality and anonymity as they pertain to protection of individuals in research…

4. Understanding Confidentiality and Anonymity

  • In such cases, maintaining confidentiality is a key measure to ensure the protection of private information. Researchers employ a number of methods to keep ...

  • The terms anonymity and confidentiality are frequently confused in human subjects research. The distinction between the two terms, however, is critical in the design of protocols that protect participant privacy and provide for adequate informed consent.

5. Best Practices for Data Analysis of Confidential Data

  • The researcher's assurance of confidentiality extends to the consent form which documents participation in the study must and be treated as a confidential ...

  • While secure storage media will protect data when it is not being analyzed, it is also important to follow practices that keep data secure while it is being analyzed.   Secure storage is important, but it is only one aspect of a larger set of behaviors and habits that are important when handling research data that must be kept confidential.   Ul...

6. Conducting Risk-Benefit Assessments and Determining Level of IRB Review

7. Maintaining the Privacy and Security of Research Participants' Data

  • Missing: subject | Show results with:subject

  • Maintaining participants’ data privacy and security before, during, and after data collection is critical to the user-research process. It protects participants from data breaches and cyber threats.

8. [PDF] Collecting Data for Human Participant (Subject) Research | IRB

  • Recommended procedures for data collection, protecting the confidentiality of research ... Here are some steps you can take to de-identify research data: • Remove ...

9. Protecting Human Research Participants - Davidson College

  • Confidentiality: Holding secret all information relating to an individual, unless the individual gives consent permitting disclosure. Equitable: To treat fairly ...

  • Sources include OHRP Assurance Training and PHRP Online Training

10. De-identifying Protected Health Information Under the Privacy Rule

  • In general, the Rule allows covered entities to use and disclose PHI for research if authorized to do so by the subject in accordance with the Privacy Rule. In ...

  • The Privacy Rule describes the ways in which covered entities can use or disclose PHI, including for research purposes. In general, the Rule allows covered entities to use and disclose PHI for research if authorized to do so by the subject in accordance with the Privacy Rule. In addition, in certain circumstances, the Rule permits covered entities to use and disclose PHI without Authorization for certain types of research activities. For example, PHI can be used or disclosed for research if a covered entity obtains documentation that an Institutional Review Board (IRB) or Privacy Board has waived the requirement for Authorization or allowed an alteration. The Rule also allows a covered entity to enter into a data use agreement for sharing a limited data set. There are also separate provisions for how PHI can be used or disclosed for activities preparatory to research and for research on decedents' information.

11. Protecting Respondent Confidentiality in Qualitative Research - PMC - NCBI

  • 52) defines confidentiality as the researcher's “agreements with persons about what may be done with their data.” Per my university's internal review board ...

  • For qualitative researchers, maintaining respondent confidentiality while presenting rich, detailed accounts of social life presents unique challenges. These challenges are not adequately addressed in the literature on research ethics and research methods. ...

12. Five principles for research ethics - American Psychological Association

  • Jan 1, 2003 · When sharing, psychologists should use established techniques when possible to protect confidentiality, such as coding data to hide identities.

  • Psychologists in academe are more likely to seek out the advice of their colleagues on issues ranging from supervising graduate students to how to handle sensitive research data.

13. [PDF] Guidelines on Anonymity and Confidentiality in Research

  • These include the use of computer passwords, firewalls, anti-virus software, encryption and other measures that protect data from unauthorized individuals, loss ...

14. Adding Measurement Error to Location Data to Protect Subject ...

  • Many data sets involving human subjects contain sensitive information and require the protection of subject confidentiality. This protection of subject ...

  • Summary. In public use data sets, it is desirable not to report a respondent's location precisely to protect subject confidentiality. However, the direct use of

15. Methods for De-identification of PHI - HHS.gov

  • The guidance explains and answers questions regarding the two methods that can be used to satisfy the Privacy Rule's de-identification standard: Expert ...

  • This page provides guidance about methods and approaches to achieve de-identification in accordance with the HIPAA Privacy Rule.

16. Compensation for Participation in Research - Research and Innovation

  • Researchers must consider and take measures to prevent or mitigate the ... Section F- Provisions for Subject Privacy and Data Confidentiality. Explain ...

  • This guidance is intended to assist researchers in the design of their protocol so that their research satisfies regulatory requirements and adheres to best practices related to compensating human research subjects. This document also includes instructions meant to help researchers ensure they provide sufficient information in the protocol materials about compensation for the Institutional Review Board (IRB) to determine whether or not the compensation is appropriate.

17. Summary of the HIPAA Privacy Rule - HHS.gov

  • Dec 28, 2000 · A covered entity may not use or disclose protected health information, except either: (1) as the Privacy Rule permits or requires; or (2) as the ...

  • Summary of the HIPAA Privacy Rule

18. [PDF] Standards and Guidelines for Statistical Surveys | SAMHSA

  • Additionally, these measurements will provide survey designers and data users with indicators of survey performance and resultant data quality. 2. Use internal ...

19. Privacy and Data Sharing

  • In addition, in some circumstances, FERPA allows educational institutions to share these data student information with contractors, volunteers, or other ...

  • Educational institutions across the country rely on sharing data, often sharing student information with those outside the school or district in order to improve classroom instruction, to measure student outcomes, and facilitate implementation of educational applications to evaluate the effectiveness of educational programs. While the general rule under FERPA is that personally identifiable information from education records cannot be disclosed without written consent, FERPA includes exceptions that permit data sharing under certain conditions with agencies, vendors, or individuals to conduct studies, audit or evaluate programs, enforce or comply with related Federal legal requirements, or in the case of arespond to health or safety emergencies. In addition, in some circumstances, FERPA allows educational institutions to share these data student information with contractors, volunteers, or other individuals performing services for the educational institution. In many cases, written agreements and must be developed to protect student data, and the requirements differ depending on the conditions and parties involved. The following resources address the topic of data sharing, and are intended to provide best practices and legal requirements for protecting student privacy while sharing data between educational agencies and partner organizationsother third parties:

20. Internet-Based Research – SBE Answers - I Hate CBT's

  • Dec 10, 2022 · Answer: The investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted ...

  • Which of the following examples of using the internet to conduct research meets the federal definition of research with human subjects? Answer: Conducting an online focus group with cancer survivors to determine familial support systems. The researcher also invites subjects’ significant others

21. 8 Access and Confidentiality Issues with Administrative Data

  • Administrative data gathered by these programs in the normal course of their operations can be used by researchers, policy analysts, and managers to measure and ...

  • Read chapter 8 Access and Confidentiality Issues with Administrative Data: This volume, a companion to Evaluating Welfare Reform in an Era of Transition, ...

22. [PDF] Data and Safety Monitoring Plan (DSMP) Guideline - Mayo Clinic

  • The nature, size, risk, and complexity of the study will determine how to address the following seven elements within the research protocol: • Subject Safety: ...

FAQs

Which Of The Following Is A Measure Researchers Can Use To Protect The Confidentiality Of Subject Data? ›

Which of the following is a measure researchers can use to protect the confidentiality of subject data? Keep sensitive and identifiable data in encrypted files on a password protected hard drive.

Which of the following is a measure researchers can use to protect the confidentiality of subject data? ›

Researchers employ a number of methods to keep their subjects' identity confidential. Foremost, they keep their records secure through the use of password protected files, encryption when sending information over the internet, and even old-fashioned locked doors and drawers.

What is a method to protect subject privacy in research? ›

Breach of confidentiality is a potential risk of participating in research. To protect participants' confidentiality, you should encrypt computer-based files, store documents (i.e., signed consent forms) in a locked file cabinet and remove personal identifiers from study documents as soon as possible.

What are two ways to protect the privacy of research subjects? ›

Strategies to protect one's privacy may include the following:
  • the research intervention will be conducted in a private room.
  • drapes or other barriers will be used for subjects who are required to disrobe.
  • the collection of sensitive information will be limited to the minimum necessary to achieve the aims of the research.
May 5, 2021

What is the best way to maintain confidentiality in a research study quizlet? ›

Research protects participants confidentiality in several ways: Obtaining signed nondisclosure documents Restricting access to participant identification Revealing participant information only with written consent Restricting access to data instruments where the participant is identified.

How do you protect data confidentiality? ›

Securing Your Devices and Networks
  1. Encrypt your data. ...
  2. Backup your data. ...
  3. Make your old computers' hard drives unreadable. ...
  4. Secure your wireless network at your home or business. ...
  5. Use a firewall. ...
  6. Encrypt data on your USB drives and SIM cards. ...
  7. Disable file and media sharing if you don't need it.
Aug 31, 2023

How do researchers protect confidentiality? ›

Researchers employ a number of methods to keep their subjects' identity confidential. Foremost, they keep their records secure through the use of password protected files, encryption when sending information over the internet, and even old-fashioned locked doors and drawers.

What is an example of data protection and confidentiality in research? ›

Examples of Confidentiality Protections:

Using only encrypted systems for storing research data on laptops. De-identifying study data. Using a code number instead of the participant's real name on study data and blood/tissue samples. Destroying photos, audio tapes, or video tapes at the end of the study.

What are 4 ways to protect your privacy online? ›

How To Protect Your Privacy and Personal Information Online
  • Share less information with apps and services.
  • Use strong and unique passwords with 2FA.
  • Tighten privacy settings on your social media accounts.
  • Delete unused accounts, apps, and browser extensions.
  • Stop search engines from tracking you.
Aug 11, 2023

What are two ways or methods that can be used to protect information? ›

Use strong passwords and multi-factor authentication

Make sure you use strong passwords on smartphones, laptops, tablets, email accounts and any other devices or accounts where personal information is stored. They must be difficult to guess.

Which of the following are examples of privacy protections for subjects? ›

Examples of Privacy Protections:

Interviewing participants about sensitive topics individually instead of in front of a group. Interviewing the participant in their home or a private office instead of a public place. Providing a private exam room for study procedures.

Which of the following techniques is used to ensure confidentiality? ›

Common techniques used to maintain confidentiality include encryption, access controls, and data masking. Integrity is important to ensure that information has not been tampered with or modified in an unauthorized way.

What is one method that ensure confidentiality? ›

A good example of methods used to ensure confidentiality is requiring an account number or routing number when banking online. Data encryption is another common method of ensuring confidentiality. User IDs and passwords constitute a standard procedure; two-factor authentication (2FA) is becoming the norm.

What is the effective approach to ensuring the confidentiality of data? ›

To ensure data confidentiality, the most straightforward method is to encrypt all the sensitive data for storage, processing, and transmission. While data encryption provides a satisfying level of security protection, there are several subtle and challenging issues to be addressed, which we can list as follows: –

What measures are used to maintain client confidentiality? ›

How to Protect Client Confidentiality
  • Use a secure file-sharing and messaging platform. ...
  • Store Physical Documents in an Environment with Controlled Access. ...
  • Comply with Industry Regulations (SOC-2, HIPAA, PIPEDA) ...
  • Host Routine Security Training for Staff. ...
  • Stay Alert of New Security Threats.

Which of the following can be used to protect the confidentiality of information quizlet? ›

Encryption protects the confidentiality of information while it is being sent over the Internet.

What is a confidentiality measure? ›

Confidentiality measures protect information from unauthorized access and misuse. Most information systems house information that has some degree of sensitivity.

Top Articles
Latest Posts
Article information

Author: Rev. Porsche Oberbrunner

Last Updated: 09/12/2023

Views: 6247

Rating: 4.2 / 5 (53 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Rev. Porsche Oberbrunner

Birthday: 1994-06-25

Address: Suite 153 582 Lubowitz Walks, Port Alfredoborough, IN 72879-2838

Phone: +128413562823324

Job: IT Strategist

Hobby: Video gaming, Basketball, Web surfing, Book restoration, Jogging, Shooting, Fishing

Introduction: My name is Rev. Porsche Oberbrunner, I am a zany, graceful, talented, witty, determined, shiny, enchanting person who loves writing and wants to share my knowledge and understanding with you.