Data Sharing, Storage, & Consent

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
FERPAFERPA Family Educational Rights and Privacy Act.
Information Security Policies Larry Conrad September 29, 2009.
Training Requirements Virginia Department of Health Summer Food Service Program (SFSP) 2014.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 5 HIPAA Enforcement HIPAA for Allied Health Careers.
Electronic Records Management: What Management Needs to Know May 2009.
The Board’s Fiduciary Role Presenter Insert Name Insert Organization.
Colorado Children and Youth Information Sharing (CCYIS) Educational Stability Summit April 10, 2015.
Student Confidentiality: The FERPA/HIPAA Facts AISD Policy Student Records AISD Procedure AP. 11.
Submitting IRB Applications (or “Do I have to do an IRB?”) Linda A. Detman, Ph.D. Research Associate Lawton & Rhea Chiles Center for Healthy Mothers and.
FRAMEWORK FOR SUCCESS Chamber Executives of Ontario Facilitated by Anne Bermingham 2WA Consulting Inc.
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
CONFIDENTIALITY. Three Confidentiality Laws 1.FERPA-Family Education Rights and Privacy Act (State Policy 4350: Procedures for the Collection, Maintenance.
Homeless Management Information Systems The Calgary HMIS - A joint initiative between the CHF and the Homeless Serving Sector in Calgary Date: April 21,
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Denise Chrysler, JD Director, Mid-States Region
An Introduction to HRM & SHRM
Randall (Randy) Snyder, PT, MBA Division Director January 27, 2016
An Update on FERPA and Student Privacy
Outsourcing Policy & Procedures
When to share and not to share information
Student Privacy in an Ever-Changing Digital World
AIA Nebraska.
Upcoming Changes to the Common Rule
Learn Your Information Security Management System
Beverley Alberola, CIP Associate Director, Research Protections
Regulatory Compliance
Presenters Suzanne Swift Steve Cable
Research with human participants at Carnegie Mellon University
Student Confidentiality: The FERPA/HIPAA Facts
IS4680 Security Auditing for Compliance
Organization and administration
Chapter 3: IRS and FTC Data Security Rules
IS4680 Security Auditing for Compliance
Data Sharing, Storage, & Consent
Presented by Harry A. Strausser III Collections Industry Consultant
SCD Grants & Contracts Policy & Procedure 670.
Refuah Community Health Collaborative (RCHC) PPS
Confidentiality and Interagency Sharing of Juvenile Information
Disability Services Agencies Briefing On HIPAA
Current Privacy Issues That May Affect Your Credit Union
Using the EFQM Excellence Model to support the role of a trustee
CompTIA Security+ Study Guide (SY0-401)
Health Care: Privacy in a Digital Age
Introduction to General Medical Conditions
Elements of a Successful Informed Consent
Canadian Auditing Standards (CAS)
GDPR enforcement begins
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Model T(eamwork) in The Aid Office
Drew Hunt Network Security Analyst Valley Medical Center
Product Stewardship Institute Advisory Council Meeting The Lenox Hotel – Boston, MA September 14, 2012.
Enforcement and Policy Challenges in Health Information Privacy
Establishing Oversight Mechanisms
Measuring What Matters
BOOTCAMP SOCIAL INNOVATION ACCELERATOR TO CREATE LASTING CHANGE
Student Confidentiality: The FERPA/HIPAA Facts
Presentation transcript:

Data Sharing, Storage, & Consent

Today’s Agenda Time Topic 8:30 – 8:45 AM Eat, network, and get settled Foundation Updates 9:15 – 9:55 AM How do we use data? Recommendations for starting or improving data collection techniques. 9:55 – 10:25 AM Consent for treatment vs. Consent for data 10:25 – 10:30 AM Wrap Up Evaluation of Training

Questions How many of you started your career with the plan of helping people? How many of you planned to collect, organize, house, and interpret data? How many of you had extensive training before starting your career on organizing, housing, and interpreting data?

So why do we need data?

Data in and of itself is not useful Data in and of itself is not useful. Untouched, unmanipulated, unchanged, it’s valueless, but once transformed, it can serve any number of purposes. The nonprofit sector is still trying to figure out how to transform its data into something valuable. Nonprofit leaders need to continue to mature and invest in the resources necessary to help their staff navigate this process. Collected Voices: Data-Informed Nonprofits, 2014, p. 6

As a group… How are we doing? How does this compare to other organizations nationwide?

Why is the collection and use of data so hard? The “why” Many NPOs collect data to report back to funders and program evaluation The “why not” Top three challenges to data collection are lack of time, lack of money, and lack of training The “who” Program staff is generally in charge of all things data

Prioritization and Time Difficulties in collecting and interpreting data may be related to the ability of staff to prioritize and make time for measurement. Make the measurement piece part of the program work by aligning data collection to the organization’s process for program delivery Try to integrate data collection into everyday work duties

Recommendations Start somewhere Don’t start with obsessing over outcomes Begin with small measures, acknowledge small successes Learn from others Change your culture to value data Connect your goals to your mission with your metrics Share meaningful information to get staff comfortable with the data Data is useful when it measures the organizational success Train staff

Shape Data Plans with Strategic Planning Figuring out what data to track Collecting and analyzing the data Presenting the data clearly Revisit these challenges

Data Protection Laws US does not have one single data privacy framework or directive (Hasty, Nagel, and Subjally, 2013,p.1) Made of combination of federal and state laws and regulations (Hasty, Nagel, and Subjally, 2013,p.1)

Federal Laws Health Insurance Portability and Accountability Act (HIPAA) “applies to all Covered Entities that collect, maintain, use, or disclose personal health information” (Hasty, Nagel, and Subjally, 2013, p.3). Family Educational Rights and Privacy Act (FERPA) “protects the data included in students’ educational records, and applies to all educational agencies and institutions that receive applicable funding from the US Department of Education, including non-profits” (Hasty, Nagel, and Subjally, 2013, p.4). Gramm-Leach-Bliley Act (GLBA) “requires that financial institutions ‘respect the privacy of its customers and protect the security and confidentiality of those customers’ non-public personal information” (Hasty, Nagel, and Subjally, 2013, p. 5 - 6) 501(c)(3) are not highlighted here, but those engaging in financial activities regulated by the Federal functional regulators, the state or the FTC are included Hasty, Nagel, and Subjally, 2013, p. 6)

Best Practices Provide a data privacy policy and data consent forms to customers, clients, and donor and update it at least annually. Once a data privacy policy is in place, ensure your organization’s staff are properly trained and prepared to follow the policy. Check that employees comply with the policy. Do not collect or retain personal information on customers or employees unless necessary. Minimize gathering and using sensitive information from individuals, such as social security numbers or financial accounts information. Consider appointing data protection officers to keep ahead of changes in the law and ensure your organization remains up to date and compliant Structure and enforce external agreements to ensure that any data transferred or shared between entities remains protected. Hasty, Nagel, and Subjally, 2013, p. 18-19.

Protect Individuals’ confidentiality and get informed consent Anonymous – you do not know who provided responses Confidential – you know or who can find out, but you keep that information to yourself https://www.citiprogram.org/ Group 2 Social & Behavioral Investigators and Key Personnel Social and Behavioral Responsible Conduct of Research

Basic Elements of Informed Consent Purpose and Description Risks Benefits Alternatives Confidentiality Greater Than Minimal Risk Contact Information Voluntary Participation Items in red are the areas where you will specifically talk about the data you’re collecting, who will have access to raw data versus aggregated data, and who to contact with questions.

What are your current practices for data privacy? Think (3 minutes) Pair (3 minutes) Share

References Hasty, R., Subjally, M., & Nagel, T. (2013). Data Protection Law in the USA. Advocates for International Development. Nonprofit Technology Network. (2012). The state of nonprofit data. Nonprofit Technology Network. (2014). Collected voices, data-informed nonprofits. Privacy. (2011, September 11). Retrieved from http://nonprofitanswerguide.org/privacy/