Purpose of Having a Data Research Policy

Slides:



Advertisements
Similar presentations
The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Advertisements

Fiscal Monitoring: Ensuring Accountability of Your Sub-Grantees
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
OHS Induction Training
1 The Data Protection Officer at work Experience, good practices and lessons learnt Pierre Vernhes – former DPO at the Council of the EU Workshop on Data.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Consultative Meeting on Strengthening Partnerships with National Rapporteurs on Trafficking in Persons and Equivalent Mechanisms May 2013.
University Research Ethics Committee Workshop on procedure and data protection issues 30th May 2008.
The Institutional Review Board. What is an IRB? An IRB is committee set up by an institution to review, approve, and regulate research conducted under.
Recently Issued OHRP Documents: Guidance on Subject Withdrawal and Draft Revised FWA Secretary’s Advisory Committee on Human Research Protections October.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Office of the Vice President for Research
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
Informed Consent and HIPAA Tim Noe Coordinating Center.
Duncan Woodhouse – Assistant Registrar for Information Security, Risk Management and Business Continuity Helen Wollerton – Administrative Officer (Legal.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
1 CHCOHS312A Follow safety procedures for direct care work.
Ofsted framework 2012 Feedback from inspections carried out under the new framework and implications for clerks and governing bodies Clerks briefings April.
September 20, 2012 Sponsored Program Services Mike Ludwig Director, SPS.
HIPAA PRIVACY AND SECURITY AWARENESS.
What you need to know about the Saint Leo IRB review process.
Data Protection, Freedom of Information and Information/Records Management.
Theme: classification & distribution of government control of FEA.
Best Practices: Financial Resource Management February 2011.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
Provider Forum – 21 March 2012 Safeguarding and Child Protection.
HONDURAS AND ITS HISTORICAL INSTITUTIONALITY IN MIGRATION MATTERS.
VHA Handbook What’s new. General Requirements for Informed Consent A Legally Authorized Representative may not always qualify as a ‘personal representative’
WEC MADRID 18 TH MARCH 2004 ASTRAZENECA’S APPROACH TO SUPPLIER RISK MANAGEMENT.
Web 2.0 Melanie Hartgraves Director of New Media Governor David. A. Paterson Jessica Harrison Social Media Coordinator New York State Department of Labor.
Research & Economic Development Office of Grants and Contracts Administration Data Security Presented by Debbie Bolick September 24, 2015.
1 PARCC Data Privacy & Security Policy December 2013.
HIPAA Security Final Rule Overview
 Cooperation and information exchange amongst financial supervisors and regulators are essential for effective oversight in an integrated financial system.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Protection of Personal Information Act An Analysis on the impact.
What is Program Evaluation? Allegheny Intermediate Unit Evaluation, Grants, and Data.
EAST AFRICAN ASSOCIATION OF ANTI-CORRUPTION AUTHORITIES (EAAACA)
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
Introduction to the Federal Defense Acquisition Regulation
General Data Protection Regulation
Ensuring Nuclear Safety Culture in Ghana: Regulatory Perspective
General Data Protection Regulations Preparing for the upcoming changes in data protection law David Jones & Angharad Williams.
Jeffrey M. Cohen, Ph.D. CIP President HRP Associates, Inc.
GDPR IS A DATA PROTECTION GAME CHANGER
Duck, Duck, Goose Keeping your IRB Ducks in a Row
GDPR - Individual’s Rights
Introduction In the first lesson we demonstrated the following:-
Security Awareness Training: System Owners
Supplier Information Session Safeguarding Covered Defense Information and Cyber Incident Reporting, DFARS August 16, 2016 Christian Ortego.
G.D.P.R General Data Protection Regulations
The GDPR & Schools - An Introduction -
Sponsor Expectations for Clinical Studies
OHS–Occupational Health & Safety
General Data Protection Regulation
GDPR - New Data Protection Regulation
Health and Safety! By jack Hughes.
The role of the ECCP (1) The involvement of all relevant stakeholders – public authorities, economic and social partners and civil society bodies – at.
National Congress on Health Care Compliance
HIPAA Policy & Procedure Strategies
Exploring 45 CFR , Criteria for IRB Approval of Research
ACCREDITATION PROCESS
DSC Contract Management Committee Meeting
The Freedom of Information and Data Protection Legislation An Overview
National level Objective:
ISO 45001:2018 The importance of a Safety Management System
Presentation transcript:

University of Northern Colorado Data Security for Research Projects Policy

Purpose of Having a Data Research Policy Protection For human subjects For researchers For the institution

Purpose of Having a Data Research Policy Awareness and Education for Researchers This applies not only to the data they are handling for the research project, but carries over into their daily work activities and personal lives.

Purpose of Having a Data Research Policy Accountability Individuals involved in the grant writing/funding/research/reporting

Important Items to Document Specific means for identifying sensitivity of data Specific controls and safeguards for handling the data at each severity of sensitivity Specific individuals responsible for specific actionable items/tasks Identification of accountability and consequences for non-compliance

Important Items to Document Specific means for identifying sensitivity of data Specific controls and safeguards for handling the data at each severity of sensitivity Specific individuals responsible for specific actionable items/tasks Identification of accountability and consequences for non-compliance Signature of understanding and compliance with specifications

Our Experience So Far A need for a consistent, technical resource to sit on the IRB committee for consultation purposes Technical requirements are, “too technical,” for most non-IT staff, thus the same technical resource is required to assist in ensuring the technical controls are in place Historically, non-technical people would give their best stab at controls without reaching out for assistance Miscellaneous IT technicians were signing their names to legal forms in regards to these projects and controls holding themselves personally accountable for the security of the systems and data.

Questions?

Jessica Behunin jessica.behunin@unco.edu (970)351-1420

References