Data Management. 2 Data Management Practices RESPONSIBLE CONDUCT IN RESEARCH.

Slides:



Advertisements
Similar presentations
The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Advertisements

Audit Evidence Week 11.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Unified Carrier Registration (UCR) Update August 24, 2006.
Ethical Considerations when Developing Human Research Protocols A discipline “born in scandal and reared in protectionism” Carol Levine, 1988.
The Advisers Act Custody Rule
Confidentiality of benchmarking information Bencheit workshop in Paris, December 4, 2013 Pekka Kähkipuro.
GCP compliance for GenISIS  This presentation is intended for clinical staff involved in recruiting patients to the GenISIS (Genetics of Influenza Susceptibility.
Juan A. Avellán Chief Legal Officer WISeKey S.A. Regulatory Considerations for the Establishment of a Global Public Key Infrastructure.
Developing a Records & Information Retention & Disposition Program:
IS Audit Function Knowledge
Cooperative Research IRB Brownbag, 3/4/08. ISU Policy Cooperative research projects are those projects which involve more than one institution. The official.
Audit Planning and Documentation
Information Storage and Retrieval CS French Chapter 3.
AND Managing and Mentoring Graduate Students FAST – ADVANCE January 27, 2015 Linda J. Mason Associate Dean of the Graduate School and Professor of Entomology.
INTERNET and CODE OF CONDUCT
Information Systems Controls for System Reliability -Information Security-
Department of Economic Opportunity WelcomeTo Contract Review Form Training.
Chapter 7 Database Auditing Models
Good Clinical Practice GCP
National Smartcard Project Work Package 8 – Security Issues Report.
Office of Sponsored Programs Valerie Howard, Director Phone: Fax:
Audit of Public Procurement
Audit of public debt in the Republic of Moldova and the impact of audit findings and recommendations on public debt management Court of Accounts of the.
Policy on Data Stewardship, Access, and Retention Establishes University policy to assure that research data are appropriately maintained, archived for.
Responsible Conduct of Research (RCR) Farida Lada October 16, 2013
7 - 1 Copyright  2003 Pearson Education Canada Inc. CHAPTER 7 Audit Planning and Documentation.
Notebooks and Protocols
After completing this lesson, participants will be able to:  Identify ethical, legal, and policy issues for managing research data  Define copyrights,
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Chapter 8: Client Risk Profile and Documentation
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
YOUR RELIABLE PARTNER. “Taxation of intellectual property, research & development in Russian Federation”
Scientific Record Keeping Alan L. Goldin, M.D./Ph.D.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Working with Foreign Collaborators Mary Kirker Chief Grants Management Officer National Institute of Allergy and Infectious Diseases.
Privacy and Confidentiality. Definitions n Privacy - having control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally,
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
LEGAL ASPECTS OF DIGITAL LIBRARIES By TALWANT SINGH ADDL DISTT. & SESSIONS JUDGE; DELHI.
Use of Administrative Data Seminar on Developing a Programme on Integrated Statistics in support of the Implementation of the SNA for CARICOM countries.
Student Support Services Standard II B & C. II.B. The institution recruits and admits diverse students who are able to benefit from its programs, consistent.
Nature and Type of Audit Evidence
Human Subjects Review: Policies and Procedures. Why A Human Subjects Review? It is the policy of this University that all researchers undertaking studies.
What is Access?. “Copyright and Terms of Service Copyright © Texas Education Agency. The materials found on this website are copyrighted © and trademarked.
Confidentiality Region 7 Education Service Center Head Start Copyright 2013 by Region 7 Education Service Center. This document may be reproduced for educational.
The United States Department of Transportation. The United States Department of Transportation Public Access Plan is still under development and is subject.
Award Management Services Procurement Outreach Training Level II - Module C Specialized Agreements.
Human Subjects Update E. Wethington, Chair, UCHS.
Handbook for Health Care Research, Second Edition Chapter 8 © 2010 Jones and Bartlett Publishers, LLC CHAPTER 8 Steps to Implementation.
DON Code of Privacy Act Fair Information Principles DON has devised a list of principles to be applied when handling Protected Personal Information (PPI).
1 M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 9 – Financial Services Bilateral.
Review of Research-Related Agreements Between Academic Institutions and Other Entities. Manoja Ratnayake Lecamwasam, PhD Intellectual Property and Innovation.
Award Management Services Procurement Outreach Training Level II - Module C Specialized Agreements.
EVAL 6000: Foundations of Evaluation Dr. Chris L. S. Coryn Nick Saxton Fall 2014.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Protection of Personal Information Act An Analysis on the impact.
Agencija za zaštitu ličnih/osobnih podataka u Bosni i Hercegovini Агенција за заштиту личних података у Босни и Херцеговини Personal Data Protection Agency.
Intellectual Property And Data Rights Issues Domestic & Global Perspectives Bayh-Dole act -- rights in data Henry N. Wixon Chief Counsel National Institute.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Sub-recipient Monitoring and Contractor Determination
Achieving innovation to meet new market challenges: Global Commodity Financing GTR MENA Oscar Wehtje, Head of Product Development February 2017.
Data Protection GCSE ICT Mrs N Steventon-2005.
Beneficial Ownership Roadmap, Naypidaw, Myanmar March 2017
Electronic Transactions & Authentication
European integration of medical education
Chapter 3 formation of company
Sponsored Programs at Penn
GDPR - New Data Protection Regulation
SPONSORED PROGRAM SERVICES OVERVIEW
Legal Entity Identifier Standard and Global LEI System Implementation
Presentation transcript:

Data Management

2 Data Management Practices RESPONSIBLE CONDUCT IN RESEARCH

3 Data Management Practices Data Ownership Who owns it depends on …. Funding source Government, private company or philanthropic organization Grant (Bayh-Dole) versus contract Research institution? Grants awarded to institution, not individual Institution responsible for budget, regulatory compliance, contractual obligations, data management To ensure compliance, institution exerts ownership RESPONSIBLE CONDUCT IN RESEARCH

4 Data Management Practices Data Ownership Maybe the data source Countries with tropical rain forests Individuals with rare diseases Entities with unique databases RESPONSIBLE CONDUCT IN RESEARCH

5 Data Management Practices Data Ownership Work out in advance - Who owns the data I am collecting? What rights do I have to publish the data? Does collecting these data impose any obligations on me? Preferably in writing. May need institutional approval! RESPONSIBLE CONDUCT IN RESEARCH

6 Data Management Practices Data Collection Four generic but important considerations - 1.Use appropriate and reliable methods 2.Pay attention to detail 3.Obtain authorizations Human / animal subjects, biohazards, copyrighted material, etc 4.Keep permanent record regardless of format What was done / observed / achieved RESPONSIBLE CONDUCT IN RESEARCH

7 Data Management Practices Data Collection Two basic rules to record keeping - 1.Enter data / evidence into numbered, bound notebook Date, order of data collection, results achieved No binders or files, changes without date / reason 2.Electronic evidence should be validated to assure it was recorded on a particular date and not changed later ??? RESPONSIBLE CONDUCT IN RESEARCH

8 Data Management Practices Data Protection Data, as currency of research, represents investment It may be needed later: To confirm findings or to establish priority Or, for re-analysis by others It should be stored in a safe place and backed up if on computers Confidentiality agreements must be honored! RESPONSIBLE CONDUCT IN RESEARCH

9 Data Management Practices Data Protection Data, as currency of research, represents investment Data should be preserved – but for how long? At least 3-7 years? Research data should be shared – but when and with whom?? Preliminary data – not unless … Confirmed / validated data – not before publication Keeping data confidential prior to publication – OK Once published, all relevant information should be available RESPONSIBLE CONDUCT IN RESEARCH

10 Data Management Practices Data Protection Future considerations. Data complexity – e.g. the human genome project How to store efficiently and inexpensively? Control – e.g. large projects Can researchers participating in a large, multi-site study publish their own data, or are they constrained? National security Freedom versus fears of terrorists, enemy nations, etc RESPONSIBLE CONDUCT IN RESEARCH