Curating and Managing Research Data for Re-Use Confidential Data Management Jared Lyle.

Slides:



Advertisements
Similar presentations
The Statistics Act and Research Access to Data Paul J Jackson Legal Services ONS.
Advertisements

Protect Our Students Protect Ourselves
Is it Research?. Is It Research? 2 Elements –The project involves a systematic investigation –The design (meaning goal, purpose, or intent) of the investigation.
F amily E ducational R ights and P rivacy A ct University of Nebraska at Kearney.
National Science Foundation Division of Science Resources Statistics May The Confidential Information Protection and Statistical Efficiency Act.
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
Informed Consent.
UTHSC IRB Donna Hollaway, RN, CCRC 11/30/2011 Authority to Audit 45 CFR (e) An IRB shall conduct continuing review of research covered by this.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
NCES Data Confidentiality and Data Licensing Program Marilyn Seastrom July, 2013 Washington, DC.
1 Office of the General Counsel FERPA  Family Educational Rights and Privacy Act (20 U.S.C § 1232g)
FERPA: Family Educational Rights and Privacy Act.
Recently Issued OHRP Documents: Guidance on Subject Withdrawal and Draft Revised FWA Secretary’s Advisory Committee on Human Research Protections October.
1 FERPA and Student Privacy in Records of University Research ECURE March 1, 2005 Richard Rainsberger, Ph.D. Consultant, Education Records Law and Privacy.
The Family Educational Rights and Privacy Act (FERPA) The Importance of Protecting Student Records This session will help you better understand the law.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Instructions for VCU’s Internal Approval Form Form is required to obtain Authorized Official’s signature on proposals and awards OSP – 8/2006.
Health Insurance Portability and Accountability Act (HIPAA)
Country Paper on: Census Data Accessibility, Confidentiality and Copyright Policy: Ethiopia’s Experience Seminar United Nations Regional Seminar on Census.
Archiving and Sharing Confidential Data in the Social Sciences George Alter Director, ICPSR.
- What it means to Conservation Districts - Training Module 6.
HIPAA PRIVACY AND SECURITY AWARENESS.
NIH Data Sharing Policy University of Nebraska Medical Center.
April 2011 Conducting Research at SPC Approval Process and Procedures Center of Excellence for Teaching and Learning.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Health Insurance Portability and Accountability Act (HIPAA)
HIPAA and Research Basics for IRB Tim Atkinson Director, Research and Sponsored Programs Director, Institutional Review Board Research Privacy Officer.
HIPAA – How Will the Regulations Impact Research?.
Family Educational Rights and Privacy Act. From the moment a child enters the school system, sensitive information is collected about the child (and even.
RESPONSIBLE CONDUCT IN HUMAN SUBJECTS RESEARCH MARGARITA M. CARDONA DIRECTOR OF SPONSORED RESEARCH Institutional Review Board.
H I P A A T R A I N I N G Self Directed Module 7 Research Disclosures For Data Custodians START Click to begin…
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Privacy and Confidentiality. Definitions n Privacy - having control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally,
Family Educational Rights and Privacy Act (FERPA) UNION COLLEGE.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Student Data and Confidentiality Parents Rights Schools’ Responsibilities.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
The Linguistics Department Institutional Review Board Committee Silvina Montrul, chair Fred Davidson Irene Koshik Ryan Shosted September 22, 2008.
Health Insurance portability and Accountability Act (HIPAA)‏
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
Creating Open Data whilst maintaining confidentiality Philip Lowthian, Caroline Tudor Office for National Statistics 1.
Lisa Neidert Population Studies Center May 26-28, 2010 Ann Arbor, MI Third Working Group on Data Access.
Case Studies: Puzzles in Human Research Kevin L. Nellis, M.S., M.T. (A.S.C.P.) Program Analyst, Program for Research Integrity Development and Education.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
The Georgia Open Records Act and ferpa
FERPA Family Educational Rights and Privacy Act of 1974 (also known as the Buckley Amendment)
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Social and Behavioral Science Data
Tomball Independent School District Annual Confidentiality Training
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
FERPA (Oops, can I say that?)
Information Security Seminar
FERPA (Oops, can I say that?)
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Welcome to the FERPA training for Faculty and Staff.
Protecting Confidential Data
Confidentiality Training 2014
IRB protocol no PI: Dr. David F. Chhieng
The Health Insurance Portability and Accountability Act
Family Educational Rights and Privacy Act of 1974
Presentation transcript:

Curating and Managing Research Data for Re-Use Confidential Data Management Jared Lyle

We Are Here: Confidential Data Management

Disclosure: Risk & Harm What do we promise when we conduct research about people? – That benefits (usually to society) outweigh risk of harm (usually to individual) – That we will protect confidentiality Why is confidentiality so important? – Because people may reveal information to us that could cause them harm if revealed. – Examples: criminal activity, antisocial activity, medical conditions...

“There’s No Data Like No Data” Data Producers “want to protect the confidentiality of survey respondents and avoid disclosure while at the same time maximizing data quality and data access.” Confidentiality, Disclosure, and Data Access: Theory and Practical Application for Statistical Agencies (Doyle, Lane, Theeuwes, and Zayatz, Eds., 2001)

Two Kinds of Disclosure Risk The intruder knows the respondent, and is searching for them based on knowledge already in hand (parent, neighbor, spouse, etc.) The intruder does not know the respondent(s) and is searching against some comparison data base

Protecting Confidential Data Safe data Safe places Safe people Safe outputs

Safe Data Disclosure Review Disclosure Treatment

Disclosure Review [Documentation] [Data] Disclosure Review

Disclosure Risk Review General Considerations – Intended uses – Detail and sensitivity – Is sampling frame identifiable? – Outliers – Subsets and unique combinations

Disclosure Risk Review Direct Identifiers? – personal names – addresses (including ZIP codes) – telephone numbers – social security numbers – driver license numbers – patient numbers – certification numbers,

Disclosure Risk Review Indirect Identifiers? – detailed geography (i.e., state, county, or census tract of residence) – exact date of birth – exact occupations held – exact dates of events – detailed income

Disclosure Risk Review External Linkages? – public patient/medical records – court records – police and correction records – Social Security records – Medicare records – drivers licenses – military records

Options for Restricting Content Removal Blanking: ‘abcd’ to “ “ Recoding: ‘1234’ to ‘9999’ Bracketing and/or Collapsing: 13-29=1, 30-49=2 Top-coding/Bottom-coding: >1,000=1,000 Perterbing: noise addition (rounding, swapping) Pseudonyms (for qualitative responses) Restricting access

Exercise

Further Resources Statistical Policy Working Paper 22 - Report on Statistical Disclosure Limitation Methodology The American Statistical Association, Committee on Privacy and Confidentiality - Methods for Reducing Disclosure Risks When Sharing Data ICPSR's Confidentiality and Privacy web page nagement/confidentiality/ nagement/confidentiality/

Training Joint Program in Survey Methodology

Discussion How far do you go in mitigating disclosure risk? What is the right balance? Is processing for indirect identifiers overkill? How long should data be restricted? What are the advantages and drawbacks of delayed dissemination?

Safe People, Places, Outputs…

ICPSR Responsible Use Statement Users of ICPSR data agree to a responsible use statement before downloading data from the Web site. It reads, in part: Any intentional identification of a RESEARCH SUBJECT (whether an individual or an organization) or unauthorized disclosure of his or her confidential information violates the PROMISE OF CONFIDENTIALITY given to the providers of the information. Therefore, users of data agree: To use these datasets solely for research or statistical purposes and not for investigation of specific RESEARCH SUBJECTS, except when identification is authorized in writing by ICPSR To make no use of the identity of any RESEARCH SUBJECT discovered inadvertently, and to advise ICPSR of any such discovery Agree not to redistribute data or other materials without the written agreement of ICPSR Source: “Navigating Your IRB to Share Restricted Data” Webinar (

Restricted Data Use Agreement Sets requirements of the investigator and institution Defines ICPSR’s obligations Requires signatures from investigator and legal representative of researcher’s institution Incorporates by reference – Information entered into the access system – IRB approval or exemption for project – Data security plan Source: “Navigating Your IRB to Share Restricted Data” Webinar (

Data Use Agreement To avoid inadvertent disclosure of persons, families, households, neighborhoods, schools or health services by using the following guidelines in the release of statistics derived from the dataset. 1. In no table should all cases in any row or column be found in a single cell. 2. In no case should the total for a row or column of a cross- tabulation be fewer than ten. 3. In no case should a quantity figure be based on fewer than ten cases. 4. In no case should a quantity figure be published if one case contributes more than 60 percent of the amount. 5. In no case should data on an identifiable case, or any of the kinds of data listed in preceding items 1-3, be derivable through subtraction or other calculation from the combination of tables released.

Data Use Agreement The Recipient Institution will treat allegations, by NAHDAP/ICPSR or other parties, of violations of this agreement as allegations of violations of its policies and procedures on scientific integrity and misconduct. If the allegations are confirmed, the Recipient Institution will treat the violations as it would violations of the explicit terms of its policies on scientific integrity and misconduct.

What are the consequences of violating the terms of use agreement for ICPSR data? Subjects who participate in surveys and other research instruments distributed by ICPSR expect their responses to remain confidential. The data distributed by ICPSR are for statistical analysis, and they may not be used to identify specific individuals or organizations. Although ICPSR takes steps to assure that subjects cannot be identified, users are also obligated to act responsibly and not to violate the privacy of subjects intentionally or unintentionally. If ICPSR determines that the terms of use agreement has been violated, one or more of the steps will be taken which may include:  ICPSR may revoke the existing agreement, demand the return of the data in question, and deny all future access to ICPSR data.  The violation may be reported to the Research Integrity Officer, Institutional Review Board, or Human Subjects Review Committee of the user’s institution. A range of sanctions are available to institutions including revocation of tenure and termination.  If the confidentiality of human subjects has been violated, the case may be reported to the Federal Office for Human Research Protections. This may result in an investigation of the user’s institution, which can result in institution-wide sanctions including the suspension of all research grants.  A court may award the payment of damages to any individual harmed by the breach of the agreement.

Customizing the RUDDDA Customize RUDDDA with information supplied by the data provider o Institution’s legal name and address o Official name AND familiar reference of project or dataset o Contact name of legal representative o Preference for electronic or hard copy Source: “Navigating Your IRB to Share Restricted Data” Webinar (

Accessing Restricted-Use Data Use online data access request system – Link in Access Notes on study homepage Must provide: – Name, department, and title of investigator – Description of the proposed research – Approval or exemption from IRB – Names of research staff accessing data – CVs and signed confidentiality pledges – Information on data formats needed and data storage technology Source: “Navigating Your IRB to Share Restricted Data” Webinar (

ICPSR Secure Data Services

Contracting ICPSR Restricted Data

The Virtual Lab This is the DP virtual machine Windows desktop (connected to the ICPSR data center). This is your local computer’s desktop at your approved location. Neither content or data can be transferred between the DP and … …your local desktop. You cannot import programs into the DP. You cannot cut and paste or move files outside the DP. You cannot access the Internet within the DP so using web browsers, , and ftp is not possible. You cannot cut & paste or move files between your computer (or anywhere else) and the DP. x

The Virtual Video Lab

Further Resources ICPSR “Instructions for Preparing the Data Protection Plan” d/all.pdf d/all.pdf “Introducing ICPSR’s Virtual Data Enclave (SDE)” icpsrs-virtual-data-enclave.html icpsrs-virtual-data-enclave.html ICPSR Physical Data Enclave cess/restricted/enclave.html cess/restricted/enclave.html

Further Resources Example NAHDAP Restricted Data Use Agreement RDAAgreement.pdf RDAAgreement.pdf NAHDAP “Restricted-Use Data Deposit and Dissemination Procedures” P-RestrictedDataProcedures.pdf P-RestrictedDataProcedures.pdf “Navigating Your IRB to Share Restricted Data” Webinar

Discussion What are you or your organization doing to create ‘safe’ places and people? What resources would you need to successfully manage confidential data? Are there partnership opportunities for managing confidential data?

We Are Here: Confidential Data Management