Privacy & Confidentiality By Ann Richards, Ph.D. West Virginia University adapted from a presentation by By Joan Sieber California State University, Hayward.

Slides:



Advertisements
Similar presentations
Purpose of Information and Referral Services?. Purpose of Information and Referral Services The primary purpose of Information and Referral services is.
Advertisements

Lecture 2: Types of Studies, Target Populations, & Ethical Concerns
What is Primary Research and How do I get Started?
1 4. Coordinating Modules & Layout. 2 A.A good introduction B.Choosing the order of modules C.Streamlining your instrument D.Question layout and formatting.
Criteria For Approval 45 CFR CFR Minimized risks Reasonable risk/benefit ratio Equitable subject selection Informed consent process Informed.
CONDUCTING INTERVIEWS Preparing for your documentary.
Informed Consent Waivers IRB Health Sciences & Behavioral Sciences University of Michigan /26/20091.
Protecting the Privacy of Family Members in Survey and Pedigree Research Jeffrey R. Botkin, MD, MPH University of Utah.
Human Specimen Repositories: Requirements of 45 CFR part 46 PRIM&R May 5, 2004 Julie Kaneshiro DHHS Office for Human Research Protections Phone:
Complying with Privacy to Enable Innovation & Research
Ethical Issues Role of the Qualitative Researcher.
©2010 John Wiley and Sons Chapter 14 Research Methods in Human-Computer Interaction Chapter 14- Working with Human Subjects.
IRB 101: Informed Consent Columbia University Medical Center IRB September 22, 2005.
CUMC IRB Investigator Meeting November 9, 2004 Research Use of Stored Data and Tissues.
What Needs HSC Review? Staying compliant with Federal research regulations.
Chapter 3 Preparing and Evaluating a Research Plan Gay and Airasian
Human Investigation Committee  Is it research?  If yes, does it involve human subjects?  If yes, can it be exempt?  If no, will a Request for.
ATP Winter 2008 Workshop Jim Valkenburg Delta College.
Competency Assessment Public Health Professional (2012)-
Privacy vs. Confidentiality Presentation for IRB Members.
Lisa Denney, MPH HRPP Assistant Director Melanie Mace, MA HRPP Education and Training Coordinator Bill Woods, PhD CAPS Policy and Ethics Core November.
Questionnaires and Interviews
Workshop on Health Examination Surveys (HES) Legal and ethical issues Susanna Conti, M. Kanieff, G. Rago Istituto Superiore di Sanità (ISS) (National Public.
1 NJ Dept. of Health Decision Tree for eIRB Submission Revised: 06/18/2015 Is this research defined as: A systematic investigation which includes research.
Interstate New Teacher Assessment and Support Consortium (INTASC)
DrugEpi 1-4 Counting HS Marijuana Use Module 1 Overview Context Content Area: Descriptive Epidemiology & Surveillance Essential Question (Generic): How.
Confidentiality and Public Information Act LISD Special Education Department Training SY
Help us Help you: IRB Policy Updates Susan Bankowski, MS, JD IRB Chair.
Privacy & Confidentiality By Joan Sieber California State University, Hayward.
WELNS 670: Wellness Research Design Chapter 5: Planning Your Research Design.
Confidentiality, Research, & Law
May I have your permission please? The consent process: What, Where, When, Who and Why Valerie Smith OHRP IRB Program Manager
Director of Evaluation and Accountability Manager, UW’s Grand Rapids, Michigan Robert McKown, CIRS Director of Evaluation and Accountability Sherri.
The Process of Conducting Research
Sampling is the other method of getting data, along with experimentation. It involves looking at a sample from a population with the hope of making inferences.
Legal and Ethical Responsibilities
Unit 4 Legal and Ethical Responsibilities. 4:1 Legal Responsibilities Copyright © 2004 by Thomson Delmar Learning. ALL RIGHTS RESERVED. 2 Introduction.
Effective Leadership and Management in Nursing CHAPTER EIGHTH EDITION Recruiting and Selecting Staff 15.
Privacy and Confidentiality. Definitions n Privacy - having control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally,
Legal and Ethical Issues Counseling Children. Child and Adolescent Clients Counselors who work with children and adolescents under the age of 18 may experience.
Human Subjects Protections Research Ethics. Basic Assumptions about How Research Should be Conducted Subjects should be protected from harm. Subjects.
OPEN UP! Introduction to handling Freedom of Information requests.
Privacy vs. Confidentiality.  IRB review of privacy and confidentiality protections is required under the Common Rule and the FDA regulations, as well.
Chapter 5 Conducting & Reading Research Baumgartner et al Chapter 5 Ethical Concerns in Research.
Nursing Research as the Basis of Nursing. Importance of Nursing Research Nurses ask questions aimed at gaining new knowledge to improve pt. care Nurses.
$100 $200 $400 $500 $300 $100 $200 $400 $500 $300 $100 $200 $400 $500 $300 $100 $200 $400 $500 $300 $100 $200 $400 $500 $300 Terms Clinical Trial Facts.
HIPAA and Human Subjects Research IRB Member CE May 2014 Slideshow by Sean Horkheimer.
Case Studies: Puzzles in Human Research Kevin L. Nellis, M.S., M.T. (A.S.C.P.) Program Analyst, Program for Research Integrity Development and Education.
Psychology As Science Psychologists use the “scientific method” Steps to the scientific method: - make observations - ask question - develop hypothesis.
Regulations 201: Thorny Issues What is Research? Exempt and Expedited Reviews.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Cultural Competence Considerations [and other alliterations] in International Research IRB 2 Continuing Education March 10, 2015.
Ethical Guidelines in Research Ethics refers to doing what is morally and legally right in conducting research. Research ethics deals primarily with the.
CHAPTER 6 Selecting Employees and Placing Them in Jobs
IOM Review: VSD Data Sharing Program Melinda Wharton, M.D. National Immunization Program, CDC NVAC Vaccine Safety Subcommittee October 5, 2004.
Privacy/Confidentiality – Principles and Regulations in the Social Sciences and Behavioral Research Moira Keane, MA, CIP University of Minnesota May 4,
Legal and Ethical Responsibilities. Legal Responsibilities Introduction Criminal law Civil law Tort Malpractice Negligence (continues)
Sociology. Sociology is a science because it uses the same techniques as other sciences Explaining social phenomena is what sociological theory is all.
Principles of medical ethics Lecture (4) Dr. HANA OMER.
 Counseling substance abuse users.  NASW: National Association of Social Workers- code of ethics.  NAADAC: National Association of Alcoholism and.
Legal and Ethical Responsibilities
Objectives 1. Define and describe each of the Agreement types being discussed today; 2. Highlight specific questions to ask when determining the administrative.
CHCCS411A Work effectively in the community sector
Quality assurance in official statistics
Legal and Ethical Responsibilities
Legal and Ethical Responsibilities
Ethical questions on the use of big data in official statistics
What are the Major Changes to the IRB under the Final Common Rule?
Office of Research Integrity and Protections
STRUCTURE OF THE CHAPTER
Presentation transcript:

Privacy & Confidentiality By Ann Richards, Ph.D. West Virginia University adapted from a presentation by By Joan Sieber California State University, Hayward

The Privacy & Confidentiality Test  Privacy test: Does the subject think the information sought is any of the researcher’s business? Is the subject comfortable in the research setting?  Confidentiality test: Is the subject satisfied with the methods that will be used to control who can have access to the data?

People want to control…  The time and place where they give information.  The nature of the information they give.  The nature of the experiences that are given to them.  Who receives and can use the information.

Privacy Privacy refers to persons and to their interest in controlling access of others to themselves. (Confidentiality refers to data.)

The IRB’s Dilemma The Federal Regulations do not Define Privacy. The Guidebook from the Office for Human Research Protections (OHRP) says: “Decide whether there is an invasion of privacy. There are no criteria. Base your decision on your own sense of propriety. “

Ability to regulate access of others to oneself (privacy) varies with:  Status  Role  Verbal skill  Stage of development  Context  Culture  Technology used in the research

What is Private Also Varies with:  Gender  Ethnicity  Age  Socio-economic class  Education  Ability level  Social/verbal skill  Health status  Legal status  Nationality  Intelligence  Personality  Relationship to researcher

WAYS TO RESPECT PRIVACY IN RESEARCH  Informed consent – if effectively done!  Knowledge of subject’s culture.  Rapport and sensitivity to individuals.  Research associates from that culture.  Extensive consultation with appropriate professionals & peers of subjects.  Analyze the research context & technology.

What is Confidentiality?  Confidentiality is about data (not people), and about agreements and procedures for limiting the access of others to data.  There are ever-increasing methods of assuring confidentiality, along with ever increasing high-tech methods of breaching confidentiality.

It is hard to find the many techniques for protecting confidentiality:  Inter-file linkage  Error inoculation  Statistical strategies  Top coding  Restricted public use data  Restricted access, enclaves, archives  Certificates of Confidentiality  Ethical editing of qualitative descriptions  Data brokering

Inter-file Linkage  Researcher wishes to link data with 50 subjects with information from police records  Subject provides data and alias to researcher  Subject provides the police with his name and alias  Police provide requested information with alias  Researcher does the analysis

Statistical Strategies  Insert random error into dataset that still allows useful statistical analysis  Person roles a die to determine the answer For example someone asks an individual if they have used drugs in the past month. The individual roles a die and a corresponding number elicits a yes or no response For example someone asks an individual if they have used drugs in the past month. The individual roles a die and a corresponding number elicits a yes or no response

Top-Coded  dataset is one for which the upper bound is not known.  This is often done to preserve the anonymity of people participating in the survey if a survey included a person with wealth of $51 billion, it would not be anonymous because people would know it is Bill Gates if a survey included a person with wealth of $51 billion, it would not be anonymous because people would know it is Bill Gates

Restricted Public Use Data  Includes individually identifiable information that is confidential and protected by law  agreement spell out the conditions of use pertaining to respondent confidentiality, as well as measures required for the physical safekeeping of the restricted datasets when in the researcher's possession

Restricted Access and Enclaves  These restricted data have confidentiality issues for which there is heightened sensitivity to disclosure, as indicated either by the depositor or the holder  A researcher applies for access to these data, and if approved, conducts the analysis under very controlled conditions. Analytic output and notes taken during the research process are reviewed by archive staff before being released to the researcher 

Ethical Editing of Qualitative Data  Assume identity and location will be discovered  Is language descriptive or judgmental?  Describe cultural context and then specific characteristics  Negative stereotypes may affect similar people  Is the research site usable again?  Have some subjects from your study site read information for accuracy.

Data Brokering  Data is held and managed by others Negotiate exchange agreements Negotiate exchange agreements Provide information about data resource Provide information about data resource Enable access Enable access

What Lies Ahead?  Electronic data storage  Using web-medias to conduct face-to-face interviews  Technology privacy activists