Download presentation
Presentation is loading. Please wait.
Published byLaurence Craig Modified over 9 years ago
2
1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the screen changes and you press enter.
3
ELECTRONIC DATA SECURITY in human subjects research Developed by: U-MIC University of Michigan IRB Collaborative
4
3 Developed by: U-MIC hacking theft lost equipment
5
4 Developed by: U-MIC Electronic data security Office of Human Research Compliance Review (OHRCR) recommendations for best practices
6
5 Developed by: U-MIC Electronic data security collect only the data you need deidentify as soon as possible Office of Human Research Compliance Review (OHRCR) recommendations for
7
6 Developed by: U-MIC Electronic data security separate identifying information from research data use encryption software Office of Human Research Compliance Review (OHRCR) recommendations for
8
7 Developed by: U-MIC Electronic data security restrict access use machines managed by IT collect store process transmit Office of Human Research Compliance Review (OHRCR) recommendations for
9
8 Developed by: U-MIC Electronic data security avoid portable devices use encryption software Office of Human Research Compliance Review (OHRCR) recommendations for
10
9 Developed by: U-MIC Electronic data security delete identifying information Office of Human Research Compliance Review (OHRCR) recommendations for
11
10 Developed by: U-MIC Electronic data security Information and Technology Services (ITS) recommendations for use a loaner machine bring only necessary machines and data create a temporary password while traveling
12
11 Developed by: U-MIC Electronic data security Information and Technology Services (ITS) recommendations for create a data inventory leave a back-up behind implement full-disk encryption while traveling
13
12 Developed by: U-MIC Electronic data security Information and Technology Services (ITS) recommendations for avoid public internet networks virtual private network (VPN) http://www.itcom.itd.umich.edu/vpn/ http://www.itcom.itd.umich.edu/vpn/ while traveling
14
13 Developed by: U-MIC Electronic data security Information and Technology Services (ITS) recommendations for keep machines with you password-lock while traveling
15
14 Developed by: U-MIC Electronic data security Information and Technology Services (ITS) recommendations for if a machine is lost or stolen contact authorities change passwords while traveling security@umich.edu
16
15 Developed by: U-MIC Electronic data security Information Technology Services (ITS) http://www.itcs.umich.edu/ Medical School Information Services (MSIS) https://www.umms.med.umich.edu/msis/home/index.php Medical Center Information Technology (MCIT) http://www.itcom.itd.umich.edu/umnoc/mcit-help.php Office of Human Research Compliance Review (OHRCR) http://www.ohrcr.umich.edu/
17
THANK YOU. Brian Seabolt IRBMED 16 Developed by: U-MIC
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.