Research Data Security Plan (RDSP)

Research Data Security Plan (RDSP)

18 Pages · 2014 · 180 KB · English

RDSP Purpose. 2. •Institutional oversight and management of. Research Data Storage. • During an internal or external audit, can the auditors validate intended vs actual data storage? • Can we guide our researchers into more secure methods of data storage?

Research Data Security Plan (RDSP) free download

Research Data Security Plan (RDSP) Reviewer Training January 6, 2014 Duke Medicine Information Security Office DATA CLASSIFICATION: PUBLIC RDSP Purpose 2 • Institutional oversight and management of Research Data Storage •During an internal or external audit, can the auditors validate intended vs actual data storage? •Can we guide our researchers into more secure methods of data storage? History of RDSP 3 •Implemented November 2011 for all new nonexempt submissions through Duke Medicine IRB •Retrospective survey in REDCap was administered by Duke Office of Clinical Research (DOCR) to all existing approved, nonexempt studies at that time RDSP review 4 •Paper review is done by CRU/Study Owning Organization Research Practice Manager or equivalent •Electronic review is done by designated IT supporting CRU/Study Owning Organization •Final approval should come after communication between paper and electronic reviewers assures that all data storage is listed and is compliant with Duke Medicine Information Security Standards and regulatory requirements “but IRB approved my study……” 5 •The human subjects must understand where data are going and authorize the arrangements which, within Duke, are accomplished via informed consent •IRB does not review the RDSP The Research Study Team and CRU/Study Owning Organization are responsible for ensuring that what is listed in RDSP is reflected in the IRB submission (consent, waivers, summary) •Communication with the study team and between reviewers is a critical aspect of the review process 01 Storage Media Types 6 Reviewer Note: If both sections are blank, this should be questioned as it is rare that a research study would not generate ANY paper or electronic data Notice that this section does not mention PHI, so unless a study has generated no paper or electronic data at all (extremely rare) then something should be checked 021 Storage of Paper or Nondigital Media 7 Reviewer Note:  Check to ensure that “yes’ or “no” is selected for each dropdown option in the section labeled "Indicate if paper or non digital media, even if the storage is temporary, contain:"  The PHI dropdown box should almost always be “Yes” If “No” is the selection, inform the PI/CRC that nearly all of the data collected for a research study at Duke Medicine is PHI Even if it only has the date of a clinical service, it qualifies as PHI Reviewer Note: SSNs require "two keys" for paper storage Temporary storage of paper SSNs (permanently redacted at earliest possible time ) may be permitted for participant payment purposes, but all other paper SSN storage requires institutional approval through Duke Medicine ISO All storage, temporary or permanent, must be listed within RDSP 022 Storage of Electronic Information 8 Reviewer Note: Temporary storage of electronic SSNs (permanently redacted at earliest possible time) may be permitted for participant payment purposes, but all other electronic SSN storage requires institutional approval through Duke Medicine ISO All storage, temporary or permanent, must be listed within RDSP 022 Storage of Electronic Information (continued) 9 Reviewer Note: This section, as of January 2014, contains two additional options for storage within: •Duke University, OIT Managed Service •Campus Department Supported IT Service If either of these options are selected, IT reviewer should email Duke Medicine Information Security Office ([email protected]) for review with subject “RDSP Pro000XXXXX” 022 Storage of Electronic Information (continued) 10 Research data stored within Duke Medicine is governed by Duke Medicine Security Standards Research data maintained outside of Duke (such as another University, sponsor, or 3 rd party contractors or subcontractors) is protected by that entity However, the human subject must understand where data are going and authorize the arrangements which, within Duke, are accomplished via informed consentIf questions arise about the propriety of the consent form, direct them to the CRU reviewer who may discuss them with IRB Office IT Staff is not responsible for reviewing consent forms, but

------------- Read More -------------

Download research-data-security-plan-rdsp.pdf

Research Data Security Plan (RDSP) related documents

Data Structures and Encoding

128 Pages · 2014 · 3.37 MB · English

The Unicode documents provide extensive documentation on these issues. 4. The GBK character set is an extension of the GB 2312-1980 character set and supports the Chinese characters in GB. 13000.1-93 that is the Chinese adaptation of Unicode 1.1. The GBK is code point backward compatible to 

University of Oxford Helps Researchers Unlock Big Data for Medical Breakthroughs

2 Pages · 2014 · 611 KB · English

For research experts at the University of Oxford, the quicker they database solution in terms of data mining capabilities and analytics Actian Vector is ideal for BI, reporting and analysis because it accelerates time to insight.

Proposed Plan Changes Provisions - Development Manual

74 Pages · 2013 · 2.88 MB · English

Matamata-Piako District so as to protect people, property and the environment by minimising the impact of The management of stormwater has a functional role in the urban and rural environments. The Council will maintain an MPDC Tree Strategy that provides a useful guide to location, species 

U.S. Agency for International Development Data Architecture Volume

172 Pages · 2006 · 4.59 MB · English

1.2 Definition of a Data Architecture In a broad sense, architecture is defined as "the structure of the components, their relationships, and the

7 Quality Control Plan - Indiana

10 Pages · 2011 · 30 KB · English

is required to encompass the total proce ss from preliminary site approval up to mean and control limit values, or Certified Aggregate Technicians are

'&¢(0)1&2$3 &24156(0$879([email protected]$'C1DE$G FH$8(0I1FH$8(0)1P651C1IRQ ( ABST

24 Pages · 2009 · 318 KB · Polish

„lewopółkulową matematyką” i „lewopółkulowymi metodami instrukcji” w pro- cesie kształcenia matematycznego, (zob. Sharygin, 2000, s. Pardała, A.: 2007, Problems teacher's practice forming mathematical activity and creativity of the gifted pupils, w: J. Povstenko (red.), Scientific

National Implementation Plan

254 Pages · 2011 · 4 MB · English

concerning reproduction and rights should be addressed to: Joint Secretary. HSM Division. Ministry of Environment & Forests ,. Government of India .. Table 27-10 Action Plan for public information. 211. Table 27-11 Action Plan for effectiveness of the evaluation, reporting and financial assistance.

Research Article Peak Voltage Measurements Using Standard Sphere Gap Method - Hindawi

6 Pages · 2015 · 1.96 MB · English

1 Department of Electrotechnics, Faculty of Electrical Engineering and Computer Science, 13 University Street, 720229 Suceava, Romania. 2 Department of The paper presents a measurement system of peak value of high voltage (H.V.) using 150 mm diameter sphere gap, disposed in vertical position 

Material Safety Data Sheet - Airgas.com - Gas, Welding, Safety Supply

7 Pages · 2013 · 114 KB · English

Methane 001033 Synthetic/Analytical chemistry. 4/1/2013. Material Safety Data Sheet Product name AIRGAS INC., on behalf of its subsidiaries 259 North Radnor-Chester Road

Three Waters Summary Asset Management Plan

54 Pages · 2010 · 669 KB · English

Drinking water, wastewater and stormwater services have a significant impact on how well we achieve the Council,s long.term outcome of .. and Innovative. 1 Key Strategic Areas. 2 Strategic Goals. Urban Development1. Transport. Economic Development. Environment. Cultural Wellbeing. Social and