SlideShare a Scribd company logo
1 of 21
Research Using Restricted
Data: Ethics and Access Issues
California Center for Population
Research
May 19, 2014
Goals for today’s presentation
• Discuss basic professional standards for
researchers
• Discuss ways to manage data to protect
privacy and confidentiality
• Using restricted-access data
5/19/2014 CCPR - May 19, 2014 2
Thanks to Shira Safir, UCLA School of
Public Health for many of the slides
Professional Standards for Researchers
• "For individuals, research integrity is an aspect
of moral character and experience. It involves
above all a commitment to intellectual
honesty and personal responsibility for one’s
actions and to a range of practices that
characterize responsible research conduct."
(Taken from the National Academies of
Sciences Report)
Source: Slide shared by Shira Shafir, UCLA School of Public Health
5/19/2014 CCPR - May 19, 2014 3
Professional Standards for Researchers
• The best ethical practices produce the best research.
• These practices include:
– Proficiency and fairness in peer review;
– Accuracy and fairness in representing contributions to research
proposals and reports;
– Collegiality in interactions, communications and sharing of
resources;
– Honesty and fairness in proposing, performing, and reporting
research;
– Disclosure of conflicts of interest;
– Protection of human subjects in the conduct of research;
Source: Slide shared by Shira Shafir, UCLA School of Public Health
5/19/2014 CCPR - May 19, 2014 4
Collaborative Research
• Today, advances in the research are rarely
made by single investigators.
• Typically, collaboration allows the
investigative team to ask powerful new
questions, the answers to which would be
otherwise unattainable.
Source: Slide shared by Shira Shafir, UCLA School of Public Health
5/19/2014 CCPR - May 19, 2014 5
Conflicts of Interest
• “Conflict of Interest” is a legal term that
encompasses a wide spectrum of behaviors or
actions involving personal gain or financial
interest.
• A conflict of interest exists when an individual
exploits, or appears to exploit, his or her
position for personal gain or for the profit of a
member of his or her immediate family or
household. Source: Slide shared by Shira Shafir, UCLA School of Public Health
5/19/2014 CCPR - May 19, 2014 6
Misconduct in Research
• Errors involving deception comprise the most
serious category of errors.
• These types of errors involve:
– Violate privacy and confidentiality of research subjects
– Making up data or results (fabrication)
– Changing or misreporting data or results (falsification)
– Using the ideas or words of another without giving
appropriate credit (plagiarism)
• When in doubt, the government provides 26 excellent
guidelines: http://ori.hhs.gov/plagiarism-0
Source: Slide shared by Shira Shafir, UCLA School of Public Health
5/19/2014 CCPR - May 19, 2014 7
Manage data to protect respondents
• Assess disclosure risk: “A disclosure risk occurs if
an unacceptably narrow estimation of a
respondent’s confidential information is possible or
if exact disclosure is possible with a high level of
confidence.” http://neon.vb.cbs.nl/casc/Glossary.htm
• Procedures
– Informed consent
– Remove identifiers
– Data manipulation
– Restrict access
5/19/2014 CCPR - May 19, 2014 8
Informed consent
• “Informed consent is a process of communication
between a subject and researcher to enable the person
to decide voluntarily whether to participate in a study.
Human subjects involved in a project must participate
willingly and be adequately informed about the
research. The informed consent must include a
statement describing how the confidentiality of subject
records will be maintained. However, it also is
important that informed consent be written in a way
that does not unduly limit an investigator's discretion
to share data with the research community.”
5/19/2014 CCPR - May 19, 2014 9
Source: ICPSR web site on Confidentiality
Remove identifiers
• Direct identifiers. These are variables that point explicitly to particular
individuals or units. Examples include:
– Names, Addresses, including ZIP and other postal codes
– Telephone numbers, including area codes
– Social Security numbers
– Other linkable numbers such as driver's license numbers, certification numbers, etc.
• Indirect identifiers. These are variables that can be problematic as they
may be used together or in conjunction with other information to
identify individual respondents. Examples include:
– Detailed geographic information (e.g., state, county, province, or census tract of residence)
– Organizations to which the respondent belongs
– Educational institutions (from which the respondent graduated and year of graduation)
– Detailed occupational titles
– Place where respondent grew up
– Exact dates of events (birth, death, marriage, divorce)
– Detailed income
– Offices or posts held by respondent
5/19/2014 CCPR - May 19, 2014 10
Source: ICPSR web site on Confidentiality
Data Manipulation
• Recoding -- can include converting dates to time intervals, exact dates
of birth to age groups, detailed geographic codes to broader levels of
geography, and income to income ranges or categories.
• Removal -- eliminating the variable from the dataset entirely.
• Top-coding -- restricting the upper range of a variable.
• Collapsing and/or combining variables -- combining values of a single
variable or merging data recorded in two or more variables into a new
summary variable.
• Sampling -- rather than providing all of the original data, releasing a
random sample of sufficient size to yield reasonable inferences.
• Swapping -- matching unique cases on the indirect identifier, then
exchanging the values of key variables between the cases. This retains
the analytic utility and covariate structure of the dataset while
protecting subject confidentiality. Swapping is a service that archives
may offer to limit disclosure risk. (For more in-depth discussion of this
technique, see O’Rourke, 2003 and 2006.)
• Disturbing -- adding random variation or stochastic error to the variable.
This retains the statistical properties between the variable and its
covariates, while preventing someone from using the variable as a
means for linking records.5/19/2014 11
Source: ICPSR Guide to Social Science Data Preparation and Archiving
Restrict Access
• “Restricted-use data are distributed in cases
when removing potentially identifying
information would significantly impair the
analytic potential of the data. In other cases,
data contain highly sensitive personal
information and cannot be shared as a public-
use file. In these cases, ICPSR provides access
to a restricted-use version that retains the
confidential data but requires controlled
conditions for accessing them.”
5/19/2014 CCPR - May 19, 2014 12
Source: ICPSR Web site on confidentiality
Ways to restrict access
• ICPSR has established several mechanisms by which restricted-use data can be
distributed:
• Secure online analysis (publicly available): This option provides immediate
access to restricted-use data behind an analytic interface that has
programmable disclosure protection.
• Secure online analysis (password protected): This option provides analysis of
restricted-use data behind an interface with programmable disclosure
protection for selected users. With this option, users may have to submit an
application to access the data, or they may be part of a defined group, such as
a research group.
• Restricted Use Data Agreement: With this option, users submit a request to
access the data, and after approval, download the data using a single-use
password or receive the data on CD-ROM.
• Virtual Data Enclave (VDE): The VDE is a secure, online environment via which
approved users analyze restricted-use data using several software options
available within the VDE, such as SAS, Stata, and SUDAAN.
• Physical Data Enclave: For highly restricted data, ICPSR has a physical enclave,
which requires that approved users be on site at ICPSR to use the data. Data
use in the physical data enclave is monitored by ICPSR staff.
5/19/2014 CCPR - May 19, 2014 13
Source: ICPSR Web site on confidentiality
Apply for Restricted Data Access
• Application for Restricted-Use Data. This includes information about the
Investigator and the research project that requires access to the restricted-use
data. The application may require the current CVs of all researchers who will be
working on the project.
• Confidential Data Security Plan. The fundamental goals of this plan are to
ensure that the restricted-use data are securely stored at the institution and
accessible only to the people listed in the request. For some data security plans,
questions are presented in such a way for the Investigator to describe in detail
how this responsibility will be met. The questions and answers combined
comprise the confidential data security plan. For some data security plans, static
terms are presented to which the requester must agree.
• Restricted Data Use Agreement. This is a legal agreement between the
University of Michigan and the Investigator's institution specifying the terms of
the use of the restricted-use data.
• Supplemental Agreement with Research Staff Form. This identifies every
person other than the Investigator who will have access to the restricted-use
data. New research staff added in the course of a project must be added to and
sign this form before they can access the data.
• Pledge of Confidentiality. The Investigator and all research staff must sign this
pledge before they can access the data.
5/19/2014 CCPR - May 19, 2014 14
Source: ICPSR web site on restricted data access
Information needed to apply
• Name, department, and title of the Investigator
• Description of the proposed research that supports
need to access restricted-use data
• Information on data formats needed and data-
storage technology
• Approval or exemption for the research project from
the Institutional Review Board of the Investigator's
organization (for some restricted-use data)
• A Restricted Data Use Agreement signed by the
Investigator and a legal representative from the
Investigator's institution
• Other required information as specified in the
Restricted Data Use Agreement
5/19/2014 CCPR - May 19, 2014 15
Source: ICPSR web site on restricted data access
Add Health example
5/19/2014 CCPR - May 19, 2014 16
http://www.cpc.unc.edu/projects/addhealth/data/restricteduse/security
National Center for Health Statistics -
example
5/19/2014 CCPR - May 19, 2014 17
http://www.cdc.gov/rdc/
General Social Survey - example
5/19/2014 CCPR - May 19, 2014 18
http://publicdata.norc.org:41000/gss/documents//OTHR/ObtainingGSSSensitiveDataFiles.pdf
Issues affecting access
• Changes to the “Common Rule” – aka “The Federal Policy for the
Protection of Human Subjects” adopted by a number of federal
agencies in 1991.
• Other uses of private data – Biosense
http://www.cdc.gov/biosense/index.html
• Legislation – “Senators Intend to Amend Federal Student Privacy Law”
• Non-academic uses of personal data -- Top U.S. Retailers to Share
Data in Fight on Cybercrime
5/19/2014 CCPR - May 19, 2014 19
How can the Data Archive help?
• Review data and documentation to be
deposited
• Advise on:
– Data protection plan
– Data management plan
– Apply for restricted data access
– Identify appropriate UCLA administrators to
handle agreements
5/19/2014 CCPR - May 19, 2014 20
Contact Us
• Social Sciences Data Archive
• 1120-H Rolfe Hall
• libbie@ucla.edu
• 310-825-0716
5/19/2014 CCPR - May 19, 2014 21

More Related Content

What's hot

Confidential data management_key_concepts
Confidential data management_key_conceptsConfidential data management_key_concepts
Confidential data management_key_conceptsMicah Altman
 
CINECA webinar slides: Making cohort data FAIR
CINECA webinar slides: Making cohort data FAIRCINECA webinar slides: Making cohort data FAIR
CINECA webinar slides: Making cohort data FAIRCINECAProject
 
Guidelines for OSTP Data Access Plans
Guidelines for OSTP Data Access PlansGuidelines for OSTP Data Access Plans
Guidelines for OSTP Data Access PlansICPSR
 
Understanding ICPSR - An Orientation and Tours of ICPSR Data Services and Edu...
Understanding ICPSR - An Orientation and Tours of ICPSR Data Services and Edu...Understanding ICPSR - An Orientation and Tours of ICPSR Data Services and Edu...
Understanding ICPSR - An Orientation and Tours of ICPSR Data Services and Edu...ICPSR
 
CINECA webinar slides: Open science through fair health data networks dream o...
CINECA webinar slides: Open science through fair health data networks dream o...CINECA webinar slides: Open science through fair health data networks dream o...
CINECA webinar slides: Open science through fair health data networks dream o...CINECAProject
 
The DataTags System: Sharing Sensitive Data with Confidence
The DataTags System: Sharing Sensitive Data with ConfidenceThe DataTags System: Sharing Sensitive Data with Confidence
The DataTags System: Sharing Sensitive Data with ConfidenceMerce Crosas
 
AUTHORIZATION FRAMEWORK FOR MEDICAL DATA
AUTHORIZATION FRAMEWORK FOR MEDICAL DATA AUTHORIZATION FRAMEWORK FOR MEDICAL DATA
AUTHORIZATION FRAMEWORK FOR MEDICAL DATA ijmnct
 
RDAP 16: DMPs and Public Access: An NIH Perspective (Panel 5, DMPs and Public...
RDAP 16: DMPs and Public Access: An NIH Perspective (Panel 5, DMPs and Public...RDAP 16: DMPs and Public Access: An NIH Perspective (Panel 5, DMPs and Public...
RDAP 16: DMPs and Public Access: An NIH Perspective (Panel 5, DMPs and Public...ASIS&T
 
dkNET Introductory Webinar 05/10/2017
dkNET Introductory Webinar 05/10/2017dkNET Introductory Webinar 05/10/2017
dkNET Introductory Webinar 05/10/2017dkNET
 
Open Science Globally: Some Developments/Dr Simon Hodson
Open Science Globally: Some Developments/Dr Simon HodsonOpen Science Globally: Some Developments/Dr Simon Hodson
Open Science Globally: Some Developments/Dr Simon HodsonAfrican Open Science Platform
 
Digital transformation to enable a FAIR approach for health data science
Digital transformation to enable a FAIR approach for health data scienceDigital transformation to enable a FAIR approach for health data science
Digital transformation to enable a FAIR approach for health data scienceVarsha Khodiyar
 
Privacy in Research Data Managemnt - Use Cases
Privacy in Research Data Managemnt - Use CasesPrivacy in Research Data Managemnt - Use Cases
Privacy in Research Data Managemnt - Use CasesMicah Altman
 
Dataverse, Cloud Dataverse, and DataTags
Dataverse, Cloud Dataverse, and DataTagsDataverse, Cloud Dataverse, and DataTags
Dataverse, Cloud Dataverse, and DataTagsMerce Crosas
 
2013 ICPSR Data Services
2013 ICPSR Data Services2013 ICPSR Data Services
2013 ICPSR Data ServicesICPSR
 
You down with dmp yeah you know me!
You down with dmp  yeah you know me!You down with dmp  yeah you know me!
You down with dmp yeah you know me!Renaine Julian
 
dkNET Webinar: FAIR Data & Software in the Research Life Cycle 01/22/2021
dkNET Webinar: FAIR Data & Software in the Research Life Cycle 01/22/2021dkNET Webinar: FAIR Data & Software in the Research Life Cycle 01/22/2021
dkNET Webinar: FAIR Data & Software in the Research Life Cycle 01/22/2021dkNET
 

What's hot (20)

Confidential data management_key_concepts
Confidential data management_key_conceptsConfidential data management_key_concepts
Confidential data management_key_concepts
 
CINECA webinar slides: Making cohort data FAIR
CINECA webinar slides: Making cohort data FAIRCINECA webinar slides: Making cohort data FAIR
CINECA webinar slides: Making cohort data FAIR
 
Firewalls
FirewallsFirewalls
Firewalls
 
Guidelines for OSTP Data Access Plans
Guidelines for OSTP Data Access PlansGuidelines for OSTP Data Access Plans
Guidelines for OSTP Data Access Plans
 
Understanding ICPSR - An Orientation and Tours of ICPSR Data Services and Edu...
Understanding ICPSR - An Orientation and Tours of ICPSR Data Services and Edu...Understanding ICPSR - An Orientation and Tours of ICPSR Data Services and Edu...
Understanding ICPSR - An Orientation and Tours of ICPSR Data Services and Edu...
 
Shareable by Design: Making Better Use of your Research
Shareable by Design: Making Better Use of your ResearchShareable by Design: Making Better Use of your Research
Shareable by Design: Making Better Use of your Research
 
CINECA webinar slides: Open science through fair health data networks dream o...
CINECA webinar slides: Open science through fair health data networks dream o...CINECA webinar slides: Open science through fair health data networks dream o...
CINECA webinar slides: Open science through fair health data networks dream o...
 
Timo Minssen, "Big Data and Intellectual Property Rights in the Health and Li...
Timo Minssen, "Big Data and Intellectual Property Rights in the Health and Li...Timo Minssen, "Big Data and Intellectual Property Rights in the Health and Li...
Timo Minssen, "Big Data and Intellectual Property Rights in the Health and Li...
 
The DataTags System: Sharing Sensitive Data with Confidence
The DataTags System: Sharing Sensitive Data with ConfidenceThe DataTags System: Sharing Sensitive Data with Confidence
The DataTags System: Sharing Sensitive Data with Confidence
 
AUTHORIZATION FRAMEWORK FOR MEDICAL DATA
AUTHORIZATION FRAMEWORK FOR MEDICAL DATA AUTHORIZATION FRAMEWORK FOR MEDICAL DATA
AUTHORIZATION FRAMEWORK FOR MEDICAL DATA
 
RDAP 16: DMPs and Public Access: An NIH Perspective (Panel 5, DMPs and Public...
RDAP 16: DMPs and Public Access: An NIH Perspective (Panel 5, DMPs and Public...RDAP 16: DMPs and Public Access: An NIH Perspective (Panel 5, DMPs and Public...
RDAP 16: DMPs and Public Access: An NIH Perspective (Panel 5, DMPs and Public...
 
dkNET Introductory Webinar 05/10/2017
dkNET Introductory Webinar 05/10/2017dkNET Introductory Webinar 05/10/2017
dkNET Introductory Webinar 05/10/2017
 
Open Science Globally: Some Developments/Dr Simon Hodson
Open Science Globally: Some Developments/Dr Simon HodsonOpen Science Globally: Some Developments/Dr Simon Hodson
Open Science Globally: Some Developments/Dr Simon Hodson
 
Digital transformation to enable a FAIR approach for health data science
Digital transformation to enable a FAIR approach for health data scienceDigital transformation to enable a FAIR approach for health data science
Digital transformation to enable a FAIR approach for health data science
 
Privacy in Research Data Managemnt - Use Cases
Privacy in Research Data Managemnt - Use CasesPrivacy in Research Data Managemnt - Use Cases
Privacy in Research Data Managemnt - Use Cases
 
Preparing Data for Sharing: The FAIR Principles
Preparing Data for Sharing: The FAIR PrinciplesPreparing Data for Sharing: The FAIR Principles
Preparing Data for Sharing: The FAIR Principles
 
Dataverse, Cloud Dataverse, and DataTags
Dataverse, Cloud Dataverse, and DataTagsDataverse, Cloud Dataverse, and DataTags
Dataverse, Cloud Dataverse, and DataTags
 
2013 ICPSR Data Services
2013 ICPSR Data Services2013 ICPSR Data Services
2013 ICPSR Data Services
 
You down with dmp yeah you know me!
You down with dmp  yeah you know me!You down with dmp  yeah you know me!
You down with dmp yeah you know me!
 
dkNET Webinar: FAIR Data & Software in the Research Life Cycle 01/22/2021
dkNET Webinar: FAIR Data & Software in the Research Life Cycle 01/22/2021dkNET Webinar: FAIR Data & Software in the Research Life Cycle 01/22/2021
dkNET Webinar: FAIR Data & Software in the Research Life Cycle 01/22/2021
 

Viewers also liked

NSMNSS report on research ethics in social media research by Janet Salmons
NSMNSS report on research ethics in social media research by Janet SalmonsNSMNSS report on research ethics in social media research by Janet Salmons
NSMNSS report on research ethics in social media research by Janet SalmonsKandy Woodfield
 
Ethics Approval in Research Sample
Ethics Approval in Research SampleEthics Approval in Research Sample
Ethics Approval in Research Sampledissertationprime
 
Research ethics & scientific misconduct
Research ethics & scientific misconductResearch ethics & scientific misconduct
Research ethics & scientific misconductDr Ghaiath Hussein
 
Research methodology ethical issues in research an assignment
Research methodology  ethical issues in research   an assignmentResearch methodology  ethical issues in research   an assignment
Research methodology ethical issues in research an assignmentMaiJoy
 
Parts of a Research Paper
Parts of a Research PaperParts of a Research Paper
Parts of a Research PaperDraizelle Sexon
 
Ethics in research ppt by jiya
Ethics in research ppt by jiyaEthics in research ppt by jiya
Ethics in research ppt by jiyapanthanalil
 
Ethics In Research
Ethics In ResearchEthics In Research
Ethics In ResearchGrant Heller
 
The thesis and its parts
The thesis and its partsThe thesis and its parts
The thesis and its partsDraizelle Sexon
 
Report Writing - Conclusions & Recommendations sections
Report Writing - Conclusions & Recommendations sectionsReport Writing - Conclusions & Recommendations sections
Report Writing - Conclusions & Recommendations sectionsSherrie Lee
 

Viewers also liked (10)

AS Social Surveys
AS Social SurveysAS Social Surveys
AS Social Surveys
 
NSMNSS report on research ethics in social media research by Janet Salmons
NSMNSS report on research ethics in social media research by Janet SalmonsNSMNSS report on research ethics in social media research by Janet Salmons
NSMNSS report on research ethics in social media research by Janet Salmons
 
Ethics Approval in Research Sample
Ethics Approval in Research SampleEthics Approval in Research Sample
Ethics Approval in Research Sample
 
Research ethics & scientific misconduct
Research ethics & scientific misconductResearch ethics & scientific misconduct
Research ethics & scientific misconduct
 
Research methodology ethical issues in research an assignment
Research methodology  ethical issues in research   an assignmentResearch methodology  ethical issues in research   an assignment
Research methodology ethical issues in research an assignment
 
Parts of a Research Paper
Parts of a Research PaperParts of a Research Paper
Parts of a Research Paper
 
Ethics in research ppt by jiya
Ethics in research ppt by jiyaEthics in research ppt by jiya
Ethics in research ppt by jiya
 
Ethics In Research
Ethics In ResearchEthics In Research
Ethics In Research
 
The thesis and its parts
The thesis and its partsThe thesis and its parts
The thesis and its parts
 
Report Writing - Conclusions & Recommendations sections
Report Writing - Conclusions & Recommendations sectionsReport Writing - Conclusions & Recommendations sections
Report Writing - Conclusions & Recommendations sections
 

Similar to Research Ethics and Use of Restricted Access Data

Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...ICPSR
 
Sharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRSharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRARDC
 
Meeting Federal Research Requirements
Meeting Federal Research RequirementsMeeting Federal Research Requirements
Meeting Federal Research RequirementsICPSR
 
Changes in National Ethics Policy for Managing and Sharing Human Research Data
Changes in National Ethics Policy for Managing and Sharing Human Research DataChanges in National Ethics Policy for Managing and Sharing Human Research Data
Changes in National Ethics Policy for Managing and Sharing Human Research DataARDC
 
Research Transparency in the Social Sciences: DA-RT
Research Transparency in the Social Sciences: DA-RTResearch Transparency in the Social Sciences: DA-RT
Research Transparency in the Social Sciences: DA-RTARDC
 
NIH Data Sharing Plan Workshop - Slides
NIH Data Sharing Plan Workshop - SlidesNIH Data Sharing Plan Workshop - Slides
NIH Data Sharing Plan Workshop - SlidesIUPUI
 
DataONE Education Module 02: Data Sharing
DataONE Education Module 02: Data SharingDataONE Education Module 02: Data Sharing
DataONE Education Module 02: Data SharingDataONE
 
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...Kristin Briney
 
Overview of Emerging Requirements for Data Management of Federally Funded Res...
Overview of Emerging Requirements for Data Management of Federally Funded Res...Overview of Emerging Requirements for Data Management of Federally Funded Res...
Overview of Emerging Requirements for Data Management of Federally Funded Res...Richard Huffine
 
HISI conference 2016 - Ros Moran HRB - November 16th 2016
HISI conference 2016 - Ros Moran HRB - November 16th 2016HISI conference 2016 - Ros Moran HRB - November 16th 2016
HISI conference 2016 - Ros Moran HRB - November 16th 2016ipposi
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Glenn Villanueva
 
Accessing data for research: data publishing pathways and the Five Safes
Accessing data for research: data publishing pathways and the Five SafesAccessing data for research: data publishing pathways and the Five Safes
Accessing data for research: data publishing pathways and the Five SafesLouise Corti
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Project
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
DMP health sciences
DMP health sciencesDMP health sciences
DMP health sciencesSarah Jones
 
Data Ethics Framework 2.pptx
Data Ethics Framework 2.pptxData Ethics Framework 2.pptx
Data Ethics Framework 2.pptxUgurKaplancali
 
Data Management, Research Integrity and Ethics
Data Management, Research Integrity and EthicsData Management, Research Integrity and Ethics
Data Management, Research Integrity and EthicsARDC
 
Sourcing health data for open-access collection
Sourcing health data for open-access collectionSourcing health data for open-access collection
Sourcing health data for open-access collectionGreg D'Arcy
 
Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...Jisc
 

Similar to Research Ethics and Use of Restricted Access Data (20)

Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
 
Sharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRSharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSR
 
Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
 
Meeting Federal Research Requirements
Meeting Federal Research RequirementsMeeting Federal Research Requirements
Meeting Federal Research Requirements
 
Changes in National Ethics Policy for Managing and Sharing Human Research Data
Changes in National Ethics Policy for Managing and Sharing Human Research DataChanges in National Ethics Policy for Managing and Sharing Human Research Data
Changes in National Ethics Policy for Managing and Sharing Human Research Data
 
Research Transparency in the Social Sciences: DA-RT
Research Transparency in the Social Sciences: DA-RTResearch Transparency in the Social Sciences: DA-RT
Research Transparency in the Social Sciences: DA-RT
 
NIH Data Sharing Plan Workshop - Slides
NIH Data Sharing Plan Workshop - SlidesNIH Data Sharing Plan Workshop - Slides
NIH Data Sharing Plan Workshop - Slides
 
DataONE Education Module 02: Data Sharing
DataONE Education Module 02: Data SharingDataONE Education Module 02: Data Sharing
DataONE Education Module 02: Data Sharing
 
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...
 
Overview of Emerging Requirements for Data Management of Federally Funded Res...
Overview of Emerging Requirements for Data Management of Federally Funded Res...Overview of Emerging Requirements for Data Management of Federally Funded Res...
Overview of Emerging Requirements for Data Management of Federally Funded Res...
 
HISI conference 2016 - Ros Moran HRB - November 16th 2016
HISI conference 2016 - Ros Moran HRB - November 16th 2016HISI conference 2016 - Ros Moran HRB - November 16th 2016
HISI conference 2016 - Ros Moran HRB - November 16th 2016
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
 
Accessing data for research: data publishing pathways and the Five Safes
Accessing data for research: data publishing pathways and the Five SafesAccessing data for research: data publishing pathways and the Five Safes
Accessing data for research: data publishing pathways and the Five Safes
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
DMP health sciences
DMP health sciencesDMP health sciences
DMP health sciences
 
Data Ethics Framework 2.pptx
Data Ethics Framework 2.pptxData Ethics Framework 2.pptx
Data Ethics Framework 2.pptx
 
Data Management, Research Integrity and Ethics
Data Management, Research Integrity and EthicsData Management, Research Integrity and Ethics
Data Management, Research Integrity and Ethics
 
Sourcing health data for open-access collection
Sourcing health data for open-access collectionSourcing health data for open-access collection
Sourcing health data for open-access collection
 
Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...
 

Recently uploaded

Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur fĂĽr Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur fĂĽr Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur fĂĽr Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur fĂĽr Container und Kubern...NETWAYS
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
WhatsApp đź“ž 9892124323 âś…Call Girls In Juhu ( Mumbai )
WhatsApp đź“ž 9892124323 âś…Call Girls In Juhu ( Mumbai )WhatsApp đź“ž 9892124323 âś…Call Girls In Juhu ( Mumbai )
WhatsApp đź“ž 9892124323 âś…Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 

Recently uploaded (20)

Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur fĂĽr Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur fĂĽr Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur fĂĽr Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur fĂĽr Container und Kubern...
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
WhatsApp đź“ž 9892124323 âś…Call Girls In Juhu ( Mumbai )
WhatsApp đź“ž 9892124323 âś…Call Girls In Juhu ( Mumbai )WhatsApp đź“ž 9892124323 âś…Call Girls In Juhu ( Mumbai )
WhatsApp đź“ž 9892124323 âś…Call Girls In Juhu ( Mumbai )
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 

Research Ethics and Use of Restricted Access Data

  • 1. Research Using Restricted Data: Ethics and Access Issues California Center for Population Research May 19, 2014
  • 2. Goals for today’s presentation • Discuss basic professional standards for researchers • Discuss ways to manage data to protect privacy and confidentiality • Using restricted-access data 5/19/2014 CCPR - May 19, 2014 2 Thanks to Shira Safir, UCLA School of Public Health for many of the slides
  • 3. Professional Standards for Researchers • "For individuals, research integrity is an aspect of moral character and experience. It involves above all a commitment to intellectual honesty and personal responsibility for one’s actions and to a range of practices that characterize responsible research conduct." (Taken from the National Academies of Sciences Report) Source: Slide shared by Shira Shafir, UCLA School of Public Health 5/19/2014 CCPR - May 19, 2014 3
  • 4. Professional Standards for Researchers • The best ethical practices produce the best research. • These practices include: – Proficiency and fairness in peer review; – Accuracy and fairness in representing contributions to research proposals and reports; – Collegiality in interactions, communications and sharing of resources; – Honesty and fairness in proposing, performing, and reporting research; – Disclosure of conflicts of interest; – Protection of human subjects in the conduct of research; Source: Slide shared by Shira Shafir, UCLA School of Public Health 5/19/2014 CCPR - May 19, 2014 4
  • 5. Collaborative Research • Today, advances in the research are rarely made by single investigators. • Typically, collaboration allows the investigative team to ask powerful new questions, the answers to which would be otherwise unattainable. Source: Slide shared by Shira Shafir, UCLA School of Public Health 5/19/2014 CCPR - May 19, 2014 5
  • 6. Conflicts of Interest • “Conflict of Interest” is a legal term that encompasses a wide spectrum of behaviors or actions involving personal gain or financial interest. • A conflict of interest exists when an individual exploits, or appears to exploit, his or her position for personal gain or for the profit of a member of his or her immediate family or household. Source: Slide shared by Shira Shafir, UCLA School of Public Health 5/19/2014 CCPR - May 19, 2014 6
  • 7. Misconduct in Research • Errors involving deception comprise the most serious category of errors. • These types of errors involve: – Violate privacy and confidentiality of research subjects – Making up data or results (fabrication) – Changing or misreporting data or results (falsification) – Using the ideas or words of another without giving appropriate credit (plagiarism) • When in doubt, the government provides 26 excellent guidelines: http://ori.hhs.gov/plagiarism-0 Source: Slide shared by Shira Shafir, UCLA School of Public Health 5/19/2014 CCPR - May 19, 2014 7
  • 8. Manage data to protect respondents • Assess disclosure risk: “A disclosure risk occurs if an unacceptably narrow estimation of a respondent’s confidential information is possible or if exact disclosure is possible with a high level of confidence.” http://neon.vb.cbs.nl/casc/Glossary.htm • Procedures – Informed consent – Remove identifiers – Data manipulation – Restrict access 5/19/2014 CCPR - May 19, 2014 8
  • 9. Informed consent • “Informed consent is a process of communication between a subject and researcher to enable the person to decide voluntarily whether to participate in a study. Human subjects involved in a project must participate willingly and be adequately informed about the research. The informed consent must include a statement describing how the confidentiality of subject records will be maintained. However, it also is important that informed consent be written in a way that does not unduly limit an investigator's discretion to share data with the research community.” 5/19/2014 CCPR - May 19, 2014 9 Source: ICPSR web site on Confidentiality
  • 10. Remove identifiers • Direct identifiers. These are variables that point explicitly to particular individuals or units. Examples include: – Names, Addresses, including ZIP and other postal codes – Telephone numbers, including area codes – Social Security numbers – Other linkable numbers such as driver's license numbers, certification numbers, etc. • Indirect identifiers. These are variables that can be problematic as they may be used together or in conjunction with other information to identify individual respondents. Examples include: – Detailed geographic information (e.g., state, county, province, or census tract of residence) – Organizations to which the respondent belongs – Educational institutions (from which the respondent graduated and year of graduation) – Detailed occupational titles – Place where respondent grew up – Exact dates of events (birth, death, marriage, divorce) – Detailed income – Offices or posts held by respondent 5/19/2014 CCPR - May 19, 2014 10 Source: ICPSR web site on Confidentiality
  • 11. Data Manipulation • Recoding -- can include converting dates to time intervals, exact dates of birth to age groups, detailed geographic codes to broader levels of geography, and income to income ranges or categories. • Removal -- eliminating the variable from the dataset entirely. • Top-coding -- restricting the upper range of a variable. • Collapsing and/or combining variables -- combining values of a single variable or merging data recorded in two or more variables into a new summary variable. • Sampling -- rather than providing all of the original data, releasing a random sample of sufficient size to yield reasonable inferences. • Swapping -- matching unique cases on the indirect identifier, then exchanging the values of key variables between the cases. This retains the analytic utility and covariate structure of the dataset while protecting subject confidentiality. Swapping is a service that archives may offer to limit disclosure risk. (For more in-depth discussion of this technique, see O’Rourke, 2003 and 2006.) • Disturbing -- adding random variation or stochastic error to the variable. This retains the statistical properties between the variable and its covariates, while preventing someone from using the variable as a means for linking records.5/19/2014 11 Source: ICPSR Guide to Social Science Data Preparation and Archiving
  • 12. Restrict Access • “Restricted-use data are distributed in cases when removing potentially identifying information would significantly impair the analytic potential of the data. In other cases, data contain highly sensitive personal information and cannot be shared as a public- use file. In these cases, ICPSR provides access to a restricted-use version that retains the confidential data but requires controlled conditions for accessing them.” 5/19/2014 CCPR - May 19, 2014 12 Source: ICPSR Web site on confidentiality
  • 13. Ways to restrict access • ICPSR has established several mechanisms by which restricted-use data can be distributed: • Secure online analysis (publicly available): This option provides immediate access to restricted-use data behind an analytic interface that has programmable disclosure protection. • Secure online analysis (password protected): This option provides analysis of restricted-use data behind an interface with programmable disclosure protection for selected users. With this option, users may have to submit an application to access the data, or they may be part of a defined group, such as a research group. • Restricted Use Data Agreement: With this option, users submit a request to access the data, and after approval, download the data using a single-use password or receive the data on CD-ROM. • Virtual Data Enclave (VDE): The VDE is a secure, online environment via which approved users analyze restricted-use data using several software options available within the VDE, such as SAS, Stata, and SUDAAN. • Physical Data Enclave: For highly restricted data, ICPSR has a physical enclave, which requires that approved users be on site at ICPSR to use the data. Data use in the physical data enclave is monitored by ICPSR staff. 5/19/2014 CCPR - May 19, 2014 13 Source: ICPSR Web site on confidentiality
  • 14. Apply for Restricted Data Access • Application for Restricted-Use Data. This includes information about the Investigator and the research project that requires access to the restricted-use data. The application may require the current CVs of all researchers who will be working on the project. • Confidential Data Security Plan. The fundamental goals of this plan are to ensure that the restricted-use data are securely stored at the institution and accessible only to the people listed in the request. For some data security plans, questions are presented in such a way for the Investigator to describe in detail how this responsibility will be met. The questions and answers combined comprise the confidential data security plan. For some data security plans, static terms are presented to which the requester must agree. • Restricted Data Use Agreement. This is a legal agreement between the University of Michigan and the Investigator's institution specifying the terms of the use of the restricted-use data. • Supplemental Agreement with Research Staff Form. This identifies every person other than the Investigator who will have access to the restricted-use data. New research staff added in the course of a project must be added to and sign this form before they can access the data. • Pledge of Confidentiality. The Investigator and all research staff must sign this pledge before they can access the data. 5/19/2014 CCPR - May 19, 2014 14 Source: ICPSR web site on restricted data access
  • 15. Information needed to apply • Name, department, and title of the Investigator • Description of the proposed research that supports need to access restricted-use data • Information on data formats needed and data- storage technology • Approval or exemption for the research project from the Institutional Review Board of the Investigator's organization (for some restricted-use data) • A Restricted Data Use Agreement signed by the Investigator and a legal representative from the Investigator's institution • Other required information as specified in the Restricted Data Use Agreement 5/19/2014 CCPR - May 19, 2014 15 Source: ICPSR web site on restricted data access
  • 16. Add Health example 5/19/2014 CCPR - May 19, 2014 16 http://www.cpc.unc.edu/projects/addhealth/data/restricteduse/security
  • 17. National Center for Health Statistics - example 5/19/2014 CCPR - May 19, 2014 17 http://www.cdc.gov/rdc/
  • 18. General Social Survey - example 5/19/2014 CCPR - May 19, 2014 18 http://publicdata.norc.org:41000/gss/documents//OTHR/ObtainingGSSSensitiveDataFiles.pdf
  • 19. Issues affecting access • Changes to the “Common Rule” – aka “The Federal Policy for the Protection of Human Subjects” adopted by a number of federal agencies in 1991. • Other uses of private data – Biosense http://www.cdc.gov/biosense/index.html • Legislation – “Senators Intend to Amend Federal Student Privacy Law” • Non-academic uses of personal data -- Top U.S. Retailers to Share Data in Fight on Cybercrime 5/19/2014 CCPR - May 19, 2014 19
  • 20. How can the Data Archive help? • Review data and documentation to be deposited • Advise on: – Data protection plan – Data management plan – Apply for restricted data access – Identify appropriate UCLA administrators to handle agreements 5/19/2014 CCPR - May 19, 2014 20
  • 21. Contact Us • Social Sciences Data Archive • 1120-H Rolfe Hall • libbie@ucla.edu • 310-825-0716 5/19/2014 CCPR - May 19, 2014 21