SlideShare a Scribd company logo
1 of 32
Ethics and Integrity
           in Data Use and
             Management
                       John E. Sidle, M.D., M.S.
                            May 10, 2010
This module was recorded at the health informatics-training course – data management series offered by the Regional East African
Centre for Health Informatics (REACH-Informatics) in Eldoret, Kenya. Funding was made possible by NIH’s Fogarty Center and a
                               (REACH-Informatics)
grant from the Rockefeller Center.   The training was held at the Academic Model Providing Access to Healthcare (AMPATH), a
                                                                                                                    (AMPATH),
USAID-funded program, supported by the Regenstrief Institute at Indiana University. The modules were created in collaboration with
                                                                        University.
the School of Informatics at IUPUI.
                             IUPUI.



                        Content licensed under Creative Commons Attribution-Share Alike 3.0 Unported
Objectives
Examine a brief history of ethics in research
and data management
Discuss pertinent principles of ethics in data
management
Discuss the concept of “data integrity” and
ethics in data management
Discuss applications for data management
personnel in ethical use of data
Outline
Definitions
Ethical Principles in Bioethics
Guidelines and Regulations
Data Integrity
Applications for ethics and maintenance of
data integrity
Definitions

   In·teg·ri·ty n. 1. Strict adherence to a standard of value
   or conduct. 2. Personal honesty and independence. 3.
   Completeness: unity 4.Soundness

   Eth·ic n. 1. A principle of right or good conduct. 2. A
   system of moral values. 3. ethics (sing. In number). The
   branch of philosophy dealing with the rules of right
   conduct.

Source: Webster’s II New Riverside Dictionary, Based on the Webster’s II New College
   Dictionary (1996)
Ethical Principles
Beneficence
   Minimize harm
   Maximize Benefits
Respect of Persons (Autonomy)
   Informed voluntary consent
   Vulnerable subjects must be protected
Justice
   Equity in distributing risks and benefits between
    populations
   “fairness” in dealing with research participants
   Equity between institutions and research partners
Clinical Data vs. Research Data:
     Are the Ethics Different?

Privacy and Confidentiality
Informed Consent vs. Implied Consent
Data Integrity / Data Quality
Data Security and Storage
Ethical Guidelines (for Research)
Declaration of Helsinki
   ethical standard used by the International Committee
    of Medical Journal Editors
   guidelines govern all medical research
CIOMS Guidelines
   Council for International Organizations of Medical
    Sciences
   developed guidelines in collaboration with WHO
Belmont Report
National Guidelines (Kenya)
Regulations
US: Code of Federal Regulations Title 45,
Part 46 (45CFR46)
FDA– 21CFR50 and 56
NIH--“he who has the gold makes the rules”
HIPAA—related both to clinical records and
use of subject data in research
45CFR46
US Code of Federal Regulations Title 45, Part
46 (45CFR46)
   Human Subjects Protections
   IRB requirements
   Protection of Vulnerable Subjects

Human subject
   Human subject means a living individual about whom
    an investigator (whether professional or student)
    conducting research obtains:
     (1) data through intervention or interaction with the
    individual, or
    (2) identifiable private information.
Privacy/Confidentiality
Applies to both clinical and research data

Major concern for patients when it comes
to electronic records and data

Must be safeguarded by all members on
the team
HIPAA
Health Insurance Portability and
Accountability Act of 1996 (HIPAA), HHS
issued regulations entitled Standards for
Privacy of Individually Identifiable Health
Information.
For most covered entities, compliance with
these regulations, known as the Privacy
Rule, was required by April14, 2003.
HIPAA and Privacy Rule
The Privacy Rule, at 45 CFR parts 160 and 164,
establishes a category of health information,
defined as protected health information (PHI),
which a covered entity may only use or disclose
to others in certain circumstances and under
certain conditions.
Usually requires an individual to provide signed
permission, known as an Authorization before a
covered entity can use or disclose the
individual's PHI for research purposes.
Need for authorization may be waived in some
instances by an IRB (and a Privacy Board)
Individually Identifiable Information
 and Protected Health Information
 Includes any subset of health information, including
 demographic information, that identifies the individual (or
 there is a reasonable basis to believe that the information
 can be used to identify the individual).
      1. Name
      2. All elements of dates except Year.
      3. SSN
      4. Driver's License Number
      5. Geographic subdivisions smaller than a State.
      6. URL's and IP's
      7. Vehicle Identifiers including VIN and License #
      8. Phone numbers
PHI
Individually identifiable information becomes PHI when it
is created or received by a covered entity:
   US health plans
   US health care clearinghouses
   US health providers that transmit electronic health information
A researcher is not a covered entity unless he/she is
also a provider within a covered entity.
Research is also governed by HIPAA if data is obtained
from a covered entity.
IRB may on occasion waive the HIPAA restrictions on
use of PHI
How does all this translate to
            practice?
Electronic health information (clinical or research)
   Can improve quality and safety of medical care
    (beneficence)
   Is key to showing outcomes in research on health and
    health practices (beneficence)
   Confidentiality and Privacy can be lost (breach of
    autonomy and beneficence)
   Can be used without a patient’s knowledge or consent
    (breach of autonomy)
   Might exclude some populations (breach of justice)
Data Integrity
The assurance that data is accurate, correct and
valid.
Accuracy and consistency of stored data,
indicated by an absence of any alteration in data
between two updates of a data record. Data
integrity is imposed within a database at its
design stage through the use of standard rules
and procedures, and is maintained through the
use of error checking and validation routines.
Exact duplication of the sent data at the
receiving end, achieved through the use of error
checking and correcting protocols.
Assurance that the data are unchanged from
creation to reception.
Data Integrity (2)
Process to maintain data integrity depends
on:
   Collection (accurate representation)
   Data transfer (accurate recording and transfer
    of data)
   Storage and Security (preventing loss of data)
   Sharing of Data
   Use of data (analysis)
Data Integrity (3)
Fabrication and Falsification of data are one of
the most serious challenges to data integrity
Human error also contributes to loss of data
integrity
Concern about research misconduct was a
primary motivation for a 1990 conference on
data management sponsored by the US
Department of Health and Human Services.
Conference summarized the many ways in
which the conduct of research depends on
responsible data management.
Data Integrity (4)
Responsible research begins with
experimental design and protocol approval
It involves recordkeeping in a way that
ensures accuracy and avoids bias
It guides criteria for including and
excluding data from statistical analyses
It entails responsibility for collection, use,
and sharing of data.
Data Integrity (5)
Everyone with a role in research has a
responsibility to ensure the integrity of the data.
The ultimate responsibility belongs to the
principal investigator, but the central importance
of data to all research means that this
responsibility extends to anyone who:
   helps in planning the study
    collecting the data
    analyzing or interpreting the research findings
    publishing the results of the study
    maintaining the research records.
Data Collection and Integrity
Because data collection can be repetitious, time-
consuming, and tedious there is a temptation to
underestimate its importance.
Those responsible for collecting data must be
adequately trained and motivated
They should employ methods that limit or
eliminate the effect of bias
They should keep records of what was done by
whom and when
Analysis and Selection of Data
The use of statistical methods varies widely
among research disciplines and also clinical
programs (reporting)
It is a laudable ideal to analyze and report all
data
Because it is not possible to report everything
that has been done, researchers must make
decisions about which studies, data points, and
methods of analysis to present.
Analysis and Selection of Data (2)
Must critically evaluate the reasons for
inclusion or exclusion of data, the
measures taken to avoid bias, and
possible ways in which bias may
nonetheless influence data selection
Must clearly document how the data were
obtained, selected, and analyzed--
especially if the methods are unusual or
potentially controversial
Retention of Data
What should be retained?
It may be impractical to store
extraordinarily large volumes of primary
data.
At minimum, enough data should be
retained to reconstruct what was done.
How long should clinical records be
retained?
Sharing of Data
This is considered an important part of
responsible research.
De-identified data should be shared so
that others can verify your conclusions or
analysis
Sharing of personal patient information is
NOT a good practice as noted in Privacy
sections earlier.
Data Security
Limiting Access
   Locked Paper Records Offices
   Limiting access to Paper or Electronic records
    to appropriate personnel
   Password Protection of electronic records
   Defined privileges for electronic data users
   Firewalls to prevent outside access
Regular Backups and proper archiving
Ownership of Data
Who owns the data that is generated?
   Patient?
   Institution?
   Funder?
   Investigator?
   Publisher?
Ethics in Publication—General
  guidelines pertinent to data
Research should strive to answer specific
questions—not just collect or mine data
Statistical issues (sample size) are an
important part of design to ensure that the
research data is likely to answer the
question
IRB approval is required when using
human subjects, human tissues, or
medical records
Publication Ethics and Data
   Management/Data Analysis

Data should be appropriately analyzed

Inappropriate analysis is not necessarily
ethical misconduct

Fabrication or falsification of data is
always ethical misconduct
Publication Ethics and Data
     Management/Analysis
Sources and methods of obtaining and
processing data should be disclosed
Data exclusions should be explained in full
Methods used to analyze data should be
explained in detail
Post hoc analysis of subgroups is
acceptable as long as this is disclosed
Data Bias should be discussed in all
publications of data or analysis
Questions??
THE WORK IS PROVIDED UNDER THE TERMS OF THIS
CREATIVE COMMONS PUBLIC LICENSE ("CCPL" OR "LICENSE"). THE
WORK IS PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE
LAW. ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER
       THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED.

More Related Content

What's hot

Medical Statistics Part-I:Descriptive statistics
Medical Statistics Part-I:Descriptive statisticsMedical Statistics Part-I:Descriptive statistics
Medical Statistics Part-I:Descriptive statisticsRamachandra Barik
 
Measures of association
Measures of associationMeasures of association
Measures of associationIAU Dent
 
Hypothesis and Hypothesis Testing
Hypothesis and Hypothesis TestingHypothesis and Hypothesis Testing
Hypothesis and Hypothesis TestingNaibin
 
Epidemiolgy and biostatistics notes
Epidemiolgy and biostatistics notesEpidemiolgy and biostatistics notes
Epidemiolgy and biostatistics notesCharles Ntwale
 
Basic Biostatistics and Data managment
Basic Biostatistics and Data managment Basic Biostatistics and Data managment
Basic Biostatistics and Data managment Tadesse Awoke Ayele
 
3.1 measures of central tendency
3.1 measures of central tendency3.1 measures of central tendency
3.1 measures of central tendencyleblance
 
Statistical tests for categorical data
Statistical tests for categorical dataStatistical tests for categorical data
Statistical tests for categorical dataRizwan S A
 
Epidemiology and preventive veterinary medicine.docx1
Epidemiology and preventive veterinary medicine.docx1Epidemiology and preventive veterinary medicine.docx1
Epidemiology and preventive veterinary medicine.docx1Arjun Chapagain
 
Epidemiological study designs
Epidemiological study designsEpidemiological study designs
Epidemiological study designsIsmail Qamar
 
Normal distribution
Normal distributionNormal distribution
Normal distributionSteve Bishop
 
3.2 measures of variation
3.2 measures of variation3.2 measures of variation
3.2 measures of variationleblance
 
Test of hypothesis
Test of hypothesisTest of hypothesis
Test of hypothesisvikramlawand
 
Descriptive Statistics
Descriptive StatisticsDescriptive Statistics
Descriptive StatisticsBhagya Silva
 

What's hot (20)

Medical Statistics Part-I:Descriptive statistics
Medical Statistics Part-I:Descriptive statisticsMedical Statistics Part-I:Descriptive statistics
Medical Statistics Part-I:Descriptive statistics
 
Measures of association
Measures of associationMeasures of association
Measures of association
 
Hypothesis and Hypothesis Testing
Hypothesis and Hypothesis TestingHypothesis and Hypothesis Testing
Hypothesis and Hypothesis Testing
 
Epidemiolgy and biostatistics notes
Epidemiolgy and biostatistics notesEpidemiolgy and biostatistics notes
Epidemiolgy and biostatistics notes
 
Type of data
Type of dataType of data
Type of data
 
Chi square mahmoud
Chi square mahmoudChi square mahmoud
Chi square mahmoud
 
Variability
VariabilityVariability
Variability
 
Basic Biostatistics and Data managment
Basic Biostatistics and Data managment Basic Biostatistics and Data managment
Basic Biostatistics and Data managment
 
Testing Hypothesis
Testing HypothesisTesting Hypothesis
Testing Hypothesis
 
3.1 measures of central tendency
3.1 measures of central tendency3.1 measures of central tendency
3.1 measures of central tendency
 
Investigation of Epidemic
Investigation of Epidemic  Investigation of Epidemic
Investigation of Epidemic
 
Statistical tests for categorical data
Statistical tests for categorical dataStatistical tests for categorical data
Statistical tests for categorical data
 
Epidemiology and preventive veterinary medicine.docx1
Epidemiology and preventive veterinary medicine.docx1Epidemiology and preventive veterinary medicine.docx1
Epidemiology and preventive veterinary medicine.docx1
 
Epidemiological study designs
Epidemiological study designsEpidemiological study designs
Epidemiological study designs
 
Normal distribution
Normal distributionNormal distribution
Normal distribution
 
Measures of dispersion
Measures of dispersionMeasures of dispersion
Measures of dispersion
 
3.2 measures of variation
3.2 measures of variation3.2 measures of variation
3.2 measures of variation
 
Test of hypothesis
Test of hypothesisTest of hypothesis
Test of hypothesis
 
Chi square test
Chi square testChi square test
Chi square test
 
Descriptive Statistics
Descriptive StatisticsDescriptive Statistics
Descriptive Statistics
 

Viewers also liked

Data colonization
Data colonizationData colonization
Data colonizatione-Marefa
 
Cris consent public
Cris consent publicCris consent public
Cris consent publickclcompbio
 
Social Media, Healthcare and the Law
Social Media, Healthcare and the LawSocial Media, Healthcare and the Law
Social Media, Healthcare and the LawBrian Ahier
 
Ethics, Informatics and Obamacare
Ethics, Informatics and ObamacareEthics, Informatics and Obamacare
Ethics, Informatics and ObamacareBarry Smith
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital HealthMegan Ranney
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingNawanan Theera-Ampornpunt
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Nawanan Theera-Ampornpunt
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextNawanan Theera-Ampornpunt
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingNawanan Theera-Ampornpunt
 
Digital Ethics : Helping your brain to make decisions online
Digital Ethics : Helping your brain to make decisions online Digital Ethics : Helping your brain to make decisions online
Digital Ethics : Helping your brain to make decisions online Year of the X
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsAHMED ZINHOM
 
Eysenbach: Consumer health informatics
Eysenbach: Consumer health informaticsEysenbach: Consumer health informatics
Eysenbach: Consumer health informaticsGunther Eysenbach
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social MediaJanet Johnson
 
Health Informatics
Health InformaticsHealth Informatics
Health InformaticsJulesykora
 

Viewers also liked (20)

Data colonization
Data colonizationData colonization
Data colonization
 
Cris consent public
Cris consent publicCris consent public
Cris consent public
 
anchal
anchalanchal
anchal
 
Social Media, Healthcare and the Law
Social Media, Healthcare and the LawSocial Media, Healthcare and the Law
Social Media, Healthcare and the Law
 
Ethics, Informatics and Obamacare
Ethics, Informatics and ObamacareEthics, Informatics and Obamacare
Ethics, Informatics and Obamacare
 
Mdh ethics in social media pdf
Mdh ethics in social media pdfMdh ethics in social media pdf
Mdh ethics in social media pdf
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital Health
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision Making
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's Context
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision Making
 
Digital Ethics : Helping your brain to make decisions online
Digital Ethics : Helping your brain to make decisions online Digital Ethics : Helping your brain to make decisions online
Digital Ethics : Helping your brain to make decisions online
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informatics
 
Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3
 
Eysenbach: Consumer health informatics
Eysenbach: Consumer health informaticsEysenbach: Consumer health informatics
Eysenbach: Consumer health informatics
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
 
Health Informatics
Health InformaticsHealth Informatics
Health Informatics
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 

Similar to Data Quality: Missing Data (PPT slides)

Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...ARDC
 
International Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docxInternational Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docxtarifarmarie
 
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...ARDC
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsMEASURE Evaluation
 
The Learning Health System: Thinking and Acting Across Scales
The Learning Health System: Thinking and Acting Across ScalesThe Learning Health System: Thinking and Acting Across Scales
The Learning Health System: Thinking and Acting Across ScalesPhilip Payne
 
Confidentiality manager training mha 690
Confidentiality manager training mha 690Confidentiality manager training mha 690
Confidentiality manager training mha 690nikki1919
 
Discussion #1 for Week 5RubricsWeekly Participation.docx
Discussion #1 for Week 5RubricsWeekly Participation.docxDiscussion #1 for Week 5RubricsWeekly Participation.docx
Discussion #1 for Week 5RubricsWeekly Participation.docxcuddietheresa
 
HIPAA&predictiveanalytics
HIPAA&predictiveanalyticsHIPAA&predictiveanalytics
HIPAA&predictiveanalyticsdmcgraw418
 
Research data management and sharing of medical data
Research data management and sharing of medical dataResearch data management and sharing of medical data
Research data management and sharing of medical dataARDC
 
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxPSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxwoodruffeloisa
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docxstudywriters
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docxwrite31
 
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...Health Data Consortium
 
Challenges and Opportunities Around Integration of Clinical Trials Data
Challenges and Opportunities Around Integration of Clinical Trials DataChallenges and Opportunities Around Integration of Clinical Trials Data
Challenges and Opportunities Around Integration of Clinical Trials DataCitiusTech
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docxteresehearn
 
Data management (1)
Data management (1)Data management (1)
Data management (1)SM Lalon
 
Research Data Management Services at UWA (November 2015)
Research Data Management Services at UWA (November 2015)Research Data Management Services at UWA (November 2015)
Research Data Management Services at UWA (November 2015)Katina Toufexis
 
Publishing and sharing sensitive data 28 June
Publishing and sharing sensitive data 28 JunePublishing and sharing sensitive data 28 June
Publishing and sharing sensitive data 28 JuneARDC
 
1Running Head Research Paper Final Draft6Research Paper.docx
1Running Head Research Paper Final Draft6Research Paper.docx1Running Head Research Paper Final Draft6Research Paper.docx
1Running Head Research Paper Final Draft6Research Paper.docxaulasnilda
 
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...
iHT2 Health IT Summit in Austin 2012 –  Deborah C. Peel, MD, Founder and Chai...iHT2 Health IT Summit in Austin 2012 –  Deborah C. Peel, MD, Founder and Chai...
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...Health IT Conference – iHT2
 

Similar to Data Quality: Missing Data (PPT slides) (20)

Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...
 
International Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docxInternational Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docx
 
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health Records
 
The Learning Health System: Thinking and Acting Across Scales
The Learning Health System: Thinking and Acting Across ScalesThe Learning Health System: Thinking and Acting Across Scales
The Learning Health System: Thinking and Acting Across Scales
 
Confidentiality manager training mha 690
Confidentiality manager training mha 690Confidentiality manager training mha 690
Confidentiality manager training mha 690
 
Discussion #1 for Week 5RubricsWeekly Participation.docx
Discussion #1 for Week 5RubricsWeekly Participation.docxDiscussion #1 for Week 5RubricsWeekly Participation.docx
Discussion #1 for Week 5RubricsWeekly Participation.docx
 
HIPAA&predictiveanalytics
HIPAA&predictiveanalyticsHIPAA&predictiveanalytics
HIPAA&predictiveanalytics
 
Research data management and sharing of medical data
Research data management and sharing of medical dataResearch data management and sharing of medical data
Research data management and sharing of medical data
 
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxPSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docx
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docx
 
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
 
Challenges and Opportunities Around Integration of Clinical Trials Data
Challenges and Opportunities Around Integration of Clinical Trials DataChallenges and Opportunities Around Integration of Clinical Trials Data
Challenges and Opportunities Around Integration of Clinical Trials Data
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx
 
Data management (1)
Data management (1)Data management (1)
Data management (1)
 
Research Data Management Services at UWA (November 2015)
Research Data Management Services at UWA (November 2015)Research Data Management Services at UWA (November 2015)
Research Data Management Services at UWA (November 2015)
 
Publishing and sharing sensitive data 28 June
Publishing and sharing sensitive data 28 JunePublishing and sharing sensitive data 28 June
Publishing and sharing sensitive data 28 June
 
1Running Head Research Paper Final Draft6Research Paper.docx
1Running Head Research Paper Final Draft6Research Paper.docx1Running Head Research Paper Final Draft6Research Paper.docx
1Running Head Research Paper Final Draft6Research Paper.docx
 
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...
iHT2 Health IT Summit in Austin 2012 –  Deborah C. Peel, MD, Founder and Chai...iHT2 Health IT Summit in Austin 2012 –  Deborah C. Peel, MD, Founder and Chai...
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...
 

More from Saide OER Africa

Asp openly licensed stories for early reading in africa mar 2015 slideshare
Asp openly licensed stories for early reading in africa mar 2015 slideshareAsp openly licensed stories for early reading in africa mar 2015 slideshare
Asp openly licensed stories for early reading in africa mar 2015 slideshareSaide OER Africa
 
Quality Considerations in eLearning
Quality Considerations in eLearningQuality Considerations in eLearning
Quality Considerations in eLearningSaide OER Africa
 
African Storybook: The First 18 Months of the Project
African Storybook: The First 18 Months of the ProjectAfrican Storybook: The First 18 Months of the Project
African Storybook: The First 18 Months of the ProjectSaide OER Africa
 
Digital Storytelling for Multilingual Literacy Development: Implications for ...
Digital Storytelling for Multilingual Literacy Development: Implications for ...Digital Storytelling for Multilingual Literacy Development: Implications for ...
Digital Storytelling for Multilingual Literacy Development: Implications for ...Saide OER Africa
 
Integrating ICT in TVET for Effective Technology Enabled Learning
Integrating ICT in TVET for Effective Technology Enabled LearningIntegrating ICT in TVET for Effective Technology Enabled Learning
Integrating ICT in TVET for Effective Technology Enabled LearningSaide OER Africa
 
Higher Education Technology Outlook in Africa
Higher Education Technology Outlook in AfricaHigher Education Technology Outlook in Africa
Higher Education Technology Outlook in AfricaSaide OER Africa
 
eLearning or eKnowledge - What are we offering students?
eLearning or eKnowledge - What are we offering students?eLearning or eKnowledge - What are we offering students?
eLearning or eKnowledge - What are we offering students?Saide OER Africa
 
Understand school leadership and governance in the South African context (PDF)
Understand school leadership and governance in the South African context (PDF)Understand school leadership and governance in the South African context (PDF)
Understand school leadership and governance in the South African context (PDF)Saide OER Africa
 
Toolkit: Unit 8 - Developing a school-based care and support plan.
Toolkit: Unit 8 - Developing a school-based care and support plan.Toolkit: Unit 8 - Developing a school-based care and support plan.
Toolkit: Unit 8 - Developing a school-based care and support plan.Saide OER Africa
 
Toolkit: Unit 7 - Counselling support for vulnerable learners.
Toolkit: Unit 7 - Counselling support for vulnerable learners.Toolkit: Unit 7 - Counselling support for vulnerable learners.
Toolkit: Unit 7 - Counselling support for vulnerable learners.Saide OER Africa
 
Toolkit: Unit 6 - School-based aftercare.
Toolkit: Unit 6 - School-based aftercare.Toolkit: Unit 6 - School-based aftercare.
Toolkit: Unit 6 - School-based aftercare.Saide OER Africa
 
Toolkit: Unit 5 - Good nutrition for learning.
Toolkit: Unit 5 - Good nutrition for learning.Toolkit: Unit 5 - Good nutrition for learning.
Toolkit: Unit 5 - Good nutrition for learning.Saide OER Africa
 
Toolkit: Unit 3 - Care for vulnerable learners
Toolkit: Unit 3 - Care for vulnerable learnersToolkit: Unit 3 - Care for vulnerable learners
Toolkit: Unit 3 - Care for vulnerable learnersSaide OER Africa
 
Toolkit: Unit 2 - Schools as centres of care.
Toolkit: Unit 2 - Schools as centres of care.Toolkit: Unit 2 - Schools as centres of care.
Toolkit: Unit 2 - Schools as centres of care.Saide OER Africa
 
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...Saide OER Africa
 
Reading: Understanding Intrapersonal Characteristics (Word)
Reading: Understanding Intrapersonal Characteristics (Word)Reading: Understanding Intrapersonal Characteristics (Word)
Reading: Understanding Intrapersonal Characteristics (Word)Saide OER Africa
 
Reading: Understanding Intrapersonal Characteristics (pdf)
Reading: Understanding Intrapersonal Characteristics (pdf)Reading: Understanding Intrapersonal Characteristics (pdf)
Reading: Understanding Intrapersonal Characteristics (pdf)Saide OER Africa
 
Reading: Guidelines for Inclusive Learning Programmes (word)
Reading: Guidelines for Inclusive Learning Programmes (word)Reading: Guidelines for Inclusive Learning Programmes (word)
Reading: Guidelines for Inclusive Learning Programmes (word)Saide OER Africa
 
Reading: Guidelines for Inclusive Learning Programmes (pdf)
Reading: Guidelines for Inclusive Learning Programmes (pdf)Reading: Guidelines for Inclusive Learning Programmes (pdf)
Reading: Guidelines for Inclusive Learning Programmes (pdf)Saide OER Africa
 

More from Saide OER Africa (20)

Asp openly licensed stories for early reading in africa mar 2015 slideshare
Asp openly licensed stories for early reading in africa mar 2015 slideshareAsp openly licensed stories for early reading in africa mar 2015 slideshare
Asp openly licensed stories for early reading in africa mar 2015 slideshare
 
Quality Considerations in eLearning
Quality Considerations in eLearningQuality Considerations in eLearning
Quality Considerations in eLearning
 
African Storybook: The First 18 Months of the Project
African Storybook: The First 18 Months of the ProjectAfrican Storybook: The First 18 Months of the Project
African Storybook: The First 18 Months of the Project
 
Digital Storytelling for Multilingual Literacy Development: Implications for ...
Digital Storytelling for Multilingual Literacy Development: Implications for ...Digital Storytelling for Multilingual Literacy Development: Implications for ...
Digital Storytelling for Multilingual Literacy Development: Implications for ...
 
Integrating ICT in TVET for Effective Technology Enabled Learning
Integrating ICT in TVET for Effective Technology Enabled LearningIntegrating ICT in TVET for Effective Technology Enabled Learning
Integrating ICT in TVET for Effective Technology Enabled Learning
 
Higher Education Technology Outlook in Africa
Higher Education Technology Outlook in AfricaHigher Education Technology Outlook in Africa
Higher Education Technology Outlook in Africa
 
eLearning or eKnowledge - What are we offering students?
eLearning or eKnowledge - What are we offering students?eLearning or eKnowledge - What are we offering students?
eLearning or eKnowledge - What are we offering students?
 
The Rise of MOOCs
The Rise of MOOCsThe Rise of MOOCs
The Rise of MOOCs
 
Understand school leadership and governance in the South African context (PDF)
Understand school leadership and governance in the South African context (PDF)Understand school leadership and governance in the South African context (PDF)
Understand school leadership and governance in the South African context (PDF)
 
Toolkit: Unit 8 - Developing a school-based care and support plan.
Toolkit: Unit 8 - Developing a school-based care and support plan.Toolkit: Unit 8 - Developing a school-based care and support plan.
Toolkit: Unit 8 - Developing a school-based care and support plan.
 
Toolkit: Unit 7 - Counselling support for vulnerable learners.
Toolkit: Unit 7 - Counselling support for vulnerable learners.Toolkit: Unit 7 - Counselling support for vulnerable learners.
Toolkit: Unit 7 - Counselling support for vulnerable learners.
 
Toolkit: Unit 6 - School-based aftercare.
Toolkit: Unit 6 - School-based aftercare.Toolkit: Unit 6 - School-based aftercare.
Toolkit: Unit 6 - School-based aftercare.
 
Toolkit: Unit 5 - Good nutrition for learning.
Toolkit: Unit 5 - Good nutrition for learning.Toolkit: Unit 5 - Good nutrition for learning.
Toolkit: Unit 5 - Good nutrition for learning.
 
Toolkit: Unit 3 - Care for vulnerable learners
Toolkit: Unit 3 - Care for vulnerable learnersToolkit: Unit 3 - Care for vulnerable learners
Toolkit: Unit 3 - Care for vulnerable learners
 
Toolkit: Unit 2 - Schools as centres of care.
Toolkit: Unit 2 - Schools as centres of care.Toolkit: Unit 2 - Schools as centres of care.
Toolkit: Unit 2 - Schools as centres of care.
 
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...
 
Reading: Understanding Intrapersonal Characteristics (Word)
Reading: Understanding Intrapersonal Characteristics (Word)Reading: Understanding Intrapersonal Characteristics (Word)
Reading: Understanding Intrapersonal Characteristics (Word)
 
Reading: Understanding Intrapersonal Characteristics (pdf)
Reading: Understanding Intrapersonal Characteristics (pdf)Reading: Understanding Intrapersonal Characteristics (pdf)
Reading: Understanding Intrapersonal Characteristics (pdf)
 
Reading: Guidelines for Inclusive Learning Programmes (word)
Reading: Guidelines for Inclusive Learning Programmes (word)Reading: Guidelines for Inclusive Learning Programmes (word)
Reading: Guidelines for Inclusive Learning Programmes (word)
 
Reading: Guidelines for Inclusive Learning Programmes (pdf)
Reading: Guidelines for Inclusive Learning Programmes (pdf)Reading: Guidelines for Inclusive Learning Programmes (pdf)
Reading: Guidelines for Inclusive Learning Programmes (pdf)
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 

Data Quality: Missing Data (PPT slides)

  • 1. Ethics and Integrity in Data Use and Management John E. Sidle, M.D., M.S. May 10, 2010 This module was recorded at the health informatics-training course – data management series offered by the Regional East African Centre for Health Informatics (REACH-Informatics) in Eldoret, Kenya. Funding was made possible by NIH’s Fogarty Center and a (REACH-Informatics) grant from the Rockefeller Center. The training was held at the Academic Model Providing Access to Healthcare (AMPATH), a (AMPATH), USAID-funded program, supported by the Regenstrief Institute at Indiana University. The modules were created in collaboration with University. the School of Informatics at IUPUI. IUPUI. Content licensed under Creative Commons Attribution-Share Alike 3.0 Unported
  • 2. Objectives Examine a brief history of ethics in research and data management Discuss pertinent principles of ethics in data management Discuss the concept of “data integrity” and ethics in data management Discuss applications for data management personnel in ethical use of data
  • 3. Outline Definitions Ethical Principles in Bioethics Guidelines and Regulations Data Integrity Applications for ethics and maintenance of data integrity
  • 4. Definitions In·teg·ri·ty n. 1. Strict adherence to a standard of value or conduct. 2. Personal honesty and independence. 3. Completeness: unity 4.Soundness Eth·ic n. 1. A principle of right or good conduct. 2. A system of moral values. 3. ethics (sing. In number). The branch of philosophy dealing with the rules of right conduct. Source: Webster’s II New Riverside Dictionary, Based on the Webster’s II New College Dictionary (1996)
  • 5. Ethical Principles Beneficence  Minimize harm  Maximize Benefits Respect of Persons (Autonomy)  Informed voluntary consent  Vulnerable subjects must be protected Justice  Equity in distributing risks and benefits between populations  “fairness” in dealing with research participants  Equity between institutions and research partners
  • 6. Clinical Data vs. Research Data: Are the Ethics Different? Privacy and Confidentiality Informed Consent vs. Implied Consent Data Integrity / Data Quality Data Security and Storage
  • 7. Ethical Guidelines (for Research) Declaration of Helsinki  ethical standard used by the International Committee of Medical Journal Editors  guidelines govern all medical research CIOMS Guidelines  Council for International Organizations of Medical Sciences  developed guidelines in collaboration with WHO Belmont Report National Guidelines (Kenya)
  • 8. Regulations US: Code of Federal Regulations Title 45, Part 46 (45CFR46) FDA– 21CFR50 and 56 NIH--“he who has the gold makes the rules” HIPAA—related both to clinical records and use of subject data in research
  • 9. 45CFR46 US Code of Federal Regulations Title 45, Part 46 (45CFR46)  Human Subjects Protections  IRB requirements  Protection of Vulnerable Subjects Human subject  Human subject means a living individual about whom an investigator (whether professional or student) conducting research obtains: (1) data through intervention or interaction with the individual, or (2) identifiable private information.
  • 10. Privacy/Confidentiality Applies to both clinical and research data Major concern for patients when it comes to electronic records and data Must be safeguarded by all members on the team
  • 11. HIPAA Health Insurance Portability and Accountability Act of 1996 (HIPAA), HHS issued regulations entitled Standards for Privacy of Individually Identifiable Health Information. For most covered entities, compliance with these regulations, known as the Privacy Rule, was required by April14, 2003.
  • 12. HIPAA and Privacy Rule The Privacy Rule, at 45 CFR parts 160 and 164, establishes a category of health information, defined as protected health information (PHI), which a covered entity may only use or disclose to others in certain circumstances and under certain conditions. Usually requires an individual to provide signed permission, known as an Authorization before a covered entity can use or disclose the individual's PHI for research purposes. Need for authorization may be waived in some instances by an IRB (and a Privacy Board)
  • 13. Individually Identifiable Information and Protected Health Information Includes any subset of health information, including demographic information, that identifies the individual (or there is a reasonable basis to believe that the information can be used to identify the individual). 1. Name 2. All elements of dates except Year. 3. SSN 4. Driver's License Number 5. Geographic subdivisions smaller than a State. 6. URL's and IP's 7. Vehicle Identifiers including VIN and License # 8. Phone numbers
  • 14. PHI Individually identifiable information becomes PHI when it is created or received by a covered entity:  US health plans  US health care clearinghouses  US health providers that transmit electronic health information A researcher is not a covered entity unless he/she is also a provider within a covered entity. Research is also governed by HIPAA if data is obtained from a covered entity. IRB may on occasion waive the HIPAA restrictions on use of PHI
  • 15. How does all this translate to practice? Electronic health information (clinical or research)  Can improve quality and safety of medical care (beneficence)  Is key to showing outcomes in research on health and health practices (beneficence)  Confidentiality and Privacy can be lost (breach of autonomy and beneficence)  Can be used without a patient’s knowledge or consent (breach of autonomy)  Might exclude some populations (breach of justice)
  • 16. Data Integrity The assurance that data is accurate, correct and valid. Accuracy and consistency of stored data, indicated by an absence of any alteration in data between two updates of a data record. Data integrity is imposed within a database at its design stage through the use of standard rules and procedures, and is maintained through the use of error checking and validation routines. Exact duplication of the sent data at the receiving end, achieved through the use of error checking and correcting protocols. Assurance that the data are unchanged from creation to reception.
  • 17. Data Integrity (2) Process to maintain data integrity depends on:  Collection (accurate representation)  Data transfer (accurate recording and transfer of data)  Storage and Security (preventing loss of data)  Sharing of Data  Use of data (analysis)
  • 18. Data Integrity (3) Fabrication and Falsification of data are one of the most serious challenges to data integrity Human error also contributes to loss of data integrity Concern about research misconduct was a primary motivation for a 1990 conference on data management sponsored by the US Department of Health and Human Services. Conference summarized the many ways in which the conduct of research depends on responsible data management.
  • 19. Data Integrity (4) Responsible research begins with experimental design and protocol approval It involves recordkeeping in a way that ensures accuracy and avoids bias It guides criteria for including and excluding data from statistical analyses It entails responsibility for collection, use, and sharing of data.
  • 20. Data Integrity (5) Everyone with a role in research has a responsibility to ensure the integrity of the data. The ultimate responsibility belongs to the principal investigator, but the central importance of data to all research means that this responsibility extends to anyone who:  helps in planning the study  collecting the data  analyzing or interpreting the research findings  publishing the results of the study  maintaining the research records.
  • 21. Data Collection and Integrity Because data collection can be repetitious, time- consuming, and tedious there is a temptation to underestimate its importance. Those responsible for collecting data must be adequately trained and motivated They should employ methods that limit or eliminate the effect of bias They should keep records of what was done by whom and when
  • 22. Analysis and Selection of Data The use of statistical methods varies widely among research disciplines and also clinical programs (reporting) It is a laudable ideal to analyze and report all data Because it is not possible to report everything that has been done, researchers must make decisions about which studies, data points, and methods of analysis to present.
  • 23. Analysis and Selection of Data (2) Must critically evaluate the reasons for inclusion or exclusion of data, the measures taken to avoid bias, and possible ways in which bias may nonetheless influence data selection Must clearly document how the data were obtained, selected, and analyzed-- especially if the methods are unusual or potentially controversial
  • 24. Retention of Data What should be retained? It may be impractical to store extraordinarily large volumes of primary data. At minimum, enough data should be retained to reconstruct what was done. How long should clinical records be retained?
  • 25. Sharing of Data This is considered an important part of responsible research. De-identified data should be shared so that others can verify your conclusions or analysis Sharing of personal patient information is NOT a good practice as noted in Privacy sections earlier.
  • 26. Data Security Limiting Access  Locked Paper Records Offices  Limiting access to Paper or Electronic records to appropriate personnel  Password Protection of electronic records  Defined privileges for electronic data users  Firewalls to prevent outside access Regular Backups and proper archiving
  • 27. Ownership of Data Who owns the data that is generated?  Patient?  Institution?  Funder?  Investigator?  Publisher?
  • 28. Ethics in Publication—General guidelines pertinent to data Research should strive to answer specific questions—not just collect or mine data Statistical issues (sample size) are an important part of design to ensure that the research data is likely to answer the question IRB approval is required when using human subjects, human tissues, or medical records
  • 29. Publication Ethics and Data Management/Data Analysis Data should be appropriately analyzed Inappropriate analysis is not necessarily ethical misconduct Fabrication or falsification of data is always ethical misconduct
  • 30. Publication Ethics and Data Management/Analysis Sources and methods of obtaining and processing data should be disclosed Data exclusions should be explained in full Methods used to analyze data should be explained in detail Post hoc analysis of subgroups is acceptable as long as this is disclosed Data Bias should be discussed in all publications of data or analysis
  • 32. THE WORK IS PROVIDED UNDER THE TERMS OF THIS CREATIVE COMMONS PUBLIC LICENSE ("CCPL" OR "LICENSE"). THE WORK IS PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE LAW. ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED.