Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the.

Similar presentations


Presentation on theme: "1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the."— Presentation transcript:

1

2 1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the screen changes and you press enter.

3 DATA MANAGEMENT AND SECURITY Developed by: U-MIC University of Michigan IRB Collaborative

4 data management and security 3 Developed by: U-MIC protect confidentiality of all subject data minimum data security controls additional data security controls protect confidentiality of higher-sensitivity data

5 data management and security 4 Developed by: U-MIC 1.Password-protect devices. Password protection alone is insufficient. 2.Encrypt data. 3.Separate identifiers, data, and codes. password protection encryption 4.Use transport layer security (TLS)— sometimes called secure sockets layer (SSL) 5.Do not store identifiers on laptops personal digital assistants (PDAs) USB drives other portable devices When collecting identifiable data:  Use encryption.  Move data to secure system as soon as possible.  Lock up portable devices. 6.E-mail is not secure. Caution subjects. Advise subjects to use email accounts accessible only to them. 7.Do not put PHI in e-mail— unless on a qualifying UM mail system 8.Observe UM guidelines for remote data (cloud) storage. http://www.safecomputing.umich.edu/cloud/http://www.safecomputing.umich.edu/cloud http://www.safecomputing.umich.edu/google/http://www.safecomputing.umich.edu/google minimum data security controls

6 data management and security 5 Developed by: U-MIC 1.Move data from local devices to UM server as soon as possible. 2.Password-protect at multiple levels on all local devices. 3.Delete or destroy identifiers as soon as practicable. additional data security controls higher-sensitivity data PHI personal identifying information other sensitive data

7 data management and security 6 Developed by: U-MIC Data management and security

8 THANK YOU. Brian Seabolt IRBMED 7 Developed by: U-MIC


Download ppt "1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the."

Similar presentations


Ads by Google