Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the.

Similar presentations


Presentation on theme: "1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the."— Presentation transcript:

1

2 1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the screen changes and you press enter.

3 ELECTRONIC DATA SECURITY in human subjects research Developed by: U-MIC University of Michigan IRB Collaborative

4 3 Developed by: U-MIC hacking theft lost equipment

5 4 Developed by: U-MIC Electronic data security Office of Human Research Compliance Review (OHRCR) recommendations for best practices

6 5 Developed by: U-MIC Electronic data security collect only the data you need deidentify as soon as possible Office of Human Research Compliance Review (OHRCR) recommendations for

7 6 Developed by: U-MIC Electronic data security separate identifying information from research data use encryption software Office of Human Research Compliance Review (OHRCR) recommendations for

8 7 Developed by: U-MIC Electronic data security restrict access use machines managed by IT collect store process transmit Office of Human Research Compliance Review (OHRCR) recommendations for

9 8 Developed by: U-MIC Electronic data security avoid portable devices use encryption software Office of Human Research Compliance Review (OHRCR) recommendations for

10 9 Developed by: U-MIC Electronic data security delete identifying information Office of Human Research Compliance Review (OHRCR) recommendations for

11 10 Developed by: U-MIC Electronic data security Information and Technology Services (ITS) recommendations for use a loaner machine bring only necessary machines and data create a temporary password while traveling

12 11 Developed by: U-MIC Electronic data security Information and Technology Services (ITS) recommendations for create a data inventory leave a back-up behind implement full-disk encryption while traveling

13 12 Developed by: U-MIC Electronic data security Information and Technology Services (ITS) recommendations for avoid public internet networks virtual private network (VPN) http://www.itcom.itd.umich.edu/vpn/ http://www.itcom.itd.umich.edu/vpn/ while traveling

14 13 Developed by: U-MIC Electronic data security Information and Technology Services (ITS) recommendations for keep machines with you password-lock while traveling

15 14 Developed by: U-MIC Electronic data security Information and Technology Services (ITS) recommendations for if a machine is lost or stolen contact authorities change passwords while traveling security@umich.edu

16 15 Developed by: U-MIC Electronic data security Information Technology Services (ITS) http://www.itcs.umich.edu/ Medical School Information Services (MSIS) https://www.umms.med.umich.edu/msis/home/index.php Medical Center Information Technology (MCIT) http://www.itcom.itd.umich.edu/umnoc/mcit-help.php Office of Human Research Compliance Review (OHRCR) http://www.ohrcr.umich.edu/

17 THANK YOU. Brian Seabolt IRBMED 16 Developed by: U-MIC


Download ppt "1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the."

Similar presentations


Ads by Google