When the primary potential harm is the breach of individually identifiable data, to protect against such disclosures researchers should:
Encrypt the data and store it in password protected files on institutionally maintained servers with limited access
.
When evaluating a study for risk of harm to its subjects an IRB must determine that?
When evaluating risks of harm, IRBs must determine that:
Risks are reasonable in relation to anticipated benefits
.
Which of the following is a measure researchers can use to protect the confidentiality of subject data?
Which of the following is a measure researchers can use to protect the confidentiality of subject data?
Keep sensitive and identifiable data in encrypted files on a password protected hard drive
.
Is disclosure of a subjects involvement in a specific research study can be potentially harmful?
If disclosure of a subject’s involvement in a specific research study can be potentially harmful to the
subject
, and the consent form is the only record linking the subject to the research, which of the following would be most helpful: Obtain a waiver of documentation of informed consent.
Which of the following is something an IRB should do with respect to review of GSD research?
Which of the following is something an IRB should do with respect to review of GSD research?
Seek consultants with expertise in specific segments of GSD communities to provide information on research in those communities
.
What steps should experimenters take to protect confidentiality?
Which steps should an experimenter take to protect confidentiality?
using deception in a research study
. ensure that the safety of research participants is adequately protected.
What statement about risks in social and behavioral sciences research is most accurate:
Risks are specific to time, situation, and culture
. The primary purpose of a Certificate of Confidentiality is to: Protect identifiable research information from compelled disclosure.
What are the measures to protect the confidentiality of information?
- Encrypt sensitive files. …
- Manage data access. …
- Physically secure devices and paper documents. …
- Securely dispose of data, devices, and paper records. …
- Manage data acquisition. …
- Manage data utilization. …
- Manage devices.
How do you protect confidential data?
Do not transmit confidential data via wireless technology, email, or the Internet unless the connection is secure, or the information is encrypted.
Password
protect all confidential data, and accounts with access to confidential data. Do not share passwords, and do not write passwords down.
What is the best way to maintain confidentiality in a research study quizlet?
To maintain confidentiality,
researchers should not disclose the sources of their financial support
.
Is disclosure of a subject’s involvement?
If disclosure of a subject’s involvement in a specific research study
can be potentially harmful to the subject
, and the consent form is the only record linking the subject to the research, which of the following would be most helpful: Obtain a waiver of documentation of informed consent.
What statement about risks in social and behavioral sciences research is most accurate:
Risks are specific to time, situation, and culture
. The primary purpose of a Certificate of Confidentiality is to: Protect identifiable research information from compelled disclosure.
What is the primary purpose of a certificate of Confidentiality?
Certificates of Confidentiality are issued by the National Institutes of Health (NIH) and other HHS agencies
to protect identifiable research information from forced or compelled disclosure
.
What are the three fundamental principles of informed consent?
According to the report, informed consent requires three elements:
information, comprehension and voluntariness
.
What is the first step in carrying out an EBP project quizlet?
The first step in carrying out an EBP project is
to select a topic
. What is an example of a problem-focused trigger? Problem-focused triggers are those identified by staff through quality improvement, risk surveillance, benchmarking data, financial data, or recurrent clinical problems.
What is an autonomous person in research?
The term autonomous means that
a person can make his or her own decisions about what to do and what to agree to
. Researchers must respect that individuals should make their own informed decisions about whether to participate in research.