data protection and confidentiality in research

Lionsworth > Resources > Uncategorized > data protection and confidentiality in research

Despite emphasizing the importance of maintaining confidentiality (Grinyer, 2002), the literature on research design and the ethical codes of professional associations offer virtually no specific, practical guidance on disguising respondents identities and preventing deductive disclosure in qualitative research (Giordano et al., 2007; Wiles et al., 2008). Department of Health and Human Services, 2005, American Anthropological Association, 1998, http://www.aaanet.org/committees/ethics/ethcode.htm, http://www.asanet.org/page.ww?section=Ethics&name=Code+of+Ethics+Table+of+Contents, http://www.hhs.gov/ohrp/humansubjects/guidance/45cfr46.htm, http://ohsr.od.nih.gov/guidelines/GrayBooklet82404.pdf. An empirical investigation of the social process of qualitative research. The site is secure. However, these discussions occur without knowledge of the specific information subsequently shared by the respondent. Researchers also may need to consult with local community leaders before implementing a study. Allen C. Spies like us: When sociologists deceive their subjects. Ethics and ethnography: An experiential account. In practice, the approach may need to be modified. The remaining women were referred to me by these women and by friends and colleagues. The easiest way to protect confidentiality is to collect (or if the data are already collected then use) anonymous data. But remember that group members can access resources on any Princeton computer to which the group has access, not just the computers used in your work area. According to Family Health International, Informed consent is not merely a legal requirement or a document to be signed;it is a communication process between the researcher and the participantthat starts before the research is initiated and continues throughout the study. Knowing that the respondent is aware of the possibility of follow-up discussions about confidentiality makes re-contacting respondents for this purpose less daunting. The dominant approach has several weaknesses. Most of the time, an alias will suffice, and is especially important to protect the participant if the published data includes other identifiers such as age, gender, community affiliations, or place of residence. A locked file cabinet, away from general access areas of the institution, for instance. Rachel, the sixteenth woman I interviewed, was among those recruited from the Edgewater Center. It is our goal and responsibility to use the information that you have shared responsibly. Hopkins M. Is anonymity possible? But, some research suggests the opposite may occurrespondents may express a desire to publish data that researchers would have deemed too sensitive for publication. Research Integrity & Assurance Although the original data were not stored for this purpose, they nonetheless can be useful for tracking diseases years later. Code of ethics and policies and procedures of the ASA committee on professional ethics. KEEP USER GROUP LISTS UP-TO-DATE: User groups are a convenient way to grant access to project files stored on a remote server. This approach to confidentiality emphasizes a more nuanced consent process and takes into account the audiences of ones research. References to specific people (e.g., family members or physicians), nicknames, or additional phone numbers were overlooked. The reflexive nature of qualitative research, its use of unexpected ideas that arise through data collection and its focus upon respondents meanings and interpretations renders the commitment to informing respondents of the exact path of the research unrealistic. (Parry & Mauthner, 2004, p. 146; see also Merrel & Williams, 1994) Nonetheless, most outlets for research can be anticipated. Furthermore, respondents should be advised that regardless of their preferences, their data may not appear in final reports. I could have asked Rachel if I could share her experiences with the physicians and others, but I was not prepared to dialogue with my respondents about sharing their insights with other specific parties. Sieber (1992, p. 52) defines confidentiality as the researchers agreements with persons about what may be done with their data. Per my universitys internal review board requirements, each woman in the study read and signed an informed consent statement at the beginning of the interview. Foremost, they keep their records secure through the use of password protected files, encryption when sending information over the internet, and even old-fashioned locked doors and drawers. And because subjects may not be identified by names alone, but by other identifiers or by combinations of information about subjects, researchers will oftenonly report aggregate findings,notindividual-level data, to the public. This fulfills the need to have data available for statistical analysis, as well as information accessible for developing conclusions and implications of the research project. In particular, I could have spoken with Rachel about sharing her views with the physicians and nurses affiliated with the Edgewater Center. The anthropologists, in contrast, viewed confidentiality as the choice of their research participants. ___ You may share the information I provided; however, please do not use my real name and please change details that might make me identifiable to others. But, I had not considered whether I wanted to impact the support services available to women with breast cancer. Anonymity is a condition in which the identity of individual subjects is not known to researchers. International Journal of Social Research Methodology. ./TX b"S]ppcd`& *L Well also touch on ways to secure electronically stored data, as well as third-party data protection services. Researchers also cannot predict when someone will challenge their work and ask to see the original data. Encryption will ensure that your compressed file cannot be read by anyone who does not have the password that was created when the file was compressed and encrypted. File compression minimizes the chances of your file transfer failing because your file is too large. When they read what we write: The politics of ethnography. As I developed my dissertation topic, wrote my proposal, and gained approval from my universitys ethics review board, I hoped that the work would someday be disseminated as journal articles or as a book. Federal government websites often end in .gov or .mil. Third, re-envisioning consent means viewing confidentiality in a more nuanced way and providing a wider range of confidentiality options. When I was ready to begin recruitment for the study in the fall of 2004 the center staff identified eligible study participants from their database of cancer patients and sent these women a recruitment letter on my behalf. (7) This process is a basic legal and ethical standard by which all research must abide. Ellis (1986) assumed that her respondents would not have access to her research findings. The consent form should also include this information to help the participant understand how their information will be used and the consent form should also state who has access to their identifying information and their study data (usually phrased as members of the research team). If the data are not properly protected, the investment, whether public or private, could become worthless. It is the Principal Investigators responsibility to make sure that every member of the research team is fully trained and educated on the importance of data protection and confidentiality, as well as the procedures and protocols related to private information. Conversations about consent and confidentiality rarely extend beyond what occurs at the outset of a study as part of internal review board requirements. Fisher Folk heightened researchers awareness of how we describe our study participants in our published work and how easy it might be to identify specific people in research reports. The Belmont report. How can you protect privacy and confidentiality in research? (17) Confidentiality is equally important and refers to information about the person that has been revealed to the researcher. In: Brettell C, editor. My quick concession to work with the doctors and nurses also revealed my priorities. As Tolich (2004) notes, the primary concern is whether the people with whom respondents have relationships will be able to identify the respondent given their knowledge of him or her. It is important to remember that our respondents constitute one potential audience. However, investigators did not account for educational and cultural contexts that reduced the efficacy of the informed consent. They frequently do not recordinformation in a way that linkssubject responses with identifying information (usually by use of a code known only to them). Moreover, researchers who know that respondents will see their work might alter their descriptions of the people and social setting (Hopkins, 1994), which raises questions about the validity of research. The https:// ensures that you are connecting to the %%EOF Because the alternative approach gives the respondent a more active role, it may work best in longer research relationships where respondents feel comfortable with the researcher (Carter et al., 2008). A. Researchers should be creative in designing strategies to ensure adequate comprehension of study goals, procedures, risks and benefits. %PDF-1.6 % However, the means of protecting sensitive data can often, by design, be complex. Third, researchers can stress that using an additional confidentiality form, such as the example shown in Appendix A, increases ethical compliance by giving respondents greater voice, in essence treating them as autonomous agents in accordance with the Belmont reports guidelines requiring respect for persons. My dissertation did not address the experiences of sexual minority women. If your research plan calls for destruction of documents or electronic files after the project has been completed, all paper files or CDs with PII should be shredded and any electronic files on memory drives, PCs, laptops and file serves should be permanently deleted. For example, in quantitative studies of cancer, individuals with rare forms of cancer, such as brain tumors, can be identified with a few pieces of information such as census track, cancer type and gender (Howe et al., 2007). The researchers assurance of confidentiality extends to the consent form which documents participation in the study must and be treated as a confidential document. Ellis C. Emotional and ethical quagmires in returning to the field. In the past, it was as easy as a lockable file cabinet. First, although most consent forms provide general information about what will be done with the data, stating specifically who you plan to share results with allows respondents to make informed choices about the use of their information. Input your search keywords and press Enter. Theyve got family, husbands, and I just didnt feel like I would fit in. Again, different study populations will be more or less suited for a post-interview confidentiality discussion. Therefore, its up to the entire research team to ensure that data, especially around the private information of human beings, is strongly protected. In the protocol,you need to justify why it is necessary to collect identifying information about an individual, include a list ofidentifiersthat you will collect (with the understanding that you will not collect more identifiers than you need), describe how this information will be used and how it will be collected, and describe what you will do to destroy this information once it is no longer needed. Grinyer A. Simply having a participant sign a form does not mean that they have given genuine consent. In footnotes? (13) Erinosho, O., ed. But this approach does little to ensure that persons with whom respondents have relationships such as spouses, co-workers, or neighbors will be unable to identify respondents. Elliss data came from a small, remote community. Many of the weaknesses of the dominant approach to confidentiality can be avoided via a re-envisioned informed consent process. This is particularly true for respondents who have faced unusual life events or who are unique in some way, as the case of Rachel illustrates. The sociologists largely followed the dominant approach, assuming that respondents want confidentiality and taking responsibility to edit the data to ensure confidentiality. What are the expected benefits that the participant may receive through taking part in the study? Informed Consent Form Templates. During the interview I was struck by her deep sincerity and the self-conscious nature of her revelations. Researchers occupy a position of respect and trust in the community. Guidelines for the conduct of research involving human subjects at the National Institutes of Health. Sharing our work with our study participants can be challenging. Bethesda, MD 20894, Web Policies This specification came after Nazi physicians routinely performed involuntary experiments in which the subjects were forced into participation. You may wish to have two paragraphs in the consent form's "confidentiality" section, one discussing your protection policies (i.e., how you will prevent information from being disclosed against the participants wishes) and one discussing disclosure policies (i.e., under what circumstances and to whom must information be disclosed). Vol. Weighing potential audiences also leads to a consideration of priorities. 10. (1), Today, the Belmont Report is arguably the paramount code of ethics, used by the regulating agencies of many U.S. As an alternative to altering key details in data, researchers leave data unpublished because of fears that publication will lead to deductive disclosure (Wiles et al., 2008).

1/2 Inch Irrigation Tubing Lowes, Outdoor Remote Control Outlet Home Depot, Best Liquid Food For Dogs, Scotsman Ice Machine Motor, Indoor Apartment Mailboxes, Window Squeegee Professional, Best Torch For Lighting Charcoal,

data protection and confidentiality in research