Database Request Process: Difference between revisions
Ttenbergen (talk | contribs) mNo edit summary |
No edit summary |
||
| Line 4: | Line 4: | ||
For more information please contact [[p:Trish Ostryzniuk|Trish]] and [[p:Julie Mojica|Julie]], [[p:Dr. Dan Roberts|Dr. Dan Roberts]], [[p:Dr. Bojan Paunovic|Dr. Bojan Paunovic]] or [[p:Dr. Allan Garland|Dr. Allan Garland]]. | For more information please contact [[p:Trish Ostryzniuk|Trish]] and [[p:Julie Mojica|Julie]], [[p:Dr. Dan Roberts|Dr. Dan Roberts]], [[p:Dr. Bojan Paunovic|Dr. Bojan Paunovic]] or [[p:Dr. Allan Garland|Dr. Allan Garland]]. | ||
== Data Access and Requestor's Responsibility == | |||
The privilege of access to patient data for research or quality improvement projects obligates recipients to be responsible for its security. | |||
Once you receive permission to access aggregate or patient identifiable data you must take the following steps. | |||
* All data is to be secured on a password protected computer. | |||
* Any investigators to have access to the data must be identified at the time of the request. | |||
* Devices and work materials containing data must be kept in a securely locked space with controlled access when not in the physical possession of the investigators. | |||
* Any security breach resulting in inappropriate access to patient information including loss of a data storage device or worksheets are to be immediately reported to myself and the department or program heads . | |||
* Mishandling of data will result in disciplinary action and preclude future access to data. | |||
Data breaches are serious matters . We have not experienced such an event with our databases since they were instituted in 1988 and 2004. | |||
Accessibility is a privilege and data compromise usually results in greater barriers to access for others. Don’t ruin it for everyone! | |||
==Request for database information == | ==Request for database information == | ||