Database Request Process: Difference between revisions

mNo edit summary
JMojica (talk | contribs)
No edit summary
Line 4: Line 4:


For more information please contact [[p:Trish Ostryzniuk|Trish]] and [[p:Julie Mojica|Julie]], [[p:Dr. Dan Roberts|Dr. Dan Roberts]], [[p:Dr. Bojan Paunovic|Dr. Bojan Paunovic]] or [[p:Dr. Allan Garland|Dr. Allan Garland]].  
For more information please contact [[p:Trish Ostryzniuk|Trish]] and [[p:Julie Mojica|Julie]], [[p:Dr. Dan Roberts|Dr. Dan Roberts]], [[p:Dr. Bojan Paunovic|Dr. Bojan Paunovic]] or [[p:Dr. Allan Garland|Dr. Allan Garland]].  
== Data Access and Requestor's Responsibility ==
The privilege of access to patient data for research or quality improvement projects obligates recipients to be responsible for its security.
Once you receive permission to access aggregate or patient identifiable data you must take the following steps.
* All data is to be secured on a password protected computer.
* Any investigators to have access to the data must be identified at the time of the request.
* Devices and work materials containing data must be kept in a securely locked space with controlled access when not in the physical possession of the investigators.
* Any security breach resulting in inappropriate  access to patient information including loss of a data storage device or worksheets are to be immediately reported to myself and the department or program heads .
* Mishandling of data will result in disciplinary action and preclude future access to data.
Data breaches are serious matters . We have not experienced such an event with our databases since they were instituted in 1988 and 2004.
Accessibility is a privilege and data compromise usually results in greater barriers to access for others. Don’t ruin it for everyone!


==Request for database information ==
==Request for database information ==