Database Request Process: Difference between revisions

Line 12: Line 12:
* Any investigators to have access to the data must be identified at the time of the request.
* Any investigators to have access to the data must be identified at the time of the request.
* Devices and work materials containing data must be kept in a securely locked space with controlled access when not in the physical possession of the investigators.
* Devices and work materials containing data must be kept in a securely locked space with controlled access when not in the physical possession of the investigators.
* Any security breach resulting in inappropriate access to patient information including loss of a data storage device or worksheets are to be immediately reported to Dr. Dan Roberts and the department or program heads .
* Any security breach resulting in inappropriate access to patient information including loss of a data storage device or worksheets are to be immediately reported to Dr. Dan Roberts and the department or program heads.
* Mishandling of data will result in disciplinary action and preclude future access to data.
* Mishandling of data will result in disciplinary action and preclude future access to data.


Data breaches are serious matters . We have not experienced such an event with our databases since they were instituted in 1988 and 2004.
Data breaches are serious matters. We have not experienced such an event with our databases since they were instituted in 1988 and 2004.
Accessibility is a privilege and data compromise usually results in greater barriers to access for others. Don’t ruin it for everyone!
Accessibility is a privilege and data compromise usually results in greater barriers to access for others. Don’t ruin it for everyone!