Database Request Process: Difference between revisions
Ttenbergen (talk | contribs) |
Ttenbergen (talk | contribs) |
||
| Line 12: | Line 12: | ||
* Any investigators to have access to the data must be identified at the time of the request. | * Any investigators to have access to the data must be identified at the time of the request. | ||
* Devices and work materials containing data must be kept in a securely locked space with controlled access when not in the physical possession of the investigators. | * Devices and work materials containing data must be kept in a securely locked space with controlled access when not in the physical possession of the investigators. | ||
* Any security breach resulting in inappropriate | * Any security breach resulting in inappropriate access to patient information including loss of a data storage device or worksheets are to be immediately reported to Dr. Dan Roberts and the department or program heads. | ||
* Mishandling of data will result in disciplinary action and preclude future access to data. | * Mishandling of data will result in disciplinary action and preclude future access to data. | ||
Data breaches are serious matters . We have not experienced such an event with our databases since they were instituted in 1988 and 2004. | Data breaches are serious matters. We have not experienced such an event with our databases since they were instituted in 1988 and 2004. | ||
Accessibility is a privilege and data compromise usually results in greater barriers to access for others. Don’t ruin it for everyone! | Accessibility is a privilege and data compromise usually results in greater barriers to access for others. Don’t ruin it for everyone! | ||