| Data Collection - Primary Data |
| Will your study collect PHI or PII about participants? |
If Yes: Generally, the IRB requires that research data be kept apart from PII or PHI. Separate tables or separate files should be used to maintain the confidentiality of individual records. Note this protection in the consent form. |
| Will the PII or PHI be kept in separate files from research data on participants? |
If Yes: The crosswalk table shows the real PII or PHI along with a research record number.
See Exhibit A below.
|
| Will a research record number be used instead of PII or PHI in research data tables? |
If Yes: The tables containing crosswalks between PII/PHI and research record numbers must be kept separately from any tables used for research.
Separate any PII or PHI from other research data. Create a crosswalk, if needed, between participant record number and PII/PHI, and ensure that the crosswalk file is separate from both the research data and the PII /PHI file.
See examples of table structures in Exhibit A below.
|
| Data Collection - Secondary Use Data |
| Will the PII or PHI be obtained from existing electronic data systems (electronic medical records, institutional data sets? |
If Yes: Ensure that applicable HIPAA or other authorizations have been approved for data access into a new electronic data table.
On receiving PII or PHI, separate these identifiers from other health or research data. Create a crosswalk, if needed, between participant record number and PII/PHI, and ensure that the crosswalk file is separate from both the research data and the PII /PHI file.
See example of table structures in Exhibit A below.
|
| Data Collection - Web-Based Tools |
| Will web survey tools be used to collect data? |
If Yes: If you have the capability and expertise, host the survey in-house on a secure university firewall-walled, password-protected server. Preferred Survey Platforms:
- Qualtrics is available to the University of Kentucky community.
- The Center for Clinical and Translational Sciences (CCTS) administers REDCap (Research Electronic Data Capture) for the University of Kentucky. REDCap is a web-based application designed by Vanderbilt University with tools for survey-building and researcher data capture.
UK survey researchers can access the SONA subject pool for their survey research. Instructions for creating an online internal survey or adding a Qualtrics survey are located on the Department of Psychology website.
|
| Will the survey be hosted on a commercial or independent proprietor’s (external) server? |
If Yes: Be sure to find out to what extent access to the server is limited, what protections are in place to protect the data against unauthorized access, and whether the data can be encrypted upon transmission. |
| Are survey questions of a sensitive nature such that a breach of confidentiality could put subjects at risk? |
If Yes: Consent form should address the possibility of breach of confidentiality and that anonymity cannot be guaranteed and discuss relevant safeguards study personnel have implemented to minimize risk. |
| Data Storage - General |
| Will data from participants be entered directly into electronic devices during research surveys or procedures? |
If Yes: Ensure that encryption is installed such that PII/PHI are always encrypted as they are entered, saved, or submitted.
The ideal is for the encryption to occur during entry, but it is acceptable to do this at “save” or “submit” functions (for VPN or other uploading).
An example of consent language might be: “All personal identifying information is encrypted as it is typed into the laptop.” Or “All personal identifiers are encrypted when the data are uploaded.”
|
| Will data be loaded into a server system using a virtual private network (VPN)? |
If Yes: The VPN-accessing server must be behind a firewall and all identifiers must be encrypted before being deposited in the VPN accessed or uploaded file or the data must be moved immediately into an encrypted file. |
| Data Storage – Sponsor Provided Device |
| Will you be using portable devices for data collection? (This includes laptops, iPads, Smartphones, and other mobile devices, etc.) |
If Yes: Ensure that encryption is installed such that PII/PHI are always encrypted as they are entered, as they are saved, or submitted. The ideal is for the encryption to occur during entry, but it is acceptable at save or submit functions (for VPN, FTP, or other uploading).
There are two ways of encrypting data for portable devices:
- Encrypting the entire laptop so that a password is needed to even open any operation of the device; and
- Encryption only of the specific file being used for research.
|
| Will portable devices be supplied by the sponsor? |
If Yes: Ensure that the device comes with security keys or built-in encryption, either for the specific files or for the entire device.
Some sponsor-supplied devices do not use PII or PHI (research record number only) and rely on separate methods for transmitting these data. If PII or PHI are entered into or are stored on the device, ensure that the keys are in place and/ or that the PII/PHI data are encrypted.
For FDA-Regulated Clinical Investigations, the sponsor may provide documentation of compliance with Part 11 security protections.
|
| Are you planning to put data on small portable storage devices such as jump drives? |
If Yes: Ensure that PII or PHI are not stored on jump drives. Other research data can be stored on jump drives if there is no way that the data could be traceable to a participant's identity (e.g., REDCap). |
| Data Storage – PI Owned Device |
| Is the device owned by the PI or by the university rather than being supplied by a sponsor? |
If Yes: Assume responsibility for maintaining two separate data tables (two files) and ensure that the PII or PHI table is encrypted. |
| Is the device a personally owned desktop PC or MAC? |
If Yes: Do not have any PII or PHI stored on personal desktop devices. For all other research data on human subjects, ensure that a firewall is always installed and turned on. |
| Data Storage – University Device |
| Are you using a university desktop PC or MAC for entering study data? |
If Yes: Ensure that your device is behind the university firewall. Ensure that backups are secured on system servers, or if an external hard drive is used for backups, ensure that it contains only encrypted PII or PHI. |
| Will the survey be hosted on a commercial or independent proprietor’s (external) server? |
If Yes: Be sure to find out to what extent access to the server is limited, what protections are in place to protect the data against unauthorized access, and whether the data can be encrypted upon transmission. |
| Are survey questions of a sensitive nature such that a breach of confidentiality could put subjects at risk? |
If Yes: Consent form should address the possibility of breach of confidentiality and that anonymity cannot be guaranteed, and discuss relevant safeguards that study personnel have implemented to minimize risk. |