/
Best Practice for Affirming Protection of contractually protected research data Best Practice for Affirming Protection of contractually protected research data

Best Practice for Affirming Protection of contractually protected research data - PDF document

alida-meadow
alida-meadow . @alida-meadow
Follow
394 views
Uploaded On 2017-03-23

Best Practice for Affirming Protection of contractually protected research data - PPT Presentation

Contractually Protected Research Data Researchers at Harvard obtain data from external sources for research purpose Some sources require a University signature on an agreement to protect the data ID: 330926

Contractually Protected Research Data Researchers

Share:

Link:

Embed:

Download Presentation from below link

Download Pdf The PPT/PDF document "Best Practice for Affirming Protection o..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Best Practice for Affirming Protection of Contractually Protected Research Data Researchers at Harvard obtain data from external sources for research purpose. Some sources require a University signature on an agreement to protect the data. In these cases, a researcher cannot sign such an agreement. The signature must be from the Office of Sponsored Programs (OSP) regardless of funding considerations . The following process should be observed to ensure t hat the data is properly protected before OSP signs the agreement. 1. The researcher describes the data and attaches a copy of any required protections described by the data source. 2. The researcher must document the special protections that will be employed t o keep the data secure. These protections must be in accord with the protections required by the data source. 3. The form for documenting the data protections may be found at http://www.security.h arvard.edu/resources/forms 4. The researcher forwards the request to the School CIO or School security officer and the Institutional Review Board (IRB) for the area, or if in Central Administration, to the University Technology Security Officer. 5. The School CIO will review and work with the researcher to obtain additional information or to clarify the request if needed, and to ensure that the right protections are employed. 6. Where necessary the School CIO will consult with the IRB to clarify the type of data a nd protection required. 7. When the School CIO is satisfied that the protections meet requirements of the external source, the CIO will forward the agreement to OSP with a cover note indicating approval and advising OSP that it is acceptable to sign the agre ement. 8. The IRB may request confirmation from the researcher that the CIO review process has been satisfactorily completed.