Responsible Conduct of Research

Size: px
Start display at page:

Download "Responsible Conduct of Research"

Transcription

1 Responsible Conduct of Research DATA INTEGRITY AND MANAGEMENT

2 Sources

3 Examples NOT Source: ORI.HHS.GOV

4 Guidelines Institutional Governmental Community Laboratory

5 Community values HONESTY Convey information truthfully and honoring commitments ACCURACY Report findings precisely and taking care to avoid errors EFFICIENCY Use resources wisely and avoiding waste OBJECTIVITY Let the facts speak for themselves; avoid improper bias

6 Government Office of Research Integrity (DHHS) Before starting a new scientific research project, the PI and research team must address issues related to data management, including: Data Ownership Data Collection Data Storage Data Protection Data Retention Data Analysis Data Sharing Data Reporting

7 What are DATA? Any information or observations that are associated with a particular project Includes experimental specimens, technologies, and products related to the inquiry

8

9

10

11 Data Ownership Refers to the control and rights over the data, as well as data management and use The Sponsoring Institution The Funding Agency The Principal Investigator

12 Data Ownership Refers to the control and rights over the data, as well as data management and use The Sponsoring Institution Maintains ownership of a project s data as long as the PI is employed by that institution Controls funding, thus is responsible for ensuring responsibility and ethics The PI is granted stewardship over the project data, subject to institutional review The Funding Agency The Principal Investigator

13 Data Ownership Refers to the control and rights over the data, as well as data management and use The Sponsoring Institution The Funding Agency Federal government, foundations, industry Often have specific stipulations for how data are retained and disseminated The Principal Investigator

14 Data Ownership Refers to the control and rights over the data, as well as data management and use The Sponsoring Institution The Funding Agency The Principal Investigator Is the steward of a project s data May retain some ownership of the data Sometimes are allowed to take their research and its data if they move

15 Subjects as stakeholders Individuals who suggest research ideas and/or participate in the research Informed consent imposes limitations on future use It is important to consider study participants beneficence and dignity

16 Data Collection Provides the information necessary to develop and justify research What information is recorded How that information is recorded How a research project is designed AIM: uphold the integrity of the project, the institution, and the researchers Collect reliable and valid data Accurately analyze and assess work by researchers Independent replication Provides justification to sponsors

17 Collecting reliable data Collection is reliable when consistent and comprehensive Data collection guidelines and methodologies should be developed before the research begins Thorough training of team members Well-planned and systematic data collection Thorough data collection enables team members to answer any question about a project Purpose of research Methodologies chosen Methodology implementation How data were collected and analyzed Unexpected results or significant errors Implications and future directions

18 Collecting valid data Record keeping is essential to ensure the validity of the data Good science is precise and honest Smaller projects are often recorded in bound notebooks Record keeping Records should accurately represent the progress of a project Should answer: WHAT, HOW, WHY data were collected or amended Records should be durable and accessible Errors should be marked and dated, never erased Include notes that described what actually occurred, what worked or didn t Entries should be chronological and consistent Indelible pen (not pencil) Records should be safe from tampering or falsification Record ANYTHING that seems RELEVANT to the project, its data, and the project s standards

19 Collecting valid data Record keeping is essential to ensure the validity of the data Electronic records Policies and Procedures There are a large number of programs that allow researchers to enter, store, and audit research data Security of records is a significant concern Most projects use a combination of handwritten/electronic records Should be aware of all the guidelines that apply to the project Human and animal subject regulations Hazardous materials Controlled biological agents

20 Minimal data to record Date and Time Names and roles of any team members who worked with the data Materials, instruments, software used ID numbers to indicate subject and/or session Data from the experiment and any pertinent observations about the collection of data

21 Data Storage Safeguards your research, allows future access Safeguards research investment Allows future access to explain or augment subsequent research Other researchers must be able to evaluate or use the results of your research Can be used to establish precedence in the event of publication of similar data Can protect subjects and researchers in the event of legal allegations Enough data should be stored so that a project can be reconstructed with ease All primary data related to a publication must be saved (5 years as per HMS, best forever) Electronic data: Thorough documentation Storage format that is easily adaptable Rapid access Low cost Archives Removability Backup system

22 Data Protection Best way to protect data is by limiting access Protection from physical damage and tampering, loss, theft Pis decide who is authorized to access and manage data Notebooks and questionnaires should be locked Encoded identifiers to protect identity Hacking and theft are concerns with digital data Protect access to data IDs and passwords Centralized access Limit admin rights Protect your system Anti-virus Updates Firewall Protect data integrity Record original creation date and time Encryption, signatures, watermarking to keep track of changes Regular backups, hard and soft copies Ensure proper destruction

23 Data Retention Sponsor Institutions and funding agencies have their requirements USDHHS requires data be retained for at least 3 years after the funding period ends Once minimum is met, PI must decide Data must be thoroughly and completely destroyed when disposed of Electronic data must be irretrievable

24 Data Analysis The form of analysis must be appropriate for the project s needs The way raw data are chosen, evaluated, and expressed To translate data into meaningful information, it must be managed and analyzed appropriately Guidelines and objectives should be determined before a project begins All team members should understand the data analysis plan and be able to interpret results

25 Data Analysis It is important to avoid potential pitfalls that can invalidate or lessen the integrity of the data Methods of analysis Usage of data Researchers should work within the accepted standards Deviations must be justified Awareness of the abilities and limitations of a chosen method of analysis Include or exclude outliers Missing or incomplete data Appropriate alteration or amendment Data display and organization Responsible analysis accurately represents what occurred, but does not overstate the importance

26 Data Analysis It is important to avoid potential pitfalls that can invalidate or lessen the integrity of the data Intentional falsification or fabrication Appropriate data amendment or exclusion Forging: inventing data or experiments never performed Cooking: retaining only those results that fit the hypothesis Trimming: unreasonable smoothing of irregularities to make the data look more accurate and precise Instrument malfunctions Loss or change in subjects or specimens Interruptions or deviations in procedure

27 Data Sharing and Reporting The way in which research is represented to the scientific community and the general public Data are expected to be shared and reported Acknowledge a study s implications Contribute to a field of study Stimulate new ideas Before publication, often no obligation to share preliminary data (even discouraged) Can benefit from feedback from peers (but can be stolen) After publication, any information related to the project should be considered open data Other researchers may request raw data or miscellaneous information Various guidelines and restrictions may apply Government-sponsored research or research related to biological agents may be subject to legislation (Patriot Act, Freedom of Information Act)

28 Data Sharing and Reporting The way in which research is represented to the scientific community and the general public NIH policy: The NIH expects and supports the timely release and sharing of final research data from NIH-supported studies for use by other researchers /guide/notice-files/not-od html

29 Research Misconduct The Office of Science and Technology Policy (OSTP) in the Executive Office of the President adopted a Federal Policy on Research Misconduct in 2000 OSTP Policy defines research misconduct as fabrication, falsification, or plagiarism in proposing, performing, or reviewing research, or in reporting research results

30 Misconduct Fabrication is making up data or results and recording or reporting them. Falsification is manipulating research materials, equipment, or processes, or changing or omitting data or results such that the research is not accurately represented in the research record. Plagiarism is the appropriation of another person s ideas, processes, results, or words without giving appropriate credit. Research misconduct does not include differences of opinion.

31 Editorials address misconduct

32 Gross manipulation of blots Rockefeller University Press Mike Rossner, and Kenneth M. Yamada J Cell Biol 2004;166:11-15

33 Gross manipulation of blots Rockefeller University Press Mike Rossner, and Kenneth M. Yamada J Cell Biol 2004;166:11-15

34 Manipulation of blots: brightness and contrast adjustments. Manipulation of blots: brightness and contrast adjustments. (A) Adjusting the intensity of a single band (arrow). B) Adjustments of contrast. Images 1, 2, and 3 show sequentially more severe adjustments of contrast. Although the adjustment from 1 to 2 is acceptable because it does not obscure any of the bands, the adjustment from 2 to 3 is unacceptable because several bands are eliminated. Cutting out a strip of a blot with the contrast adjusted provides the false impression of a very clean result (image 4 was derived from a heavily adjusted version of the left lane of image 1). For a more detailed discussion of gel slicing and dicing, see Nature Cell Biology editorial (2) Rockefeller University Press Mike Rossner, and Kenneth M. Yamada J Cell Biol 2004;166:11-15

35 Manipulation of blots: cleaning up background. Manipulation of blots: cleaning up background. The Photoshop Rubber Stamp tool has been used in the manipulated image to clean up the background in the original data. Close inspection of the image reveals a repeating pattern in the left lane of the manipulated image, indicating that such a tool has been used Rockefeller University Press Mike Rossner, and Kenneth M. Yamada J Cell Biol 2004;166:11-15

36 Misrepresentation of immunogold data. Misrepresentation of immunogold data. The gold particles, which were actually present in the original (left), have been enhanced in the manipulated image (right). Note also that the background dot in the original data has been removed in the manipulated image. Mike Rossner, and Kenneth M. Yamada J Cell Biol 2004;166: Rockefeller University Press

37 Misrepresentation of image data. Misrepresentation of image data. Cells from various fields have been juxtaposed in a single image, giving the impression that they were present in the same microscope field. A manipulated panel is shown at the top. The same panel, with the contrast adjusted by us to reveal the manipulation, is shown at the bottom Rockefeller University Press Mike Rossner, and Kenneth M. Yamada J Cell Biol 2004;166:11-15

38 Other Data Management Issues Keep original digital or analog data exactly as they were acquired Selective acquisition of data by adjusting settings on the instrument Record instrument settings Some journal reviewers or editors request access to such primary data to ensure accuracy Selecting and reporting a very unusual result as representative Hiding negative results that may contradict your conclusions Mike Rossner, and Kenneth M. Yamada J Cell Biol 2004;166:11-15

39 Philosophy of data manipulation For every adjustment that you make to a digital image, it is important to ask yourself, Is the image that results from this adjustment still an accurate representation of the original data? If the answer to this question is no, your actions may be construed as misconduct. Mike Rossner, and Kenneth M. Yamada J Cell Biol 2004;166:11-15

40 A matter of trust

41 Happy researching!

Ethics and Omics. Jeffrey Engler, Ph.D. Dept of Biochemistry and Molecular Genetics Associate Dean, UAB Graduate School

Ethics and Omics. Jeffrey Engler, Ph.D. Dept of Biochemistry and Molecular Genetics Associate Dean, UAB Graduate School Ethics and Omics Jeffrey Engler, Ph.D. Dept of Biochemistry and Molecular Genetics Associate Dean, UAB Graduate School Office of Research Integrity/DHHS http://ori.hhs.gov/education/products /clinicaltools/data.pdf

More information

Biological Material Transfer Agreement. between (PROVIDER) and. Date: A. Specific Terms of Agreement (Implementing Section)

Biological Material Transfer Agreement. between (PROVIDER) and. Date: A. Specific Terms of Agreement (Implementing Section) Biological Material Transfer Agreement between (PROVIDER) and (RECIPIENT) regarding (ORIGINAL MATERIAL). A. Specific Terms of Agreement (Implementing Section) I. ORIGINAL MATERIAL: II. PROVIDER of the

More information

Uniform Biological Material Transfer Agreement (UBMTA)

Uniform Biological Material Transfer Agreement (UBMTA) Uniform Biological Material Transfer Agreement (UBMTA) I. Definitions 1. PROVIDER: Organization providing the ORIGINAL MATERIAL. The name and address of this party will be specified in an implementing

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Survey of Research Data Management Practices at the University of Pretoria

Survey of Research Data Management Practices at the University of Pretoria Survey of Research Data Management Practices at the University of Pretoria Undertaken by the Department of Library Services in order to improve research practices at the University Unisa Library Open Access

More information

NEES Community and Communication (NEEScomm) Data Sharing and Archiving Policies and Guidelines, Version 1. December

NEES Community and Communication (NEEScomm) Data Sharing and Archiving Policies and Guidelines, Version 1. December Introduction Policies Definitions References This document promulgates policies and guidelines from the George E. Brown, Jr. Network for Earthquake Engineering Simulation (NEES) Consortium, Inc. for archiving

More information

Survey of research data management practices at the University of Pretoria, South Africa: October 2009 March 2010

Survey of research data management practices at the University of Pretoria, South Africa: October 2009 March 2010 Survey of research data management practices at the University of Pretoria, South Africa: October 2009 March 2010 Undertaken by the Department of Library Services in order to improve research practices

More information

1. PROVIDER: Organization providing the ORIGINAL MATERIAL. The name and address of this party will be specified in an implementing letter.

1. PROVIDER: Organization providing the ORIGINAL MATERIAL. The name and address of this party will be specified in an implementing letter. Upon execution of an Implementing Letter in the form attached which specifies the materials to be transferred, this organization agrees to be bound by the terms of the attached Uniform Biological Material

More information

Material Transfer Agreement

Material Transfer Agreement Material Transfer Agreement Definitions: Provider: Provider Scientist: Recipient: Recipient Scientist: Original Material: Material: Original Material, Progeny, and Unmodified Derivatives. The MATERIAL

More information

Uniform Biological Material Transfer Agreement SAMPLE

Uniform Biological Material Transfer Agreement SAMPLE Uniform Biological Material Transfer Agreement The purpose of this agreement is to provide a record of the biological material transfer and to memorialize the agreement between the PROVIDER, PROVIDER S

More information

STANDARD PENN STATE BIOLOGICAL MATERIAL TRANSFER AGREEMENT. 1. PROVIDER: The Pennsylvania State University.

STANDARD PENN STATE BIOLOGICAL MATERIAL TRANSFER AGREEMENT. 1. PROVIDER: The Pennsylvania State University. I. Definitions: STANDARD PENN STATE BIOLOGICAL MATERIAL TRANSFER AGREEMENT 1. PROVIDER: The Pennsylvania State University. 2 PROVIDER SCIENTIST: Dr. Song Tan. 3. RECIPIENT: Organization receiving the ORIGINAL

More information

FDA 21 CFR Part 11 Compliance by Metrohm Raman

FDA 21 CFR Part 11 Compliance by Metrohm Raman FDA 21 CFR Part 11 Compliance by Metrohm Raman Norms and Standards 21 CFR Part 11 is the FDA rule relating to the use of electronic records and electronic signatures. Recognizing the increasing pact of

More information

Make sure you delete all red type explanations. NOTE: Anticipate no action on applications that do not meet the timeline as posted on the IRB web site

Make sure you delete all red type explanations. NOTE: Anticipate no action on applications that do not meet the timeline as posted on the IRB web site APPLICATION FOR REVIEW OF HUMAN PARTICIPANTS RESEARCH The following is designed to briefly introduce you to important considerations when answering each item. There is no one correct answer for each item,

More information

UBMTA IMPLEMENTING LETTER. The Research Foundation of State University of New York, Upstate Medical University

UBMTA IMPLEMENTING LETTER. The Research Foundation of State University of New York, Upstate Medical University UBMTA IMPLEMENTING LETTER The Research Foundation of State University of New York Upstate Medical University The purpose of this letter is to provide a record of the biological material transfer, to memorialize

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

Academic Material Transfer Agreement University of Colorado

Academic Material Transfer Agreement University of Colorado Academic Material Transfer Agreement University of Colorado I. Definitions: 1. PROVIDER: Organization providing the ORIGINAL MATERIAL. The name and address of this party will be specified in Appendix A.

More information

Intégrité scientifique: Data Research Management

Intégrité scientifique: Data Research Management Intégrité scientifique: Data Research Management Definition of research data Research data are collected, observed or created, for the purposes of analysis to produce and validate original research results.

More information

Uniform Biological Material Transfer Agreement

Uniform Biological Material Transfer Agreement Uniform Biological Material Transfer Agreement UBMTA Implementing Letter for Outbound Einstein Materials The purpose of this letter is to provide a record of the biological material transfer, to memorialize

More information

Data Quality and Integrity Investigation in Laboratories (Analytical)

Data Quality and Integrity Investigation in Laboratories (Analytical) Data Quality and Integrity Investigation in Laboratories (Analytical) Dr. Ademola O. Daramola, DHSc., MPH Assistant Country Director International Relations Specialist (Drug) US FDA Office of International

More information

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER. When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Automation Change Management for Regulated Industries

Automation Change Management for Regulated Industries Automation Change Management for Regulated Industries Achieving Part 11 Compliance A White Paper Synopsis This whitepaper provides information related to FDA regulation 21 CFR Part 11 (Part 11) for organizations

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

INSTRUCTIONS FOR RECIPIENTS OF EMORY UNIVERSITY MATERIAL

INSTRUCTIONS FOR RECIPIENTS OF EMORY UNIVERSITY MATERIAL INSTRUCTIONS FOR RECIPIENTS OF EMORY UNIVERSITY MATERIAL Material Transfer Agreement for Government Agencies, Academic Institutions and Non- Profit Entities Please read these instructions carefully and

More information

White Paper Assessment of Veriteq viewlinc Environmental Monitoring System Compliance to 21 CFR Part 11Requirements

White Paper Assessment of Veriteq viewlinc Environmental Monitoring System Compliance to 21 CFR Part 11Requirements White Paper Assessment of Veriteq viewlinc Environmental Monitoring System Compliance to 21 CFR Part 11Requirements Introduction The 21 CFR Part 11 rule states that the FDA view is that the risks of falsification,

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

This version has been archived. Find the current version at on the Current Documents page. Archived Version. Capture of Live Systems

This version has been archived. Find the current version at   on the Current Documents page. Archived Version. Capture of Live Systems Scientific Working Group on Digital Evidence Capture of Live Systems Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail

More information

21 CFR Part 11 LIMS Requirements Electronic signatures and records

21 CFR Part 11 LIMS Requirements Electronic signatures and records 21 CFR Part 11 LIMS Requirements Electronic signatures and records Compiled by Perry W. Burton Version 1.0, 16 August 2014 Table of contents 1. Purpose of this document... 1 1.1 Notes to version 1.0...

More information

Part 11 Compliance SOP

Part 11 Compliance SOP 1.0 Commercial in Confidence 16-Aug-2006 1 of 14 Part 11 Compliance SOP Document No: SOP_0130 Prepared by: David Brown Date: 16-Aug-2006 Version: 1.0 1.0 Commercial in Confidence 16-Aug-2006 2 of 14 Document

More information

Assessment of Vaisala Veriteq viewlinc Continuous Monitoring System Compliance to 21 CFR Part 11 Requirements

Assessment of Vaisala Veriteq viewlinc Continuous Monitoring System Compliance to 21 CFR Part 11 Requirements / White PAPer Assessment of Vaisala Veriteq viewlinc Continuous Monitoring System Compliance to 21 CFR Part 11 Requirements The 21 CFR Part 11 rule states that the FDA view is that the risks of falsification,

More information

Focus: Themes within Introduction and Context

Focus: Themes within Introduction and Context The following slides repeat the same pattern of; DICE DMP breakdown summary, general topics within the DMP topic, then UH Template questions. There are some generic examples and UH specific solutions.

More information

Compliance Matrix for 21 CFR Part 11: Electronic Records

Compliance Matrix for 21 CFR Part 11: Electronic Records Compliance Matrix for 21 CFR Part 11: Electronic Records Philip E. Plantz, PhD, Applications Manager David Kremer, Senior Software Engineer Application Note SL-AN-27 Revision B Provided By: Microtrac,

More information

COMPLIANCE. associates VALIDATOR WHITE PAPER. Addressing 21 cfr Part 11

COMPLIANCE. associates VALIDATOR WHITE PAPER. Addressing 21 cfr Part 11 VALIDATOR WHITE PAPER Addressing 21 cfr Part 11 Compliance Associates 1 1 INTRODUCTION 21 CFR Part 11 has been become a very large concern in the pharmaceutical industry as of late due to pressure from

More information

Biological Material Transfer Agreement

Biological Material Transfer Agreement Biological Material Transfer Agreement I. Definitions: 1. PROVIDER: The Research Foundation for The State University of New York Office for Innovation Development & Commercialization University at Albany

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

NucleoCounter NC-200, NucleoView NC-200 Software and Code of Federal Regulation 21 Part 11; Electronic Records, Electronic Signatures (21 CFR Part 11)

NucleoCounter NC-200, NucleoView NC-200 Software and Code of Federal Regulation 21 Part 11; Electronic Records, Electronic Signatures (21 CFR Part 11) NucleoCounter NC-200, NucleoView NC-200 Software and Code of Federal Regulation 21 Part 11; Electronic Records, Electronic Signatures (21 CFR Part 11) A ChemoMetec A/S White Paper March 2014 ChemoMetec

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Introduction The purpose of this document is to provide a concise policy regarding the data protection obligations of Youth Work Ireland. Youth Work Ireland is a data controller

More information

RECORDS MANAGEMENT AND YOU

RECORDS MANAGEMENT AND YOU RECORDS MANAGEMENT AND YOU Carolyn Smith S.C. Archives & History Why Records Management Matters Citizens have a right to know. Records have historical importance. Good records makes your job easier. What

More information

OpenLAB ELN Supporting 21 CFR Part 11 Compliance

OpenLAB ELN Supporting 21 CFR Part 11 Compliance OpenLAB ELN Supporting 21 CFR Part 11 Compliance White Paper Overview Part 11 in Title 21 of the Code of Federal Regulations includes the US Federal guidelines for storing and protecting electronic records

More information

Ethics in Research Publications

Ethics in Research Publications Library Access for Success: Ethics in Research Publications Webinar Series by the Webinar Feed 5 the of 5 Future Innovation November 28, Lab 2018 for Livestock Systems Presented by: Feed the Future August

More information

Developing a Research Data Policy

Developing a Research Data Policy Developing a Research Data Policy Core Elements of the Content of a Research Data Management Policy This document may be useful for defining research data, explaining what RDM is, illustrating workflows,

More information

Leveraging ALCOA+ Principles to Establish a Data Lifecycle Approach for the Validation and Remediation of Data Integrity. Bradford Allen Genentech

Leveraging ALCOA+ Principles to Establish a Data Lifecycle Approach for the Validation and Remediation of Data Integrity. Bradford Allen Genentech Leveraging ALCOA+ Principles to Establish a Data Lifecycle Approach for the Validation and Remediation of Data Integrity Bradford Allen Genentech 1 Agenda Introduction Data Integrity 101 Review What is

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy Malpractice and Maladministration Policy Introduction This policy is aimed at our customers, including learners, who are delivering/registered on BCS approved qualifications or units within or outside

More information

Electronic Records and Signatures with the Sievers M9 TOC Analyzer and DataPro2 Software

Electronic Records and Signatures with the Sievers M9 TOC Analyzer and DataPro2 Software Water Technologies & Solutions fact sheet 21 CFR Part 11 Electronic Records and Signatures with the Sievers M9 TOC Analyzer and DataPro2 Software introduction Part 11 of Title 21 of the Code of Federal

More information

Privacy Policy: International Confederation on Amputee Associations (IC2A) Policy document issue date: 25 May 2018 Updated: 5 October 2018

Privacy Policy: International Confederation on Amputee Associations (IC2A) Policy document issue date: 25 May 2018 Updated: 5 October 2018 Privacy Policy: IC2A Contents 1. Privacy commitment... 2 2. Named data protection officer... 2 3. Information IC2A collects and processes personally identifiable information... 2 3.1 As a representative

More information

ICS-ACI Policy Series

ICS-ACI Policy Series ICS-ACI Policy Series This is part of a series of documents that make up the formal policies adopted by the Institute for CyberScience at the Pennsylvania State University. Last Updated: September 5, 2017

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

DIRECTIVE ON RECORDS AND INFORMATION MANAGEMENT (RIM) January 12, 2018

DIRECTIVE ON RECORDS AND INFORMATION MANAGEMENT (RIM) January 12, 2018 DIRECTIVE ON RECORDS AND INFORMATION MANAGEMENT (RIM) January 12, 2018 A. OVERRIDING OBJECTIVE 1.1 This Directive establishes the framework for information management of the Asian Infrastructure Investment

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

HIPAA Security Rule Policy Map

HIPAA Security Rule Policy Map Rule Policy Map Document Information Identifier Status Published Published 02/15/2008 Last Reviewed 02/15/1008 Last Updated 02/15/2008 Version 1.0 Revision History Version Published Author Description

More information

RMU-IT-SEC-01 Acceptable Use Policy

RMU-IT-SEC-01 Acceptable Use Policy 1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities

More information

Research Data Management Procedures

Research Data Management Procedures Research Data Management Procedures INTRODUCTION The University is committed to providing a research environment that will promote a high standard of professional conduct by its researchers, and a culture

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Data Integrity and Worldwide Regulatory Guidance

Data Integrity and Worldwide Regulatory Guidance 20 Data Integrity and Worldwide Regulatory Guidance Rohit A. Patil, Shruti N.Patil Department of Regulatory Affairs Supreme Pharma Healthcare Pvt. Ltd. Mumbai rohitpharma3250@gmail.com ABSTRACT Good storage

More information

DISPOSITION OF MATERIALS FROM CASES IN THE DEPARTMENT OF VETERINARY PATHOLOGY

DISPOSITION OF MATERIALS FROM CASES IN THE DEPARTMENT OF VETERINARY PATHOLOGY DISPOSITION OF MATERIALS FROM CASES IN THE DEPARTMENT OF VETERINARY PATHOLOGY This document addresses the protocol for release of reports or materials (our medical records) from the Department of Veterinary

More information

First aid toolkit for the management of data breaches. Mary Deligianni Senior Associate 15 February 2018

First aid toolkit for the management of data breaches. Mary Deligianni Senior Associate 15 February 2018 First aid toolkit for the management of data breaches Mary Deligianni Senior Associate 15 February 2018 What is a personal data breach? Breach of security which leads to the accidental or unlawful destruction,

More information

EISAS Enhanced Roadmap 2012

EISAS Enhanced Roadmap 2012 [Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

Instructions for recipient scientist/institution:

Instructions for recipient scientist/institution: Instructions for recipient scientist/institution: If the language in the Oregon Health & Science University s (OHSU) NON-PROFIT TO NON-PROFIT BIOLOGICAL MATERIAL TRANSFER AGREEMENT (BMTA) is acceptable

More information

Completing & Submitted the IRB Approval of Human Subjects Form

Completing & Submitted the IRB Approval of Human Subjects Form Completing & Submitted the IRB Approval of Human Subjects Form All areas of the form should be completed. Once completed it must be submitted to the IRB by sending it to the EU IRB Chairperson. The following

More information

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

4.2 Electronic Mail Policy

4.2 Electronic Mail Policy Policy Statement E-mail is an accepted, efficient communications tool for supporting departmental business. As provided in the Government Records Act, e-mail messages are included in the definition of

More information

JRO RMG RSS SOP 12. Standard Operating Procedure (SOP) for Study Closedown and Archiving

JRO RMG RSS SOP 12. Standard Operating Procedure (SOP) for Study Closedown and Archiving Office Location: 1 st Floor Maple House 149 Tottenham Court Road London W1T 7DN Joint Research Office Tel No. 0845 1555 000 Web-sites: www.uclh.nhs.uk; www.ucl.ac.uk/jro Postal Address: UCL, Gower Street

More information

GOCO.IO, INC TERMS OF SERVICE

GOCO.IO, INC TERMS OF SERVICE GOCO.IO, INC TERMS OF SERVICE GoCo.io, Inc. ("GoCo", the "Site", "https://www.goco.io") welcomes you! GoCo provides services to you subject of the following terms of service (the "Agreement"). The Agreement

More information

LCU Privacy Breach Response Plan

LCU Privacy Breach Response Plan LCU Privacy Breach Response Plan Sept 2018 Prevention Communication & Notification Evaluation of Risks Breach Containment & Preliminary Assessment Introduction The Credit Union makes every effort to safeguard

More information

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

FOOT LOCKER PRIVACY POLICY

FOOT LOCKER PRIVACY POLICY Foot Locker Privacy Statement: ( Foot Locker ) is committed to upholding fundamental principles of privacy and security in our relationship with our in-store customers and visitors to our web site. Our

More information

NIST Risk Assessment for Part 11 Compliance: Evaluation of a GXP Case Study

NIST Risk Assessment for Part 11 Compliance: Evaluation of a GXP Case Study NIST Risk Assessment for Part 11 Compliance: Evaluation of a GXP Case Study Monica Fanjoy* 109 Fairground Road, Holly Springs, NC 27540, USA Summary Current guidance for compliance with 21 Code of Federal

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

Managing Your Record Retention Policy Safely

Managing Your Record Retention Policy Safely Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients

More information

DATA PROTECTION AND PRIVACY POLICY

DATA PROTECTION AND PRIVACY POLICY DATA PROTECTION AND PRIVACY POLICY Data Protection Act London Capital Group (Cyprus) Limited (LCG) may process information relating to you, including holding such information in a manual format or electronic

More information

System Assessment Report Relating to Electronic Records and Electronic Signatures; 21 CFR Part 11. System: StabNet (Software Version 1.

System Assessment Report Relating to Electronic Records and Electronic Signatures; 21 CFR Part 11. System: StabNet (Software Version 1. Page 1 /16 System Assessment Report Relating to Electronic Records and Electronic Signatures; 21 CFR Part 11 System: StabNet (Software Version 1.1) Page 2 /16 1 Procedures and Controls for Closed Systems

More information

COMMENTARY. Information JONES DAY

COMMENTARY. Information JONES DAY February 2010 JONES DAY COMMENTARY Massachusetts Law Raises the Bar for Data Security On March 1, 2010, what is widely considered the most comprehensive data protection and privacy law in the United States

More information

SDBOR Technology Control Plan (TCP) Project Title:

SDBOR Technology Control Plan (TCP) Project Title: SDBOR Technology Control Plan (TCP) Project Title: Principal Investigator: Phone: Department: Email: Description of Controls (EAR/ITAR Category): Location(s) Covered by TCP: Is sponsored research involved?

More information

System Assessment Report Relating to Electronic Records and Electronic Signatures; 21 CFR Part 11. System: tiamo (Software Version 2.

System Assessment Report Relating to Electronic Records and Electronic Signatures; 21 CFR Part 11. System: tiamo (Software Version 2. Page 1 /15 System Assessment Report Relating to Electronic Records and Electronic Signatures; 21 CFR Part 11 System: tiamo (Software Version 2.5) Page 2 /15 1 Procedures and Controls for Closed Systems

More information

PS 176 Removable Media Policy

PS 176 Removable Media Policy PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT AGREEMENT DATED [ ] BETWEEN: (1) SHELTERMANAGER LTD and (2) [ ] ( The Customer ) BACKGROUND (A) (B) (C) This Agreement is to ensure there is in place

More information

Acceptable Use Policy

Acceptable Use Policy IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations

More information

Sparta Systems TrackWise Solution

Sparta Systems TrackWise Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

2. The Information we collect and how we use it: Individuals and Organisations: We collect and process personal data from individuals and organisation

2. The Information we collect and how we use it: Individuals and Organisations: We collect and process personal data from individuals and organisation WOSDEC: Privacy Policy West of Scotland Development Education Centre WOSDEC - (We) are committed to protecting and respecting your privacy. This policy sets out how the personal information we collect

More information

SPECIAL REVIEW - SURPLUS COMPUTER EQUIPMENT DATA REMOVAL SPECIAL REPORT OCTOBER 2003

SPECIAL REVIEW - SURPLUS COMPUTER EQUIPMENT DATA REMOVAL SPECIAL REPORT OCTOBER 2003 SPECIAL REVIEW - SURPLUS COMPUTER EQUIPMENT DATA REMOVAL SPECIAL REPORT OCTOBER 2003 AUDIT SUMMARY We found sensitive information such as vaccination records, personnel records, credit card numbers, and

More information

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule Legal Disclaimer: This overview is not intended as legal advice and should not be taken as such. We recommend that you consult legal

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

Policy & Procedure Privacy Policy

Policy & Procedure Privacy Policy NUMBER POL 050 PAGES 12 VERSION V3.8 CREATED: LAST MODIFIED: REVISION: 05/11/2009 06/06/2018 06/06/2019 DOCUMENTS: Authority to Exchange Information Media Authority Student Staff Privacy Agreement REFERENCES:

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Privacy Breach Policy

Privacy Breach Policy 1. PURPOSE 1.1 The purpose of this policy is to guide NB-IRDT employees and approved users on how to proceed in the event of a privacy breach, and to demonstrate to stakeholders that a systematic procedure

More information

Exhibitor Software and 21 CFR Part 11

Exhibitor Software and 21 CFR Part 11 Exhibitor Software and 21 CFR Part 11 Subpart B Electronic Records 15 Columbia Drive Amherst, New Hampshire 03031-2334 No. 11.10 11.10(a) Controls for Closed Systems Validation of systems to ensure accuracy,

More information

Reviewers Guide on Clinical Trials

Reviewers Guide on Clinical Trials Reviewers Guide on Clinical Trials Office of Research Integrity & Compliance Version 2 Updated: June 26, 2017 This document is meant to help board members conduct reviews for Full Board: Clinical Trial

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

Electronic Data Processing 21 CFR Part 11

Electronic Data Processing 21 CFR Part 11 Live Webinar on How Does Compliance with 21 CFR Part 11 Ensure Data Integrity & Subject Safety in Clinical Research Wednesday, 19 June 2013 at 10:00 AM PST / 01:00 PM EST ByCharles H. Pierce, MD, PhD,

More information

Privacy policy. Definitions and interpretation

Privacy policy. Definitions and interpretation Privacy policy This privacy policy applies between you, the User of this Website and JS Seating & Desking and JS Office Interiors, the owner and provider of this Website. JS Seating & Desking and JS Office

More information

Integration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11

Integration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11 OpenLAB CDS Integration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11 Technical Note Introduction Part 11 in Title 21 of the Code of Federal Regulations includes

More information

Frequently Asked Question Regarding 201 CMR 17.00

Frequently Asked Question Regarding 201 CMR 17.00 Frequently Asked Question Regarding 201 CMR 17.00 What are the differences between this version of 201 CMR 17.00 and the version issued in February of 2009? There are some important differences in the

More information

Diplomatic Analysis. Case Study 03: HorizonZero/ZeroHorizon Online Magazine and Database

Diplomatic Analysis. Case Study 03: HorizonZero/ZeroHorizon Online Magazine and Database Diplomatic Analysis Case Study 03: HorizonZero/ZeroHorizon Online Magazine and Database Tracey Krause, UBC December 2006 INTRODUCTION The InterPARES 2 case study 03 was proposed to explore the distinction

More information

Red Flag Policy and Identity Theft Prevention Program

Red Flag Policy and Identity Theft Prevention Program Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible

More information

Security Policies and Procedures Principles and Practices

Security Policies and Procedures Principles and Practices Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability

More information

University Research Facility in Life Sciences The Hong Kong Polytechnic University. General User Policy

University Research Facility in Life Sciences The Hong Kong Polytechnic University. General User Policy 1. General information University Research Facility in Life Sciences The Hong Kong Polytechnic University General User Policy 1.1. The equipment of the University Research Facility in Life Sciences (ULS)

More information