Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application

Similar documents
Social and Economic Survey Research Institute Data Request Form

General Social Survey (GSS) NORC

[Utility Name] Identity Theft Prevention Program

Texas Education Agency

Information Technology Standards

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags Program. Purpose

Class Composer General Terms of Use

Prevention of Identity Theft in Student Financial Transactions AP 5800

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

Identity Theft Prevention Program. Effective beginning August 1, 2009

Technology / Export Control Plan (T/ECP)

Sparta Systems TrackWise Solution

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Identity Theft Prevention Policy

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

Virginia Commonwealth University School of Medicine Information Security Standard

Seattle University Identity Theft Prevention Program. Purpose. Definitions

Freedom of Information and Protection of Privacy (FOIPOP)

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

Privacy Breach Policy

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

PRIVACY NOTICE. 1.2 We may obtain or collect your Personal Data from various sources including but not limited to:

PRIVACY POLICY QUICK GUIDE TO CONTENTS

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

University of Pittsburgh Security Assessment Questionnaire (v1.7)

( Utility Name ) Identity Theft Prevention Program

WHITE PAPER- Managed Services Security Practices

Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES

Sparta Systems TrackWise Digital Solution

University of Wisconsin-Madison Policy and Procedure

Data protection policy

Enviro Technology Services Ltd Data Protection Policy

Polemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients.

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Privacy Policy. (GDPR compliance)

Data Privacy Breach Policy and Procedure

Privacy Impact Assessment (PIA) Tool

Data protection. 3 April 2018

Data Stored on an External Hard Drive. All requests for data must include the following information.

Hitachi ID Identity and Access Management Suite TRIAL USE LICENSE AGREEMENT. between

PCA Staff guide: Information Security Code of Practice (ISCoP)

Throughout this Data Use Notice, we use plain English summaries which are intended to give you guidance about what each section is about.

Website Privacy Policy

GEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures IIA (204.07) Authority: Effective Date: Page 1 of Bryson/Jacobs 04/21/15 6

Within the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ):

IDENTITY THEFT PREVENTION Policy Statement

Element Finance Solutions Ltd Data Protection Policy

HIPAA Federal Security Rule H I P A A

Sparta Systems Stratas Solution

Data security statement Volunteers

First National Bank and Trust P. O. Box 100 London, KY Attention: Statements

How to Register for NHPNet

Information Privacy Statement

Access to University Data Policy

Data Processing Agreement

INFORMATION ASSET MANAGEMENT POLICY

Data Protection Policy

The Data Protection Act 1998 Clare Hall Data Protection Policy

eirb Electronic Institutional Review Board User Guide For more information contact: Research Administration (803)

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

CERTIFICATE POLICY CIGNA PKI Certificates

Data Centers and Mission Critical Facilities Access and Physical Security Procedures

Creative Funding Solutions Limited Data Protection Policy

HIPAA Security and Privacy Policies & Procedures

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Emsi Privacy Shield Policy

Information Security Policy

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Employee Security Awareness Training Program

FIRESOFT CONSULTING Privacy Policy

Wireless Security Access Policy and Agreement

Sc r a n t o n Wi lk e s-ba r r e

Acceptable Use Policy

It s still very important that you take some steps to help keep up security when you re online:

SDBOR Technology Control Plan (TCP) Project Title:

Red Flag Policy and Identity Theft Prevention Program

Offer Description : Cisco Webex

Declaration. [To be made by organizations seeking from APNIC a change of registration details or a new maintainer object password]

1 Privacy Statement INDEX

Priv ac y Policy. Last upda ted:

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

DATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES

IRBManager Quick Start Guide INITIAL APPLICATION - OVERVIEW

Survey on Patient Safety Culture Database Data Use Agreement

Privacy Policy KPMG Australia

SECTION B (REQUIRED TO ADD A NEW USER OR MODIFY AN EXISTING USER)

PS Mailing Services Ltd Data Protection Policy May 2018

MINNESOTA GOVERNMENT DATA PRACTICES ACT

Ohio Supercomputer Center

VISTRA NETHERLANDS PRIVACY NOTICE

DATA STEWARDSHIP STANDARDS

General Data Protection Regulation

Data Compromise Notice Procedure Summary and Guide

Guidelines for Faculty Participation in SBIR and STTR

Starflow Token Sale Privacy Policy

Access Control Policy

United Council for Neurologic Subspecialties Examination Registration and Testing Guidelines

Automated Background Check System (ABCS)- Requesting Access Guide. April 2018

Transcription:

Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application The Investigator 2 must complete this application to request access to Sensitive NAES Data Set from the Annenberg Public Policy Center (APPC). An incomplete application may result in the return of your application without further review. If the space provided for response is inadequate, additional pages may be attached to this form as necessary. Investigator Information Please enter your contact information below. E-Mail Address Telephone Number Fax Number Receiving Organization 3 Mailing Address 1 The sensitive National Annenberg Election Survey Data ( Sensitive NAES Data Set ) are the restricted data files and materials provided by APPC, any copies or backups of those files and materials, and any product (whether electronic, hard copy, or otherwise) derived from them. APPC cannot release sensitive data from the 2008 NAES Online Survey because those data are the property of Knowledge Networks, the organization APPC contracted to collect the online data. 2 The Investigator is the individual who serves as the primary point of contact for all communications involving the application and any resulting agreement. The Investigator must hold a permanent faculty appointment at the Receiving Agency and assumes all responsibility for Receiving Agency employees compliance with all terms of any resulting agreement. 3 The Receiving Organization is the legal entity with which the Investigator is employed (e.g., a university or non-profit foundation). v2 12-3-07 APPC Sensitive NAES Data Set: Application Page 1 of 6

Research Staff Information Please list all Research Staff 4 that will have access to the NAES Data. All staff must be associated with the Investigator s Receiving Organization and may access Sensitive NAES Data Set only under the Investigator s supervision. 4 Research Staff are students, staff, and other faculty at the Receiving Organization who have obtained APPC authorization to use the Sensitive NAES Data Set under the Investigator s supervision. v2 12-3-07 APPC Sensitive NAES Data Set: Application Page 2 of 6

Restricted Data Requested In the area below, please list the Sensitive NAES Data Set being requested. Research Plan Please attach to this document a 1-to-2 page Research Plan indicating: Why the Sensitive NAES Data Set are needed to conduct the proposed research; Why there are no alternatives to the use of Sensitive NAES Data Set for the proposed research; How the Sensitive NAES Data Set will be used; and The scientific importance of the proposed research. Disclosure Protection Plan In the area below, describe the Disclosure Protection Plan by which the Investigator and Research Staff will avoid inadvertent disclosure of respondent identities in all resulting research and/or work, including, but not limited to, working papers, publications, and presentations. If APPC approves your application, this Disclosure Protection Plan will become part of the signed agreement. In any presentations or publications, Investigators and Research Staff should use only statistical information that does not permit the identification of any individual person, family, household, or employer. The Investigator and Research Staff must agree to exclude from any type of publication or presentation the listing and description of individual cases, as well as data or quotations from individual cases. The Investigator and Research Staff should not present the results of any analysis that could potentially identify respondents, either directly or indirectly. Only aggregate statistical data may be distributed. Cell sizes, marginal data, and strata must be of sufficient size to avoid disclosure. v2 12-3-07 APPC Sensitive NAES Data Set: Application Page 3 of 6

Investigators and Research Staff may not identify geographic areas at a level of detail more specific than is already available in the associated public files on the APPC website. If you have questions concerning the disclosure risk of your research products, APPC is available to provide a review. Please provide all materials at least two weeks in advance of their intended publication or release date. Data Protection Plan In the area below, please describe in detail your Data Protection Plan to protect the security of the NAES Data. The goal of the Data Protection Plan is to prevent persons other than the Investigator and Research Staff from gaining access to the NAES Data. As part of your Data Protection Plan, please describe all locations where the Sensitive NAES Data Set will be stored, both while in use and while not in use, including, but not limited to, electronic files, printouts, notes, removable storage devices, portable media, and backups. Sensitive NAES Data Set must not be stored in a location to which persons other than the Investigator and Research Staff have access. Describe the physical environment: building access, who else has access to the room, whether the room is locked or otherwise secured, and whether locked spaces within the room (storage cabinets, etc.) will be used. v2 12-3-07 APPC Sensitive NAES Data Set: Application Page 4 of 6

Describe the computing environment: the number of computers, protections present (passwords, encryption, etc.), who else has access to the computers, and whether the computers are attached to a network and/or the Internet. Also mention, if applicable, what secure methods will be used for transmitting the Sensitive NAES Data Set among the Investigator and Research Staff. E-Mail is not considered a secure method, nor is regular mail without a tracking number, nor is transfer over the Internet. v2 12-3-07 APPC Sensitive NAES Data Set: Application Page 5 of 6

Investigator Signature All of the information on this application and made in conjunction with this application is correct and true to the best of my knowledge. I authorize the Annenberg Public Policy Center (APPC) to verify all information supplied on or in connection with this application. (printed) Signature Date v2 12-3-07 APPC Sensitive NAES Data Set: Application Page 6 of 6