SlideShare une entreprise Scribd logo
1  sur  32
Ethics and Integrity
           in Data Use and
             Management
                       John E. Sidle, M.D., M.S.
                            May 10, 2010
This module was recorded at the health informatics-training course – data management series offered by the Regional East African
Centre for Health Informatics (REACH-Informatics) in Eldoret, Kenya. Funding was made possible by NIH’s Fogarty Center and a
                               (REACH-Informatics)
grant from the Rockefeller Center.   The training was held at the Academic Model Providing Access to Healthcare (AMPATH), a
                                                                                                                    (AMPATH),
USAID-funded program, supported by the Regenstrief Institute at Indiana University. The modules were created in collaboration with
                                                                        University.
the School of Informatics at IUPUI.
                             IUPUI.



                        Content licensed under Creative Commons Attribution-Share Alike 3.0 Unported
Objectives
Examine a brief history of ethics in research
and data management
Discuss pertinent principles of ethics in data
management
Discuss the concept of “data integrity” and
ethics in data management
Discuss applications for data management
personnel in ethical use of data
Outline
Definitions
Ethical Principles in Bioethics
Guidelines and Regulations
Data Integrity
Applications for ethics and maintenance of
data integrity
Definitions

   In·teg·ri·ty n. 1. Strict adherence to a standard of value
   or conduct. 2. Personal honesty and independence. 3.
   Completeness: unity 4.Soundness

   Eth·ic n. 1. A principle of right or good conduct. 2. A
   system of moral values. 3. ethics (sing. In number). The
   branch of philosophy dealing with the rules of right
   conduct.

Source: Webster’s II New Riverside Dictionary, Based on the Webster’s II New College
   Dictionary (1996)
Ethical Principles
Beneficence
   Minimize harm
   Maximize Benefits
Respect of Persons (Autonomy)
   Informed voluntary consent
   Vulnerable subjects must be protected
Justice
   Equity in distributing risks and benefits between
    populations
   “fairness” in dealing with research participants
   Equity between institutions and research partners
Clinical Data vs. Research Data:
     Are the Ethics Different?

Privacy and Confidentiality
Informed Consent vs. Implied Consent
Data Integrity / Data Quality
Data Security and Storage
Ethical Guidelines (for Research)
Declaration of Helsinki
   ethical standard used by the International Committee
    of Medical Journal Editors
   guidelines govern all medical research
CIOMS Guidelines
   Council for International Organizations of Medical
    Sciences
   developed guidelines in collaboration with WHO
Belmont Report
National Guidelines (Kenya)
Regulations
US: Code of Federal Regulations Title 45,
Part 46 (45CFR46)
FDA– 21CFR50 and 56
NIH--“he who has the gold makes the rules”
HIPAA—related both to clinical records and
use of subject data in research
45CFR46
US Code of Federal Regulations Title 45, Part
46 (45CFR46)
   Human Subjects Protections
   IRB requirements
   Protection of Vulnerable Subjects

Human subject
   Human subject means a living individual about whom
    an investigator (whether professional or student)
    conducting research obtains:
     (1) data through intervention or interaction with the
    individual, or
    (2) identifiable private information.
Privacy/Confidentiality
Applies to both clinical and research data

Major concern for patients when it comes
to electronic records and data

Must be safeguarded by all members on
the team
HIPAA
Health Insurance Portability and
Accountability Act of 1996 (HIPAA), HHS
issued regulations entitled Standards for
Privacy of Individually Identifiable Health
Information.
For most covered entities, compliance with
these regulations, known as the Privacy
Rule, was required by April14, 2003.
HIPAA and Privacy Rule
The Privacy Rule, at 45 CFR parts 160 and 164,
establishes a category of health information,
defined as protected health information (PHI),
which a covered entity may only use or disclose
to others in certain circumstances and under
certain conditions.
Usually requires an individual to provide signed
permission, known as an Authorization before a
covered entity can use or disclose the
individual's PHI for research purposes.
Need for authorization may be waived in some
instances by an IRB (and a Privacy Board)
Individually Identifiable Information
 and Protected Health Information
 Includes any subset of health information, including
 demographic information, that identifies the individual (or
 there is a reasonable basis to believe that the information
 can be used to identify the individual).
      1. Name
      2. All elements of dates except Year.
      3. SSN
      4. Driver's License Number
      5. Geographic subdivisions smaller than a State.
      6. URL's and IP's
      7. Vehicle Identifiers including VIN and License #
      8. Phone numbers
PHI
Individually identifiable information becomes PHI when it
is created or received by a covered entity:
   US health plans
   US health care clearinghouses
   US health providers that transmit electronic health information
A researcher is not a covered entity unless he/she is
also a provider within a covered entity.
Research is also governed by HIPAA if data is obtained
from a covered entity.
IRB may on occasion waive the HIPAA restrictions on
use of PHI
How does all this translate to
            practice?
Electronic health information (clinical or research)
   Can improve quality and safety of medical care
    (beneficence)
   Is key to showing outcomes in research on health and
    health practices (beneficence)
   Confidentiality and Privacy can be lost (breach of
    autonomy and beneficence)
   Can be used without a patient’s knowledge or consent
    (breach of autonomy)
   Might exclude some populations (breach of justice)
Data Integrity
The assurance that data is accurate, correct and
valid.
Accuracy and consistency of stored data,
indicated by an absence of any alteration in data
between two updates of a data record. Data
integrity is imposed within a database at its
design stage through the use of standard rules
and procedures, and is maintained through the
use of error checking and validation routines.
Exact duplication of the sent data at the
receiving end, achieved through the use of error
checking and correcting protocols.
Assurance that the data are unchanged from
creation to reception.
Data Integrity (2)
Process to maintain data integrity depends
on:
   Collection (accurate representation)
   Data transfer (accurate recording and transfer
    of data)
   Storage and Security (preventing loss of data)
   Sharing of Data
   Use of data (analysis)
Data Integrity (3)
Fabrication and Falsification of data are one of
the most serious challenges to data integrity
Human error also contributes to loss of data
integrity
Concern about research misconduct was a
primary motivation for a 1990 conference on
data management sponsored by the US
Department of Health and Human Services.
Conference summarized the many ways in
which the conduct of research depends on
responsible data management.
Data Integrity (4)
Responsible research begins with
experimental design and protocol approval
It involves recordkeeping in a way that
ensures accuracy and avoids bias
It guides criteria for including and
excluding data from statistical analyses
It entails responsibility for collection, use,
and sharing of data.
Data Integrity (5)
Everyone with a role in research has a
responsibility to ensure the integrity of the data.
The ultimate responsibility belongs to the
principal investigator, but the central importance
of data to all research means that this
responsibility extends to anyone who:
   helps in planning the study
    collecting the data
    analyzing or interpreting the research findings
    publishing the results of the study
    maintaining the research records.
Data Collection and Integrity
Because data collection can be repetitious, time-
consuming, and tedious there is a temptation to
underestimate its importance.
Those responsible for collecting data must be
adequately trained and motivated
They should employ methods that limit or
eliminate the effect of bias
They should keep records of what was done by
whom and when
Analysis and Selection of Data
The use of statistical methods varies widely
among research disciplines and also clinical
programs (reporting)
It is a laudable ideal to analyze and report all
data
Because it is not possible to report everything
that has been done, researchers must make
decisions about which studies, data points, and
methods of analysis to present.
Analysis and Selection of Data (2)
Must critically evaluate the reasons for
inclusion or exclusion of data, the
measures taken to avoid bias, and
possible ways in which bias may
nonetheless influence data selection
Must clearly document how the data were
obtained, selected, and analyzed--
especially if the methods are unusual or
potentially controversial
Retention of Data
What should be retained?
It may be impractical to store
extraordinarily large volumes of primary
data.
At minimum, enough data should be
retained to reconstruct what was done.
How long should clinical records be
retained?
Sharing of Data
This is considered an important part of
responsible research.
De-identified data should be shared so
that others can verify your conclusions or
analysis
Sharing of personal patient information is
NOT a good practice as noted in Privacy
sections earlier.
Data Security
Limiting Access
   Locked Paper Records Offices
   Limiting access to Paper or Electronic records
    to appropriate personnel
   Password Protection of electronic records
   Defined privileges for electronic data users
   Firewalls to prevent outside access
Regular Backups and proper archiving
Ownership of Data
Who owns the data that is generated?
   Patient?
   Institution?
   Funder?
   Investigator?
   Publisher?
Ethics in Publication—General
  guidelines pertinent to data
Research should strive to answer specific
questions—not just collect or mine data
Statistical issues (sample size) are an
important part of design to ensure that the
research data is likely to answer the
question
IRB approval is required when using
human subjects, human tissues, or
medical records
Publication Ethics and Data
   Management/Data Analysis

Data should be appropriately analyzed

Inappropriate analysis is not necessarily
ethical misconduct

Fabrication or falsification of data is
always ethical misconduct
Publication Ethics and Data
     Management/Analysis
Sources and methods of obtaining and
processing data should be disclosed
Data exclusions should be explained in full
Methods used to analyze data should be
explained in detail
Post hoc analysis of subgroups is
acceptable as long as this is disclosed
Data Bias should be discussed in all
publications of data or analysis
Questions??
THE WORK IS PROVIDED UNDER THE TERMS OF THIS
CREATIVE COMMONS PUBLIC LICENSE ("CCPL" OR "LICENSE"). THE
WORK IS PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE
LAW. ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER
       THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED.

Contenu connexe

Tendances

Research Misconduct
Research MisconductResearch Misconduct
Research MisconductWeam Banjar
 
Selective Reporting and Misrepresentation.pptx
Selective Reporting and Misrepresentation.pptxSelective Reporting and Misrepresentation.pptx
Selective Reporting and Misrepresentation.pptxDrDollyThankachan
 
The Committee on Publication Ethics (COPE) for Better Science
The Committee on Publication Ethics (COPE) for Better Science The Committee on Publication Ethics (COPE) for Better Science
The Committee on Publication Ethics (COPE) for Better Science Aboul Ella Hassanien
 
Module_3.pdf
Module_3.pdfModule_3.pdf
Module_3.pdfDorothyJ2
 
Information storage and retrieval PPT.pdf
Information storage and retrieval PPT.pdfInformation storage and retrieval PPT.pdf
Information storage and retrieval PPT.pdfSURAJDHIKAR1
 
Information retrieval 14 fuzzy set models of ir
Information retrieval 14 fuzzy set models of irInformation retrieval 14 fuzzy set models of ir
Information retrieval 14 fuzzy set models of irVaibhav Khanna
 
Introduction to indexing (presentation1)
Introduction to indexing (presentation1)Introduction to indexing (presentation1)
Introduction to indexing (presentation1)Mary May Porto
 
Predatory journals 2019
Predatory journals 2019Predatory journals 2019
Predatory journals 2019Hasanain Ghazi
 
Information retrieval system!
Information retrieval system!Information retrieval system!
Information retrieval system!Jane Garay
 
Research misconduct
Research misconductResearch misconduct
Research misconductPriya Bhave.
 
Research misconduct an introduction
Research misconduct an introductionResearch misconduct an introduction
Research misconduct an introductionSumit Singh
 
Research ethics scientific misconduct jpcfm
Research ethics   scientific misconduct jpcfm Research ethics   scientific misconduct jpcfm
Research ethics scientific misconduct jpcfm Dr Ghaiath Hussein
 
Ethics in research
Ethics in researchEthics in research
Ethics in researchAudrey Antee
 
Information Repackaging.pptx
Information Repackaging.pptxInformation Repackaging.pptx
Information Repackaging.pptxAsheryChishami1
 

Tendances (20)

Research Misconduct
Research MisconductResearch Misconduct
Research Misconduct
 
Selective Reporting and Misrepresentation.pptx
Selective Reporting and Misrepresentation.pptxSelective Reporting and Misrepresentation.pptx
Selective Reporting and Misrepresentation.pptx
 
Avoid salami slicing and duplicate publication
Avoid salami slicing and duplicate publicationAvoid salami slicing and duplicate publication
Avoid salami slicing and duplicate publication
 
The Committee on Publication Ethics (COPE) for Better Science
The Committee on Publication Ethics (COPE) for Better Science The Committee on Publication Ethics (COPE) for Better Science
The Committee on Publication Ethics (COPE) for Better Science
 
Module_3.pdf
Module_3.pdfModule_3.pdf
Module_3.pdf
 
Information seeking ppt
Information seeking pptInformation seeking ppt
Information seeking ppt
 
Publication Ethics
Publication EthicsPublication Ethics
Publication Ethics
 
Information storage and retrieval PPT.pdf
Information storage and retrieval PPT.pdfInformation storage and retrieval PPT.pdf
Information storage and retrieval PPT.pdf
 
Information retrieval 14 fuzzy set models of ir
Information retrieval 14 fuzzy set models of irInformation retrieval 14 fuzzy set models of ir
Information retrieval 14 fuzzy set models of ir
 
MEDLINE.pptx
MEDLINE.pptxMEDLINE.pptx
MEDLINE.pptx
 
Introduction to indexing (presentation1)
Introduction to indexing (presentation1)Introduction to indexing (presentation1)
Introduction to indexing (presentation1)
 
Predatory journals 2019
Predatory journals 2019Predatory journals 2019
Predatory journals 2019
 
Ethics in Research
Ethics in ResearchEthics in Research
Ethics in Research
 
Information retrieval system!
Information retrieval system!Information retrieval system!
Information retrieval system!
 
Research misconduct
Research misconductResearch misconduct
Research misconduct
 
Research misconduct an introduction
Research misconduct an introductionResearch misconduct an introduction
Research misconduct an introduction
 
Research ethics scientific misconduct jpcfm
Research ethics   scientific misconduct jpcfm Research ethics   scientific misconduct jpcfm
Research ethics scientific misconduct jpcfm
 
Open access publishing
Open access publishingOpen access publishing
Open access publishing
 
Ethics in research
Ethics in researchEthics in research
Ethics in research
 
Information Repackaging.pptx
Information Repackaging.pptxInformation Repackaging.pptx
Information Repackaging.pptx
 

En vedette

Data colonization
Data colonizationData colonization
Data colonizatione-Marefa
 
Cris consent public
Cris consent publicCris consent public
Cris consent publickclcompbio
 
Social Media, Healthcare and the Law
Social Media, Healthcare and the LawSocial Media, Healthcare and the Law
Social Media, Healthcare and the LawBrian Ahier
 
Ethics, Informatics and Obamacare
Ethics, Informatics and ObamacareEthics, Informatics and Obamacare
Ethics, Informatics and ObamacareBarry Smith
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital HealthMegan Ranney
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingNawanan Theera-Ampornpunt
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Nawanan Theera-Ampornpunt
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextNawanan Theera-Ampornpunt
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingNawanan Theera-Ampornpunt
 
Digital Ethics : Helping your brain to make decisions online
Digital Ethics : Helping your brain to make decisions online Digital Ethics : Helping your brain to make decisions online
Digital Ethics : Helping your brain to make decisions online Year of the X
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsAHMED ZINHOM
 
Eysenbach: Consumer health informatics
Eysenbach: Consumer health informaticsEysenbach: Consumer health informatics
Eysenbach: Consumer health informaticsGunther Eysenbach
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social MediaJanet Johnson
 
Health Informatics
Health InformaticsHealth Informatics
Health InformaticsJulesykora
 

En vedette (20)

Data colonization
Data colonizationData colonization
Data colonization
 
Cris consent public
Cris consent publicCris consent public
Cris consent public
 
anchal
anchalanchal
anchal
 
Social Media, Healthcare and the Law
Social Media, Healthcare and the LawSocial Media, Healthcare and the Law
Social Media, Healthcare and the Law
 
Ethics, Informatics and Obamacare
Ethics, Informatics and ObamacareEthics, Informatics and Obamacare
Ethics, Informatics and Obamacare
 
Mdh ethics in social media pdf
Mdh ethics in social media pdfMdh ethics in social media pdf
Mdh ethics in social media pdf
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital Health
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision Making
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's Context
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision Making
 
Digital Ethics : Helping your brain to make decisions online
Digital Ethics : Helping your brain to make decisions online Digital Ethics : Helping your brain to make decisions online
Digital Ethics : Helping your brain to make decisions online
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informatics
 
Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3
 
Eysenbach: Consumer health informatics
Eysenbach: Consumer health informaticsEysenbach: Consumer health informatics
Eysenbach: Consumer health informatics
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
 
Health Informatics
Health InformaticsHealth Informatics
Health Informatics
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 

Similaire à Data Quality: Missing Data (PPT slides)

Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...ARDC
 
International Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docxInternational Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docxtarifarmarie
 
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...ARDC
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsMEASURE Evaluation
 
The Learning Health System: Thinking and Acting Across Scales
The Learning Health System: Thinking and Acting Across ScalesThe Learning Health System: Thinking and Acting Across Scales
The Learning Health System: Thinking and Acting Across ScalesPhilip Payne
 
Confidentiality manager training mha 690
Confidentiality manager training mha 690Confidentiality manager training mha 690
Confidentiality manager training mha 690nikki1919
 
Discussion #1 for Week 5RubricsWeekly Participation.docx
Discussion #1 for Week 5RubricsWeekly Participation.docxDiscussion #1 for Week 5RubricsWeekly Participation.docx
Discussion #1 for Week 5RubricsWeekly Participation.docxcuddietheresa
 
HIPAA&predictiveanalytics
HIPAA&predictiveanalyticsHIPAA&predictiveanalytics
HIPAA&predictiveanalyticsdmcgraw418
 
Research data management and sharing of medical data
Research data management and sharing of medical dataResearch data management and sharing of medical data
Research data management and sharing of medical dataARDC
 
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxPSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxwoodruffeloisa
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docxstudywriters
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docxwrite31
 
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...Health Data Consortium
 
Challenges and Opportunities Around Integration of Clinical Trials Data
Challenges and Opportunities Around Integration of Clinical Trials DataChallenges and Opportunities Around Integration of Clinical Trials Data
Challenges and Opportunities Around Integration of Clinical Trials DataCitiusTech
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docxteresehearn
 
Data management (1)
Data management (1)Data management (1)
Data management (1)SM Lalon
 
Research Data Management Services at UWA (November 2015)
Research Data Management Services at UWA (November 2015)Research Data Management Services at UWA (November 2015)
Research Data Management Services at UWA (November 2015)Katina Toufexis
 
Publishing and sharing sensitive data 28 June
Publishing and sharing sensitive data 28 JunePublishing and sharing sensitive data 28 June
Publishing and sharing sensitive data 28 JuneARDC
 
1Running Head Research Paper Final Draft6Research Paper.docx
1Running Head Research Paper Final Draft6Research Paper.docx1Running Head Research Paper Final Draft6Research Paper.docx
1Running Head Research Paper Final Draft6Research Paper.docxaulasnilda
 
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...
iHT2 Health IT Summit in Austin 2012 –  Deborah C. Peel, MD, Founder and Chai...iHT2 Health IT Summit in Austin 2012 –  Deborah C. Peel, MD, Founder and Chai...
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...Health IT Conference – iHT2
 

Similaire à Data Quality: Missing Data (PPT slides) (20)

Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...
 
International Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docxInternational Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docx
 
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health Records
 
The Learning Health System: Thinking and Acting Across Scales
The Learning Health System: Thinking and Acting Across ScalesThe Learning Health System: Thinking and Acting Across Scales
The Learning Health System: Thinking and Acting Across Scales
 
Confidentiality manager training mha 690
Confidentiality manager training mha 690Confidentiality manager training mha 690
Confidentiality manager training mha 690
 
Discussion #1 for Week 5RubricsWeekly Participation.docx
Discussion #1 for Week 5RubricsWeekly Participation.docxDiscussion #1 for Week 5RubricsWeekly Participation.docx
Discussion #1 for Week 5RubricsWeekly Participation.docx
 
HIPAA&predictiveanalytics
HIPAA&predictiveanalyticsHIPAA&predictiveanalytics
HIPAA&predictiveanalytics
 
Research data management and sharing of medical data
Research data management and sharing of medical dataResearch data management and sharing of medical data
Research data management and sharing of medical data
 
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxPSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docx
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docx
 
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
 
Challenges and Opportunities Around Integration of Clinical Trials Data
Challenges and Opportunities Around Integration of Clinical Trials DataChallenges and Opportunities Around Integration of Clinical Trials Data
Challenges and Opportunities Around Integration of Clinical Trials Data
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx
 
Data management (1)
Data management (1)Data management (1)
Data management (1)
 
Research Data Management Services at UWA (November 2015)
Research Data Management Services at UWA (November 2015)Research Data Management Services at UWA (November 2015)
Research Data Management Services at UWA (November 2015)
 
Publishing and sharing sensitive data 28 June
Publishing and sharing sensitive data 28 JunePublishing and sharing sensitive data 28 June
Publishing and sharing sensitive data 28 June
 
1Running Head Research Paper Final Draft6Research Paper.docx
1Running Head Research Paper Final Draft6Research Paper.docx1Running Head Research Paper Final Draft6Research Paper.docx
1Running Head Research Paper Final Draft6Research Paper.docx
 
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...
iHT2 Health IT Summit in Austin 2012 –  Deborah C. Peel, MD, Founder and Chai...iHT2 Health IT Summit in Austin 2012 –  Deborah C. Peel, MD, Founder and Chai...
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...
 

Plus de Saide OER Africa

Asp openly licensed stories for early reading in africa mar 2015 slideshare
Asp openly licensed stories for early reading in africa mar 2015 slideshareAsp openly licensed stories for early reading in africa mar 2015 slideshare
Asp openly licensed stories for early reading in africa mar 2015 slideshareSaide OER Africa
 
Quality Considerations in eLearning
Quality Considerations in eLearningQuality Considerations in eLearning
Quality Considerations in eLearningSaide OER Africa
 
African Storybook: The First 18 Months of the Project
African Storybook: The First 18 Months of the ProjectAfrican Storybook: The First 18 Months of the Project
African Storybook: The First 18 Months of the ProjectSaide OER Africa
 
Digital Storytelling for Multilingual Literacy Development: Implications for ...
Digital Storytelling for Multilingual Literacy Development: Implications for ...Digital Storytelling for Multilingual Literacy Development: Implications for ...
Digital Storytelling for Multilingual Literacy Development: Implications for ...Saide OER Africa
 
Integrating ICT in TVET for Effective Technology Enabled Learning
Integrating ICT in TVET for Effective Technology Enabled LearningIntegrating ICT in TVET for Effective Technology Enabled Learning
Integrating ICT in TVET for Effective Technology Enabled LearningSaide OER Africa
 
Higher Education Technology Outlook in Africa
Higher Education Technology Outlook in AfricaHigher Education Technology Outlook in Africa
Higher Education Technology Outlook in AfricaSaide OER Africa
 
eLearning or eKnowledge - What are we offering students?
eLearning or eKnowledge - What are we offering students?eLearning or eKnowledge - What are we offering students?
eLearning or eKnowledge - What are we offering students?Saide OER Africa
 
Understand school leadership and governance in the South African context (PDF)
Understand school leadership and governance in the South African context (PDF)Understand school leadership and governance in the South African context (PDF)
Understand school leadership and governance in the South African context (PDF)Saide OER Africa
 
Toolkit: Unit 8 - Developing a school-based care and support plan.
Toolkit: Unit 8 - Developing a school-based care and support plan.Toolkit: Unit 8 - Developing a school-based care and support plan.
Toolkit: Unit 8 - Developing a school-based care and support plan.Saide OER Africa
 
Toolkit: Unit 7 - Counselling support for vulnerable learners.
Toolkit: Unit 7 - Counselling support for vulnerable learners.Toolkit: Unit 7 - Counselling support for vulnerable learners.
Toolkit: Unit 7 - Counselling support for vulnerable learners.Saide OER Africa
 
Toolkit: Unit 6 - School-based aftercare.
Toolkit: Unit 6 - School-based aftercare.Toolkit: Unit 6 - School-based aftercare.
Toolkit: Unit 6 - School-based aftercare.Saide OER Africa
 
Toolkit: Unit 5 - Good nutrition for learning.
Toolkit: Unit 5 - Good nutrition for learning.Toolkit: Unit 5 - Good nutrition for learning.
Toolkit: Unit 5 - Good nutrition for learning.Saide OER Africa
 
Toolkit: Unit 3 - Care for vulnerable learners
Toolkit: Unit 3 - Care for vulnerable learnersToolkit: Unit 3 - Care for vulnerable learners
Toolkit: Unit 3 - Care for vulnerable learnersSaide OER Africa
 
Toolkit: Unit 2 - Schools as centres of care.
Toolkit: Unit 2 - Schools as centres of care.Toolkit: Unit 2 - Schools as centres of care.
Toolkit: Unit 2 - Schools as centres of care.Saide OER Africa
 
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...Saide OER Africa
 
Reading: Understanding Intrapersonal Characteristics (Word)
Reading: Understanding Intrapersonal Characteristics (Word)Reading: Understanding Intrapersonal Characteristics (Word)
Reading: Understanding Intrapersonal Characteristics (Word)Saide OER Africa
 
Reading: Understanding Intrapersonal Characteristics (pdf)
Reading: Understanding Intrapersonal Characteristics (pdf)Reading: Understanding Intrapersonal Characteristics (pdf)
Reading: Understanding Intrapersonal Characteristics (pdf)Saide OER Africa
 
Reading: Guidelines for Inclusive Learning Programmes (word)
Reading: Guidelines for Inclusive Learning Programmes (word)Reading: Guidelines for Inclusive Learning Programmes (word)
Reading: Guidelines for Inclusive Learning Programmes (word)Saide OER Africa
 
Reading: Guidelines for Inclusive Learning Programmes (pdf)
Reading: Guidelines for Inclusive Learning Programmes (pdf)Reading: Guidelines for Inclusive Learning Programmes (pdf)
Reading: Guidelines for Inclusive Learning Programmes (pdf)Saide OER Africa
 

Plus de Saide OER Africa (20)

Asp openly licensed stories for early reading in africa mar 2015 slideshare
Asp openly licensed stories for early reading in africa mar 2015 slideshareAsp openly licensed stories for early reading in africa mar 2015 slideshare
Asp openly licensed stories for early reading in africa mar 2015 slideshare
 
Quality Considerations in eLearning
Quality Considerations in eLearningQuality Considerations in eLearning
Quality Considerations in eLearning
 
African Storybook: The First 18 Months of the Project
African Storybook: The First 18 Months of the ProjectAfrican Storybook: The First 18 Months of the Project
African Storybook: The First 18 Months of the Project
 
Digital Storytelling for Multilingual Literacy Development: Implications for ...
Digital Storytelling for Multilingual Literacy Development: Implications for ...Digital Storytelling for Multilingual Literacy Development: Implications for ...
Digital Storytelling for Multilingual Literacy Development: Implications for ...
 
Integrating ICT in TVET for Effective Technology Enabled Learning
Integrating ICT in TVET for Effective Technology Enabled LearningIntegrating ICT in TVET for Effective Technology Enabled Learning
Integrating ICT in TVET for Effective Technology Enabled Learning
 
Higher Education Technology Outlook in Africa
Higher Education Technology Outlook in AfricaHigher Education Technology Outlook in Africa
Higher Education Technology Outlook in Africa
 
eLearning or eKnowledge - What are we offering students?
eLearning or eKnowledge - What are we offering students?eLearning or eKnowledge - What are we offering students?
eLearning or eKnowledge - What are we offering students?
 
The Rise of MOOCs
The Rise of MOOCsThe Rise of MOOCs
The Rise of MOOCs
 
Understand school leadership and governance in the South African context (PDF)
Understand school leadership and governance in the South African context (PDF)Understand school leadership and governance in the South African context (PDF)
Understand school leadership and governance in the South African context (PDF)
 
Toolkit: Unit 8 - Developing a school-based care and support plan.
Toolkit: Unit 8 - Developing a school-based care and support plan.Toolkit: Unit 8 - Developing a school-based care and support plan.
Toolkit: Unit 8 - Developing a school-based care and support plan.
 
Toolkit: Unit 7 - Counselling support for vulnerable learners.
Toolkit: Unit 7 - Counselling support for vulnerable learners.Toolkit: Unit 7 - Counselling support for vulnerable learners.
Toolkit: Unit 7 - Counselling support for vulnerable learners.
 
Toolkit: Unit 6 - School-based aftercare.
Toolkit: Unit 6 - School-based aftercare.Toolkit: Unit 6 - School-based aftercare.
Toolkit: Unit 6 - School-based aftercare.
 
Toolkit: Unit 5 - Good nutrition for learning.
Toolkit: Unit 5 - Good nutrition for learning.Toolkit: Unit 5 - Good nutrition for learning.
Toolkit: Unit 5 - Good nutrition for learning.
 
Toolkit: Unit 3 - Care for vulnerable learners
Toolkit: Unit 3 - Care for vulnerable learnersToolkit: Unit 3 - Care for vulnerable learners
Toolkit: Unit 3 - Care for vulnerable learners
 
Toolkit: Unit 2 - Schools as centres of care.
Toolkit: Unit 2 - Schools as centres of care.Toolkit: Unit 2 - Schools as centres of care.
Toolkit: Unit 2 - Schools as centres of care.
 
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...
 
Reading: Understanding Intrapersonal Characteristics (Word)
Reading: Understanding Intrapersonal Characteristics (Word)Reading: Understanding Intrapersonal Characteristics (Word)
Reading: Understanding Intrapersonal Characteristics (Word)
 
Reading: Understanding Intrapersonal Characteristics (pdf)
Reading: Understanding Intrapersonal Characteristics (pdf)Reading: Understanding Intrapersonal Characteristics (pdf)
Reading: Understanding Intrapersonal Characteristics (pdf)
 
Reading: Guidelines for Inclusive Learning Programmes (word)
Reading: Guidelines for Inclusive Learning Programmes (word)Reading: Guidelines for Inclusive Learning Programmes (word)
Reading: Guidelines for Inclusive Learning Programmes (word)
 
Reading: Guidelines for Inclusive Learning Programmes (pdf)
Reading: Guidelines for Inclusive Learning Programmes (pdf)Reading: Guidelines for Inclusive Learning Programmes (pdf)
Reading: Guidelines for Inclusive Learning Programmes (pdf)
 

Dernier

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Dernier (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Data Quality: Missing Data (PPT slides)

  • 1. Ethics and Integrity in Data Use and Management John E. Sidle, M.D., M.S. May 10, 2010 This module was recorded at the health informatics-training course – data management series offered by the Regional East African Centre for Health Informatics (REACH-Informatics) in Eldoret, Kenya. Funding was made possible by NIH’s Fogarty Center and a (REACH-Informatics) grant from the Rockefeller Center. The training was held at the Academic Model Providing Access to Healthcare (AMPATH), a (AMPATH), USAID-funded program, supported by the Regenstrief Institute at Indiana University. The modules were created in collaboration with University. the School of Informatics at IUPUI. IUPUI. Content licensed under Creative Commons Attribution-Share Alike 3.0 Unported
  • 2. Objectives Examine a brief history of ethics in research and data management Discuss pertinent principles of ethics in data management Discuss the concept of “data integrity” and ethics in data management Discuss applications for data management personnel in ethical use of data
  • 3. Outline Definitions Ethical Principles in Bioethics Guidelines and Regulations Data Integrity Applications for ethics and maintenance of data integrity
  • 4. Definitions In·teg·ri·ty n. 1. Strict adherence to a standard of value or conduct. 2. Personal honesty and independence. 3. Completeness: unity 4.Soundness Eth·ic n. 1. A principle of right or good conduct. 2. A system of moral values. 3. ethics (sing. In number). The branch of philosophy dealing with the rules of right conduct. Source: Webster’s II New Riverside Dictionary, Based on the Webster’s II New College Dictionary (1996)
  • 5. Ethical Principles Beneficence  Minimize harm  Maximize Benefits Respect of Persons (Autonomy)  Informed voluntary consent  Vulnerable subjects must be protected Justice  Equity in distributing risks and benefits between populations  “fairness” in dealing with research participants  Equity between institutions and research partners
  • 6. Clinical Data vs. Research Data: Are the Ethics Different? Privacy and Confidentiality Informed Consent vs. Implied Consent Data Integrity / Data Quality Data Security and Storage
  • 7. Ethical Guidelines (for Research) Declaration of Helsinki  ethical standard used by the International Committee of Medical Journal Editors  guidelines govern all medical research CIOMS Guidelines  Council for International Organizations of Medical Sciences  developed guidelines in collaboration with WHO Belmont Report National Guidelines (Kenya)
  • 8. Regulations US: Code of Federal Regulations Title 45, Part 46 (45CFR46) FDA– 21CFR50 and 56 NIH--“he who has the gold makes the rules” HIPAA—related both to clinical records and use of subject data in research
  • 9. 45CFR46 US Code of Federal Regulations Title 45, Part 46 (45CFR46)  Human Subjects Protections  IRB requirements  Protection of Vulnerable Subjects Human subject  Human subject means a living individual about whom an investigator (whether professional or student) conducting research obtains: (1) data through intervention or interaction with the individual, or (2) identifiable private information.
  • 10. Privacy/Confidentiality Applies to both clinical and research data Major concern for patients when it comes to electronic records and data Must be safeguarded by all members on the team
  • 11. HIPAA Health Insurance Portability and Accountability Act of 1996 (HIPAA), HHS issued regulations entitled Standards for Privacy of Individually Identifiable Health Information. For most covered entities, compliance with these regulations, known as the Privacy Rule, was required by April14, 2003.
  • 12. HIPAA and Privacy Rule The Privacy Rule, at 45 CFR parts 160 and 164, establishes a category of health information, defined as protected health information (PHI), which a covered entity may only use or disclose to others in certain circumstances and under certain conditions. Usually requires an individual to provide signed permission, known as an Authorization before a covered entity can use or disclose the individual's PHI for research purposes. Need for authorization may be waived in some instances by an IRB (and a Privacy Board)
  • 13. Individually Identifiable Information and Protected Health Information Includes any subset of health information, including demographic information, that identifies the individual (or there is a reasonable basis to believe that the information can be used to identify the individual). 1. Name 2. All elements of dates except Year. 3. SSN 4. Driver's License Number 5. Geographic subdivisions smaller than a State. 6. URL's and IP's 7. Vehicle Identifiers including VIN and License # 8. Phone numbers
  • 14. PHI Individually identifiable information becomes PHI when it is created or received by a covered entity:  US health plans  US health care clearinghouses  US health providers that transmit electronic health information A researcher is not a covered entity unless he/she is also a provider within a covered entity. Research is also governed by HIPAA if data is obtained from a covered entity. IRB may on occasion waive the HIPAA restrictions on use of PHI
  • 15. How does all this translate to practice? Electronic health information (clinical or research)  Can improve quality and safety of medical care (beneficence)  Is key to showing outcomes in research on health and health practices (beneficence)  Confidentiality and Privacy can be lost (breach of autonomy and beneficence)  Can be used without a patient’s knowledge or consent (breach of autonomy)  Might exclude some populations (breach of justice)
  • 16. Data Integrity The assurance that data is accurate, correct and valid. Accuracy and consistency of stored data, indicated by an absence of any alteration in data between two updates of a data record. Data integrity is imposed within a database at its design stage through the use of standard rules and procedures, and is maintained through the use of error checking and validation routines. Exact duplication of the sent data at the receiving end, achieved through the use of error checking and correcting protocols. Assurance that the data are unchanged from creation to reception.
  • 17. Data Integrity (2) Process to maintain data integrity depends on:  Collection (accurate representation)  Data transfer (accurate recording and transfer of data)  Storage and Security (preventing loss of data)  Sharing of Data  Use of data (analysis)
  • 18. Data Integrity (3) Fabrication and Falsification of data are one of the most serious challenges to data integrity Human error also contributes to loss of data integrity Concern about research misconduct was a primary motivation for a 1990 conference on data management sponsored by the US Department of Health and Human Services. Conference summarized the many ways in which the conduct of research depends on responsible data management.
  • 19. Data Integrity (4) Responsible research begins with experimental design and protocol approval It involves recordkeeping in a way that ensures accuracy and avoids bias It guides criteria for including and excluding data from statistical analyses It entails responsibility for collection, use, and sharing of data.
  • 20. Data Integrity (5) Everyone with a role in research has a responsibility to ensure the integrity of the data. The ultimate responsibility belongs to the principal investigator, but the central importance of data to all research means that this responsibility extends to anyone who:  helps in planning the study  collecting the data  analyzing or interpreting the research findings  publishing the results of the study  maintaining the research records.
  • 21. Data Collection and Integrity Because data collection can be repetitious, time- consuming, and tedious there is a temptation to underestimate its importance. Those responsible for collecting data must be adequately trained and motivated They should employ methods that limit or eliminate the effect of bias They should keep records of what was done by whom and when
  • 22. Analysis and Selection of Data The use of statistical methods varies widely among research disciplines and also clinical programs (reporting) It is a laudable ideal to analyze and report all data Because it is not possible to report everything that has been done, researchers must make decisions about which studies, data points, and methods of analysis to present.
  • 23. Analysis and Selection of Data (2) Must critically evaluate the reasons for inclusion or exclusion of data, the measures taken to avoid bias, and possible ways in which bias may nonetheless influence data selection Must clearly document how the data were obtained, selected, and analyzed-- especially if the methods are unusual or potentially controversial
  • 24. Retention of Data What should be retained? It may be impractical to store extraordinarily large volumes of primary data. At minimum, enough data should be retained to reconstruct what was done. How long should clinical records be retained?
  • 25. Sharing of Data This is considered an important part of responsible research. De-identified data should be shared so that others can verify your conclusions or analysis Sharing of personal patient information is NOT a good practice as noted in Privacy sections earlier.
  • 26. Data Security Limiting Access  Locked Paper Records Offices  Limiting access to Paper or Electronic records to appropriate personnel  Password Protection of electronic records  Defined privileges for electronic data users  Firewalls to prevent outside access Regular Backups and proper archiving
  • 27. Ownership of Data Who owns the data that is generated?  Patient?  Institution?  Funder?  Investigator?  Publisher?
  • 28. Ethics in Publication—General guidelines pertinent to data Research should strive to answer specific questions—not just collect or mine data Statistical issues (sample size) are an important part of design to ensure that the research data is likely to answer the question IRB approval is required when using human subjects, human tissues, or medical records
  • 29. Publication Ethics and Data Management/Data Analysis Data should be appropriately analyzed Inappropriate analysis is not necessarily ethical misconduct Fabrication or falsification of data is always ethical misconduct
  • 30. Publication Ethics and Data Management/Analysis Sources and methods of obtaining and processing data should be disclosed Data exclusions should be explained in full Methods used to analyze data should be explained in detail Post hoc analysis of subgroups is acceptable as long as this is disclosed Data Bias should be discussed in all publications of data or analysis
  • 32. THE WORK IS PROVIDED UNDER THE TERMS OF THIS CREATIVE COMMONS PUBLIC LICENSE ("CCPL" OR "LICENSE"). THE WORK IS PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE LAW. ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED.