In the IRB application protocol, researchers must address and describe the data security procedures of their collection and storage of data especially when working with data that is of higher risk to participants.
Researchers should consider using computer software to protect against malware, ensure that all software updates and patches are maintained, apply appropriate data collection, transmission and storage methods and collect only the data necessary to answer the research question. Storing de-identified data separately from codes so as to protect from re-identification is also a very important aspect for researchers to address.Please refer to FAU’s OIT policies related to ensure compliance located here.
|Arts & Letters||Greg Topplefirstname.lastname@example.org|
|Design & Social Inquiry||Matthew Canavanemail@example.com|