hero-angle-alpha hero-angle-beta icon-rss-square icon-instagram icon-rss icon-facebook icon-facebook-square icon-facebook-official icon-twitter icon-twitter-square icon-google-plus icon-google-plus-square icon-linkedin icon-linkedin-square icon-pinterest icon-pinterest-square icon-youtube icon-youtube-square icon-youtube-play icon-search icon-gift icon-graduation-cap icon-home icon-bank icon-envelope icon-envelope-square Cabrini Logo Cabrini Logo icon-chevron-right icon-chevron-left category academics category athletics category just for fun category service and mission category living on campus category profiles category advice category activities and events Cabrini University logo with crest
Return Home
Cabrini's student poster presentations at the Symposium

Data Management and Security Questionnaire

Collecting Sensitive and Identifiable Data

 

  1. What is the nature of the data? 
    1. Electronic (text, audio, video, binary), hardcopy files, or biological specimens?
    2. Do the data contain protected health information, personal identifying information or other sensitive information?  If yes, please precisely describe what these are.
    3. Are identifiers retained and linked to the data? Who will have access to the data?  Who will have access to the identifiers?
    4. Are the data stripped of identifiers and the identifiers destroyed (anonymized data)?  When will this take place?
    5. Are identifiers de-linked from the data and managed by use of a code?  How are the identifiers, data files and key managed and secured?  Who will have access to the identifiers, data files and key?
  2. Where and how will the data be stored and what security measures will be used for each?
    1. Personal computer or laptop?  University computer or laptop; location? Office file cabinet? Thumb/jump drive?  Departmental or other U-M server; name and/or location?
    2. What security measures will be used with each (password protected; encryption; locked file cabinet in locked office, 128 bit encryption, etc.)?
    3. Who will have access to the computer/laptop/server/or files?
  3. How will data be transmitted or transported?
    1. How will electronic files be transmitted?  What measures are in place for secure transmission of data?
    2. How will hardcopy files be transported?
    3. How are the files and data protected while in transmission or when transported?
  4. When and how will data or records be deleted or destroyed?
  5. Will cloud-computing resources be used?
    1. is the resource and what is the privacy policy for the resource?
  6. Will online data collection services be used?
    1. What is the service/host?  How is the survey accessed?  How are data accessed by the study team?  Will any non-secure services be used to access, collect, or transmit data (e.g., public portals, administrator logins, public WIFI networks, or public computers)?
    2. How are data moved/transmitted from the online host to the local storage device (computer, laptop, server, thumb drive, etc.)?
    3. Will the data be purged from the online host once downloaded to the local device?  How and when?
    4. If the data are identifiable and sensitive, are confidentiality agreements in place with outside consultants or vendors?