Sally Gore, MS, MS LIS
Manager, Research & Scholarly Communication Services
sally.gore@umassmed.edu
Tess Grynoch, MLIS
Research Data & Scholarly Communications Librarian
tess.grynoch@umassmed.edu
Leah Honor, MLIS
Research Data & Scholarly Communications Librarian
leah.honor@umassmed.edu
Lisa Palmer, MSLS, AHIP
Institutional Repository Librarian
lisa.palmer@umassmed.edu
One of the laws that covers human subject data, particularly medical data, is the Health Insurance Portability and Accountability Act (HIPAA) which has requirements for the privacy and security of personally identifiable information.
All UMass Chan Morningside Graduate School of Biomedical Sciences Basic Science students and postdocs must take CITI Training.
The Safe Harbor method for de-identification requires that all of the following personal identifiers be removed for the data to qualify as de-identified:
Resources from the UK Data Service:
Actions that undermine data integrity include data fabrication, falsification, and misattribution. For example, many journals, such as the Journal of Cell Biology, have strict editorial policies regarding images and image manipulation that, if not followed, result in the rejection and/or retraction of papers.
The ethical aspects of data are many. Examples include defining ownership of data, obtaining consent to collect and share data, protecting the identity of human subjects and their personal identifying information, and the licensing of data. Below are several ethics cases from Responsible Conduct of Research Casebook: Data Acquisition and Management a publication from the Office of Research Integrity at the U.S. Department of Health and Human Services.
There are generally four matters of data acquisition and management that need to be addressed at the outset of a study: (1) collection, (2) storage; (3) ownership, and 4) sharing. These cases and role play present common scenarios that occur at various stages of data acquisition and management. Issues discussed include acquiring sensitive data, sharing data with colleagues, and managing data collection processes.
Case One: A researcher wants to sequence the genomes of children with cancer, eventually making them publicly available online, but encounters issues with adequate data protection and parental consent.
Case Two: After working with her advisor to develop a sophisticated database, the postdoc wants access to the database in order to submit a grant proposal but runs into trouble when seeking the advisor’s permission.
Case Three: A post-doc has a novel idea after observing a procedure during residency, but he needs access to a large amount of clinical data, including medical record numbers, so that he can eventually recruit individuals to participate in his research.
Role Play: An assistant professor places her data on the NIH’s database of genotypes and phenotypes (dbGaP) only to find that a leading researcher has published a paper using the data shared in the NIH database before the one-year embargo period was up.
From the U.S. Office of Research Integrity's RCR Casebook Stories about Researchers Worth Sharing edited by James M. DuBois