Which of the following constitutes both a breach of confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects’ privacy (the right of the individuals to be protected against intrusion into their personal lives or affairs)?
Your answer : A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified.
Correct Answer : A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be ...view middle of the document...
This is true even if the participants know each other. Using pseudonyms in the report does not remove concerns about what group members might say outside the group.
Points Earned : 1
In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which of the following confidentiality procedures would protect against compelled disclosure of individually identifiable information?
Your answer : Securing a Certificate of Confidentiality.
Correct Answer : Securing a Certificate of Confidentiality.
Although data encryption, using pseudonyms, and waiving documentation of consent, provide data protection, the researcher can link individuals to their responses. Therefore, the data are vulnerable to subpoena in civil, criminal, and administrative court proceedings. Unless the researcher has a Certificate of Confidentiality, he or she may be compelled to release individually identifiable information about research subjects. The Certificate provides the highest level of protection.
Points Earned : 1
A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identifying information would be retained, and the researcher adhered to that component. Which...