Overview of data collection and creation.
NOTE: See the IRB and PEERRS training sites before you begin collecting or working with Human Subjects Data. If you have completed similar training at another institution you can request a waiver.
There are various trainings that may be relevant to all kinds of data.
See the UFA process and talk to your department about the purchase.
The IRB's expectations for safely storing research data are laid out in this web page.
When you word your IRB, Imagine being in the shoes of a person reviewing the application for the first time. The description of how sensitive data handled from start (when it is gathered from participants) to finish (when it is expunged or archived) should be clear and complete. It could say something like this:
Initial data collection will be in the form of audio recordings of participants via one-on-one video interviews as permitted by U-M's sensitive data guide.
Audio recordings of the video meetings will be captured then downloaded to a laptop owned by U-M.
The laptop is configured and maintained by LSA TS appropriately for sensitive identifiable human subject research. It has full disk encryption, receives security updates within a week of release, and... (write out the relevant details)
The interviews and recording download/uploads will be done with the laptop on the MWireless network at (some U-M facility)
The Audio recordings will be uploaded from the laptop to Dropbox at U-M, as permitted by U-M's sensitive data guide.
Note the language "as permitted by U-M's sensitive data guide" intentionally implies that the study team is using the service in the way stipulated in the sensitive data guide.
IRB Data Security Guidelines apply the same way for the personally owned computer if you are a student. It will take more to assure that the personal computer is appropriately secured. SPG 601.33 puts the onus on the student to secure the computer. The sensitive data guide provides some guidance as well.
Additionally, LSA TS offers consulting. Reach out if you have questions or you need to bring in secure data with restrictions on its use or disclosure.
Sometimes you may need funding to get your research data purchased or collected. Look to the following resources: