You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Researchers and Participants go to separate sign-ins.
How do we invite participants? Can we build in the consent process? E.g. P1 goes to home page, clicks on study name, gets the consent form, clicks agree, is prompted to register.
Protecting participant identities:
Data Security and Confidentiality
4.6.a. How will the information obtained be identified?
No identifiers associated with the information obtained.
Names and other identifying information is obtained but not shared with anyone except the study staff.
Names and other identifying information is obtained and potentially used in publications.
4.7. If applicable, what measures will be taken to protect the confidentiality of the data
8.5. Describe how private identifiable information will be recorded so that it is not identifiable.
8.6. Are the data, documents, and/or records publicly available?
Please know that information should be recorded in the research records in such a way that the information obtained from an individual cannot be linked to the identity of that individual. If a link will be created by the investigator for research purposes, even temporarily, the research does not qualify as exempt.
The text was updated successfully, but these errors were encountered:
Researchers and Participants go to separate sign-ins.
How do we invite participants? Can we build in the consent process? E.g. P1 goes to home page, clicks on study name, gets the consent form, clicks agree, is prompted to register.
Protecting participant identities:
Data Security and Confidentiality
4.6.a. How will the information obtained be identified?
No identifiers associated with the information obtained.
Names and other identifying information is obtained but not shared with anyone except the study staff.
Names and other identifying information is obtained and potentially used in publications.
4.7. If applicable, what measures will be taken to protect the confidentiality of the data
8.5. Describe how private identifiable information will be recorded so that it is not identifiable.
8.6. Are the data, documents, and/or records publicly available?
Please know that information should be recorded in the research records in such a way that the information obtained from an individual cannot be linked to the identity of that individual. If a link will be created by the investigator for research purposes, even temporarily, the research does not qualify as exempt.
The text was updated successfully, but these errors were encountered: