Data Security Assessment Form: Date: Principal Investigator
Data Security Assessment Form: Date: Principal Investigator
Date:
This form must be completed and submitted to the IRB for protocols that collect, transfer, or store
identifiable data. Please review the IRBs Research Data Security webpage for helpful information when
completing this form. It is important that all sections are complete for the IRB to assess risks and ensure
safeguards are in place to protect human subjects. If you have any questions, please contact the RCS
office at 860-486-8802 or [email protected].
All University owned machines must have encryption enabled by default. A university owned computer
or device must be used for all storage of photographic images, or voice recordings, data protected under
HIPAA and FERPA, and comply with UConn’s Confidential Data Policy. Additionally, research data may be
stored on UConn secure drives, such as P and R, or the use of university authorized cloud services, such
as UConn Office 365 (e.g. OneDrive/SharePoint).
UConn does not recommend the transmission of identifiable datasets by email due to the inherent risk
of compromise. Identifiable data should be transmitted via a secure service, such as Office365,
FileLocker, a secure website, or by using secure protocols, such as a File Transfer Protocol (FTPS).
Data collection software, data analysis software, and cloud compute/storage used for research must be
approved for university use by Information Technology Services and procured through University
Procurement prior to use. Contact your department administrator to obtain authorization for software
not vetted by UConn ITS and Procurement prior to use.
The informed consent form must include information regarding any terms of service or end user
agreement for technologies used in the research as well as information about whether a vendor has
access to a participant’s contact list or other information on their device, ability to track location, and
whether there is a possibility that any participant data will be used for marketing or other activities or
sold to a third party.
All faculty, students, and staff engaged in human subjects research must follow UConn ITS
standards and policies.
Check any identifiers that will be collected during any phase of the research
Name
Electronic mail address
Social security number
Telephone or Fax Number
Internet protocol (IP) address or Web universal resource locators (URLs)
Medical record number
Any information about a person’s past or present physical or mental health condition; provision of health care to an
individual, or past, present, or future payment for the provision of health care to the individual-protected health
information (PHI)
Electronic protected health information (ePHI): emailed lab results, stored X-rays/MRIs on computer, health
Please list the specific FERPA covered variables used for this research:
Will this research collect electronic informed consent (eIC)? Yes No
If yes, describe the process of obtaining an electronic signature in Part B.
As a reminder, please clearly describe all data collection methods and how data will be stored
and transmitted in the informed consent form. Include the risks of each method and a clear
description of how information about participants is protected. Consistency between forms will
help facilitate the IRB’s review of the submission.
5. Will the app be able to access other device functionality, such as Location, Contacts, Notifications, etc.? Yes
No
6. Provide any additional information:
Web-based electronic data collection software, such as survey panels, or another tool Not applicable
UConn Data Storage Options:
UConn licensed Qualtrics UConn REDCap Other
If Other, you are required to answer all 5 questions below:
1. Name the site hosting the survey:
2. Does the technology utilized allow for the explicit exclusion of the collection of Internet Protocol (IP) address or
geolocation of the participant’s connection? Yes No
If Yes, will you utilize this option to exclude the collection (anonymize function)? Yes No
3. If collecting data from minors (<18 years old), does this site comply with the Children’s Online Privacy Protection Act
(COPPA)? Yes No
4. Provide any additional information:
Wearable Device Not applicable
* Complete the mobile app section above if a mobile app will be used with the wearable device
1. Name of wearable device:
2. Is wearable device provided by participant or researcher? Participant device Researcher provides device
3. Is wearable device registered by participant or researcher? Participant registers device Researcher
registers device
4. Will the device collect identifiable information? (please refer to Part A of this form) Yes No
5. Provide any additional information:
Digital audio or video recording, video conferencing, or photographic images Not applicable
*Refer to the Research Data Security webpage on the UConn IRB’s website for more information
1. Will this research utilize videoconferencing? Yes No
2. If yes, will data from videoconferencing be recorded? Yes No
3. Describe the method of capturing the study recording or image (e.g., digital recorder, study cell phone, WebEx,
Teams, etc.)
4. Will a transcription service be used to transcribe recordings? Yes No
a. If yes, please provide the name of the transcription service.
*If using a transcription service, please include the confidentiality agreement with the submission.
5. Provide any additional information:
Part C – Transmission, processing, and storage of research data (temporary and long term)
*If sharing data outside UConn, it is important that Sponsored Programs Services Contract Office, at
[email protected] be contacted as early as possible to determine whether a Data Use Agreement or Contract is
required.
All identifiable data must be transmitted via a secure service, such as Office365-OneDrive, FileLocker, a secure website,
or by using secure protocols, such as a File Transfer Protocol (FTPS).
Describe where the transmission, processing, and storage of data will take place from each device used for
data collection (e.g., mobile apps, electronic surveys, wearable devices, any recordings and images, text
messages, hard copy, and transcription data). Be sure to include how data will be transmitted and stored in
the consent form.
1. Server
UConn ITS Managed Server.
Are you or Department operating your own server within UConn for this research?
Other (describe):
2. Cloud File Storage (Note: UConn Google Drive/Google Apps may not be used to store Confidential UConn Data or
identifiable private information for which the identity of the subject is or may readily be ascertained by the investigator
or associated with the information.
UConn REDCap
UConn Office 365 (e.g. OneDrive/SharePoint)
UConn Google Drive
UConn Enterprise File Server
Other (describe):
3. Select any computers (laptops or desktop PCs) or devices (tablets, mobile devices, portable storage devices) used to
access data stored on systems identified in questions 1 or 2 above
UConn owned desktop or laptop, or another device
Personal desktop or laptop, or other device (If yes, identify and explain in item 7 below)
*Reminder, UConn Confidential Data or identifiable private information may not be stored on personal
equipment.
4. Storage of hard copy/paper records.
UConn Office - specify building & office number:
Off-site - describe where:
Please read important information below if your research is regulated by the FDA:
For FDA Regulated IND research, the FDA requires that sponsors and investigators retain “records and reports required
by this part for 2 years after a marketing application is approved for the drug; or if an application is not approved for
drug, until 2 years after shipment and delivery of the drug for investigational use is discontinued and the FDA so
notified.”
For FDA Regulated IND research, the FDA requires the investigator or sponsor to maintain the records “for a period of 2
years after the latter of the following two dates: The date on which the investigation is terminated of completed, or the
date that the records are no longer required for purposes of supporting a premarket approval application or a notice of
completion of a product development protocol.”
Part E - Provide other research data security information if not addressed above.
Please direct any exceptions to University Policy regarding data security or use of platforms to
collect or store data that do not currently have an agreement with UConn to the Information
Security Office [email protected].