It is the responsibility of the investigator to protect participant privacy and ensure that all data is de-identified prior to upload to BDC. Investigators should evaluate whether their data needs to be de-identified and determine the best method of de-identification.
Below are examples of de-identification methods used within other studies that may be helpful:
The DMC can also advise on strategies for de-identification and recommend data type specific tools. Investigators can either submit a ticket or submit a question on this forum to receive assistance from the DMC.
1 Comment
J
Jeran Stratford
said
about 1 month ago
It is also really important to consider all of the guidance from the IRB and other local governing bodies.
Mike Enger
It is the responsibility of the investigator to protect participant privacy and ensure that all data is de-identified prior to upload to BDC. Investigators should evaluate whether their data needs to be de-identified and determine the best method of de-identification.
Below are examples of de-identification methods used within other studies that may be helpful:
The DMC can also advise on strategies for de-identification and recommend data type specific tools. Investigators can either submit a ticket or submit a question on this forum to receive assistance from the DMC.