69
3-5 October 2007 © 2007, BRIITE Biomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission Impossible? ( http://www.esp.org/briite/meetings ) Robert J. Robbins [email protected] (206) 667 4778

3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

Embed Size (px)

Citation preview

Page 1: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

3-5 October 2007© 2007, BRIITE Biomedical Research Institutions Information Technology Exchange

Implementing Security without Inhibiting Research:Mission Impossible?

( http://www.esp.org/briite/meetings )

Robert J. [email protected]

(206) 667 4778

Page 2: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

Biomedical Research Institutions Information Technology Exchange

Robert J. [email protected]

(206) 667 4778

( http://www.esp.org/briite/meetings )

3-5 October 2007© 2007, BRIITE

Implementing Security without Inhibiting Research:Mission Impossible?

Page 3: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

Implementing Security without Inhibiting Research:Mission Impossible?

Biomedical Research Institutions Information Technology Exchange

( http://www.esp.org/rjr/briite-RJR-salk-2005.pdf)

Robert J. [email protected]

(206) 667 4778

Impossible?Maybe not.

But it is very hard.

3-5 October 2007© 2007, BRIITE

Page 4: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

[email protected]

(206) 667 4778

Implementing Security without Inhibiting Research:Mission Impossible?

Impossible?Maybe not.

But it is very hard.

Biomedical Research Institutions Information Technology Exchange

( http://www.esp.org/rjr/briite-RJR-salk-2005.pdf)

Robert J. Robbins

3-5 October 2007© 2007, BRIITE

The challenge is real, yet we all need to figure out how to implement some kind of solution anyway.

Page 5: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

5© 2007, BRIITE http://www.briite.org

[email protected]

(206) 667 4778

Implementing Security without Inhibiting Research:Mission Impossible?

Impossible?Maybe not.

But it is very hard.

Biomedical Research Institutions Information Technology Exchange

( http://www.esp.org/rjr/briite-RJR-salk-2005.pdf)

Robert J. Robbins

3-5 October 2007© 2007, BRIITE

The challenge is real, yet we all need to figure out how to implement some kind of solution anyway.

And, we had better be prepared to replace our solution with a better solution every few years for the next decade.

Page 6: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

6© 2007, BRIITE http://www.briite.org

The Problem

• Culture clash between research and security.

Page 7: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

7© 2007, BRIITE http://www.briite.org

The Problem

• Culture clash between research and security.

• Work occurs within decentralized organizations.

Page 8: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

8© 2007, BRIITE http://www.briite.org

The Problem

• Culture clash between research and security.

• Work occurs within decentralized organizations.

• Work occurs across institutional boundaries.

Page 9: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

9© 2007, BRIITE http://www.briite.org

The Problem

• Culture clash between research and security.

• Work occurs within decentralized organizations.

• Work occurs across institutional boundaries.

• Problem keeps changing.

Page 10: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

10© 2007, BRIITE http://www.briite.org

The Problem

• Culture clash between research and security.

• Work occurs within decentralized organizations.

• Work occurs across institutional boundaries.

• Problem keeps changing.

• Rules keep changing.

Page 11: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

11© 2007, BRIITE http://www.briite.org

The Problem

• Culture clash between research and security.

• Work occurs within decentralized organizations.

• Work occurs across institutional boundaries.

• Problem keeps changing.

• Rules keep changing.

• Solution keeps changing.

Page 12: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

12© 2007, BRIITE http://www.briite.org

The Problem

• Culture clash between research and security.

• Work occurs within decentralized organizations.

• Work occurs across institutional boundaries.

• Problem keeps changing.

• Rules keep changing.

• Solution keeps changing.

• Human-subjects work is especially challenging.

Page 13: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

CultureClash

Page 14: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

14© 2007, BRIITE http://www.briite.org

Culture Clash

SECURITY

closed

RESEARCH

open

Page 15: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

15© 2007, BRIITE http://www.briite.org

Culture Clash

SECURITY

closed

planned

RESEARCH

open

opportunistic

Page 16: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

16© 2007, BRIITE http://www.briite.org

Culture Clash

SECURITY

closed

planned

structured

RESEARCH

open

opportunistic

creative

Page 17: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

17© 2007, BRIITE http://www.briite.org

Culture Clash

SECURITY

closed

planned

structured

respect authority

RESEARCH

open

opportunistic

creative

challenge authority

Page 18: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

18© 2007, BRIITE http://www.briite.org

Culture Clash

SECURITY

closed

planned

structured

respect authority

process driven

. . .

RESEARCH

open

opportunistic

creative

challenge authority

one-off mentality

. . .

Page 19: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

DecentralizedOrganizations

Page 20: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

20© 2007, BRIITE http://www.briite.org

Decentralized Organizations

Would this work in your organization:

Page 21: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

21© 2007, BRIITE http://www.briite.org

Decentralized Organizations

Would this work in your organization:

Your convenience is no reason for me to sacrifice the security of my network…

Page 22: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

22© 2007, BRIITE http://www.briite.org

Decentralized Organizations

Would this work in your organization:

But it does work in the military, where this quote originates.

Your convenience is no reason for me to sacrifice the security of my network…

Page 23: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

23© 2007, BRIITE http://www.briite.org

True Story

Conversation between network administrator (N) and faculty member (F):

Page 24: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

24© 2007, BRIITE http://www.briite.org

True Story

Conversation between network administrator (N) and faculty member (F):

N: These changes will improve the security of our network.

Page 25: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

25© 2007, BRIITE http://www.briite.org

True Story

Conversation between network administrator (N) and faculty member (F):

N: These changes will improve the security of our network.

F: But they will make it impossible for my lab to carry out its research.

Page 26: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

26© 2007, BRIITE http://www.briite.org

True Story

Conversation between network administrator (N) and faculty member (F):

N: These changes will improve the security of our network.

F: But they will make it impossible for my lab to carry out its research.

N: With a little effort you should be able to find a work-around.

Page 27: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

27© 2007, BRIITE http://www.briite.org

True Story

Conversation between network administrator (N) and faculty member (F):

N: These changes will improve the security of our network.

F: But they will make it impossible for my lab to carry out its research.

N: With a little effort you should be able to find a work-around.

F: My staff and I have already devoted substantial effort to the problem and there is no work-around for us. However, we have determined that a relatively minor change in your security plan would meet your security needs while still allowing us to carry out our research.

Page 28: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

28© 2007, BRIITE http://www.briite.org

True Story

Conversation between network administrator (N) and faculty member (F):

N: These changes will improve the security of our network.

F: But they will make it impossible for my lab to carry out its research.

N: With a little effort you should be able to find a work-around.

F: My staff and I have already devoted substantial effort to the problem and there is no work-around for us. However, we have determined that a relatively minor change in your security plan would meet your security needs while still allowing us to carry out our research.

N: What do you know about network security?

You’re just an end user.

Page 29: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

29© 2007, BRIITE http://www.briite.org

True Story

Conversation between network administrator (N) and faculty member (F):

N: These changes will improve the security of our network.

F: But they will make it impossible for my lab to carry out its research.

N: With a little effort you should be able to find a work-around.

F: My staff and I have already devoted substantial effort to the problem and there is no work-around for us. However, we have determined that a relatively minor change in your security plan would meet your security needs while still allowing us to carry out our research.

N: What do you know about network security?

You’re just an end user.

Yes, but this end user also had a Nobel Prize and about two attractive job offers a month from other institutions.

Page 30: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

30© 2007, BRIITE http://www.briite.org

True Story

Conversation between network administrator (N) and faculty member (F):

N: These changes will improve the security of our network.

F: But they will make it impossible for my lab to carry out its research.

N: With a little effort you should be able to find a work-around.

F: My staff and I have already devoted substantial effort to the problem and there is no work-around for us. However, we have determined that a relatively minor change in your security plan would meet your security needs while still allowing us to carry out our research.

N: What do you know about network security. You’re just an end user.

Yes, but this end user also had a Nobel Prize and about two attractive job offers a month from other institutions.POP

QUIZ

Page 31: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

31© 2007, BRIITE http://www.briite.org

True Story

Conversation between network administrator (N) and faculty member (F):

N: These changes will improve the security of our network.

F: But they will make it impossible for my lab to carry out its research.

N: With a little effort you should be able to find a work-around.

F: My staff and I have already devoted substantial effort to the problem and there is no work-around for us. However, we have determined that a relatively minor change in your security plan would meet your security needs while still allowing us to carry out our research.

N: What do you know about network security. You’re just an end user.

Yes, but this end user also had a Nobel Prize and about two attractive job offers a month from other institutions.

The most likely outcome was:

Page 32: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

32© 2007, BRIITE http://www.briite.org

True Story

Conversation between network administrator (N) and faculty member (F):

N: These changes will improve the security of our network.

F: But they will make it impossible for my lab to carry out its research.

N: With a little effort you should be able to find a work-around.

F: My staff and I have already devoted substantial effort to the problem and there is no work-around for us. However, we have determined that a relatively minor change in your security plan would meet your security needs while still allowing us to carry out our research.

N: What do you know about network security. You’re just an end user.

Yes, but this end user also had a Nobel Prize and about two attractive job offers a month from other institutions.

The most likely outcome was:

1.The researcher totally changed his research program to meet the new security standards, or . . .

Page 33: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

33© 2007, BRIITE http://www.briite.org

True Story

Conversation between network administrator (N) and faculty member (F):

N: These changes will improve the security of our network.

F: But they will make it impossible for my lab to carry out its research.

N: With a little effort you should be able to find a work-around.

F: My staff and I have already devoted substantial effort to the problem and there is no work-around for us. However, we have determined that a relatively minor change in your security plan would meet your security needs while still allowing us to carry out our research.

N: What do you know about network security. You’re just an end user.

Yes, but this end user also had a Nobel Prize and about two attractive job offers a month from other institutions.

The most likely outcome was:

1.The researcher totally changed his research program to meet the new security standards, or . . .

2.The network administrator found himself with the opportunity to spend more time with his family.

Page 34: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

Work SpansInstitutionalBoundaries

Page 35: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

35© 2007, BRIITE http://www.briite.org

Much biomedical research is now conducted by teams of collaborators, often spanning multiple institutions.

Research that starts at one institution segues into multi-institutional work as students graduate, post-docs move on, and other changes occur.

Work Spans Institutions

Page 36: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

36© 2007, BRIITE http://www.briite.org

Research often is accomplished by INFORMAL teams of workers, spanning multiple organizations.

These teams dynamically come into existence to meet a research need, then disband.

Work Spans Institutions

Page 37: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

37© 2007, BRIITE http://www.briite.org

Portions of tens (or hundreds) of such teams exist at any one time within any research organization.

These teams are often not based on any formal relationships between the home institutions of the researchers.

Work Spans Institutions

Page 38: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

38© 2007, BRIITE http://www.briite.org

Delivering high quality security across such teams either involves:

a proliferation of accounts across institutions, or

a security system designed for a totally decentralized federation

Work Spans Institutions

Page 39: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

39© 2007, BRIITE http://www.briite.org

Delivering high quality security across such teams either involves:

a proliferation of accounts across institutions, or

a security system designed for a totally decentralized federation

Work Spans Institutions

No currently available security system is designed to meet the needs of a totally decentralized

federation.

Page 40: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

Problem KeepsChanging

Page 41: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

41© 2007, BRIITE http://www.briite.org

Changes in Problem Scope

Achieving security of research systems:

Page 42: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

42© 2007, BRIITE http://www.briite.org

Changes in Problem Scope

Achieving security of research systems:

within labs

Page 43: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

43© 2007, BRIITE http://www.briite.org

Changes in Problem Scope

Achieving security of research systems:

within labs

across labs

Page 44: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

44© 2007, BRIITE http://www.briite.org

Changes in Problem Scope

Achieving security of research systems:

within labs

across labs

across departments

Page 45: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

45© 2007, BRIITE http://www.briite.org

Changes in Problem Scope

Achieving security of research systems:

within labs

across labs

across departments

across campuses

Page 46: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

46© 2007, BRIITE http://www.briite.org

Changes in Problem Scope

Achieving security of research systems:

within labs

across labs

across departments

across campuses

across institutions

Page 47: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

47© 2007, BRIITE http://www.briite.org

Changes in Problem Scope

Achieving security of research systems:

within labs

across labs

across departments

across campuses

across institutions

across state boundaries

Page 48: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

48© 2007, BRIITE http://www.briite.org

Changes in Problem Scope

Achieving security of research systems:

within labs

across labs

across departments

across campuses

across institutions

across state boundaries

across national boundaries

Page 49: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

49© 2007, BRIITE http://www.briite.org

Changes in Problem Domain

New problems keep arising:

financial system

confidential data on lost laptops

web site break-ins

student music downloads

termination policies

HIPAA

. . .

Page 50: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

50© 2007, BRIITE http://www.briite.org

Changes in Logical Status

Some change is so profound that jokes become reality.

Page 51: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

51© 2007, BRIITE http://www.briite.org

Changes in Logical Status

Some change is so profound that jokes become reality.

Sarcastic comment:

DNA is inherently identifiable. Pretty soon we’ll have to start putting deliberate errors into DNA sequences before we can share them…

Page 52: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

52© 2007, BRIITE http://www.briite.org

Changes in Logical Status

Some change is so profound that jokes become reality.

Sarcastic comment:

DNA is inherently identifiable. Pretty soon we’ll have to start putting deliberate errors into DNA sequences before we can share them…

Recent article in Science

Page 53: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

53© 2007, BRIITE http://www.briite.org

Changes in Logical Status

Page 2:

Tactics for de-identifying genomic data:

Page 54: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

54© 2007, BRIITE http://www.briite.org

Changes in Logical Status

Page 2:

Tactics for de-identifying genomic data:

Page 55: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

55© 2007, BRIITE http://www.briite.org

Changes in Logical Status

Page 2:

Tactics for de-identifying genomic data:

When reality starts to resemble parody, things are getting too

complex for comfort.

Page 56: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

Rules KeepChanging

Page 57: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

57© 2007, BRIITE http://www.briite.org

Rules Keep Changing

HIPAA

Sarbanes Oxley

News stories of lost laptops

Internal audit departments

Non-research savvy auditors

Engaged boards of directors

. . .

Page 58: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

Solution KeepsChanging

Page 59: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

59© 2007, BRIITE http://www.briite.org

Solution Keeps Changing

We need comprehensive support for implementing security in a totally decentralized federation.

No such solution exists.

So we keep implementing the approximation du jour (or maybe de jure).

Page 60: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

Human SubjectsResearch

Page 61: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

61© 2007, BRIITE http://www.briite.org

What is Human Subjects Research?

Certain activities are obviously human subjects research, appropriately covered by IRB rules and procedures.

But, where are the limits? What activities are covered and what are not?

Effect of food additive?

Price of popcorn in movie theaters?

Production of recipe book?

Page 62: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

62© 2007, BRIITE http://www.briite.org

HSR Criteria

Project:

MBA student wants to interview theater managers about price of popcorn at different times and for different features.

Problem:

Should this activity be considered research involving human subjects covered by 45 CFR part 46?

Answer:

Page 63: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

63© 2007, BRIITE http://www.briite.org

HSR Criteria

Project:

MBA student wants to interview theater managers about price of popcorn at different times and for different features.

Problem:

Should this activity be considered research involving human subjects covered by 45 CFR part 46?

Answer:

Page 64: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

64© 2007, BRIITE http://www.briite.org

HSR Criteria

Project:

MBA student wants to interview theater managers about price of popcorn at different times and for different features.

Problem:

Should this activity be considered research involving human subjects covered by 45 CFR part 46?

Answer:

Page 65: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

65© 2007, BRIITE http://www.briite.org

Project:

MBA student wants to interview theater managers about price of popcorn at different times and for different features.

Problem:

Should this activity be considered research involving human subjects covered by 45 CFR part 46?

Answer:

HSR Criteria

?

Page 66: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

66© 2007, BRIITE http://www.briite.org

HSR Criteria

Project:

Research team wants to interview IRB heads, security officers, other institutional leaders to determine the policy requirements governing the deployment of multi-site digital security systems.

Problem:

Should this activity be considered research involving human subjects covered by 45 CFR part 46?

Page 67: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

67© 2007, BRIITE http://www.briite.org

HSR Criteria

Project:

Research team wants to interview IRB heads, security officers, other institutional leaders to determine the policy requirements governing the deployment of multi-site digital security systems.

Problem:

Should this activity be considered research involving human subjects covered by 45 CFR part 46?

Page 68: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

68© 2007, BRIITE http://www.briite.org

HSR Criteria

Project:

Research team wants to interview IRB heads, security officers, other institutional leaders to determine the policy requirements governing the deployment of multi-site digital security systems.

Problem:

Should this activity be considered research involving human subjects covered by 45 CFR part 46?

?

Page 69: 3-5 October 2007© 2007, BRIITEBiomedical Research Institutions Information Technology Exchange Implementing Security without Inhibiting Research: Mission

END