My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Child Death Review Case Reporting Data Use Agreement Addendum
>
Meetings
>
2017
>
08. August
>
2017-08-01 10:00 AM - Commissioners' Agenda
>
Child Death Review Case Reporting Data Use Agreement Addendum
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/16/2018 2:48:20 PM
Creation date
1/16/2018 12:12:36 PM
Metadata
Fields
Template:
Meeting
Date
8/1/2017
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Alpha Order
q
Item
Request to Approve a Resolution to Authorize an Amendment to the Child Death Reporting System Data Use Agreement between the Kittitas County Public Health Department and the Michigan Public Health Institute
Order
17
Placement
Consent Agenda
Row ID
38579
Type
Agreement
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
40
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
Download electronic document
View images
View plain text
IV. Data Security <br />All users of the NCRPCD dataset must have electronic security measures in place to <br />prevent access to the confidential dataset from unauthorized individuals. <br />A. Where will the data reside and how will data be shared among researchers? Describe <br />the physical transmission. <br />B. Security details: In the table below, provide a comprehensive list of all devices on which <br />the dataset will be installed and indicate the electronic security measures that will be applied <br />to each device. For those devices that have access to the Internet, all four of the electronic <br />security measures must be in place for this data request to be approved. For non -Internet <br />devices, firewall protection is not required. <br />If co -investigators at different institutions from the PI will also have physical control of <br />the data, complete a table for each such co -investigator's institution. <br />2 <br />Electronic security measures <br />Password <br />Device type <br />Internet <br />directory <br />Indicate <br />Does the <br />ID <br />workstation, <br />device have <br />directories <br />laptop, server, <br />( access to the <br />startup and <br />portable media, or <br />Internet?(Y/N) <br />restricted to <br />other device <br />authorized <br />2 <br />Electronic security measures <br />Password <br />Restricted <br />login <br />directory <br />The device <br />access <br />requires a <br />The <br />login ID and <br />directories <br />password at <br />containing <br />startup and <br />the data are <br />after a period <br />restricted to <br />of inactivity. <br />authorized <br />(YN) <br />users who <br />have logged <br />in to the <br />device. <br />Virus <br />protection <br />Anti-virus <br />software is <br />installed on <br />the device. <br />(YN) <br />Firewall <br />protection <br />Firewall <br />technology <br />is in place <br />for devices <br />that are <br />connected to <br />the Internet. <br />(YN) <br />22 <br />
The URL can be used to link to this page
Your browser does not support the video tag.