My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Child Death Review Case Reporting System Data Use Agreement
>
Meetings
>
2016
>
04. April
>
2016-04-05 10:00 AM - Commissioners' Agenda
>
Child Death Review Case Reporting System Data Use Agreement
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
4/7/2018 10:41:46 AM
Creation date
4/7/2018 10:39:05 AM
Metadata
Fields
Template:
Meeting
Date
4/5/2016
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Alpha Order
p
Item
Request to Approve a Child Death Review Case Reporting System Data Use Agreement between the Michigan Public Health Institute and the Kittitas County Public Health Department
Order
16
Placement
Consent Agenda
Row ID
28675
Type
Agreement
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
33
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
IV. Data Security <br />All users of the NCRPCD dataset must have electronic security measures in place to <br />prevent access to the confidential dataset from unauthorized individuals. <br />A. Where will the data reside and how will data be shared among researchers? Describe <br />the physical transmission. <br />B. Security details: In the table below, provide a comprehensive list of all devices on which <br />the dataset will be installed and indicate the electronic security measures that will be applied <br />to each device. For those devices that have access to the Internet, all four of the electronic <br />security measures must be in place for this data request to be approved. For non -Internet <br />devices, firewall protection is not required. <br />If co -investigators at different institutions from the PI will also have physical control of <br />the data, complete a table for each such co -investigator's institution. <br />22 <br />Device type <br />Internet <br />Indicate <br />Does the <br />ID <br />workstation, <br />device have <br />Electronic security <br />measures <br />laptop, server, <br />access to the <br />portable media, or <br />Internet?(Y/N) <br />other device <br />Password <br />Restricted <br />Virus <br />Firewall <br />login <br />directory <br />protection <br />protection <br />The device <br />access <br />Anti-virus <br />Firewall <br />requires a <br />The <br />software is <br />technology <br />login ID and <br />directories <br />installed on <br />is in place <br />password at <br />containing <br />the device. <br />for devices <br />startup and <br />the data are <br />(Y/N) <br />that are <br />after a period <br />restricted to <br />connected to <br />of inactivity. <br />authorized <br />the Internet. <br />(Y/N) <br />users who <br />(Y/N) <br />have logged <br />in to the <br />device. <br />Y/N) <br />1 <br />2 <br />3 <br />4 <br />22 <br />
The URL can be used to link to this page
Your browser does not support the video tag.