Which practice best protects participant confidentiality when handling data retention?

Study for the CITI Training Social and Behavioral Focus Test. Prepare with flashcards and multiple choice questions, each question has hints and detailed explanations. Get ready for your exam!

Multiple Choice

Which practice best protects participant confidentiality when handling data retention?

Explanation:
Protecting participant confidentiality during data retention hinges on having a solid, documented plan that governs how data are stored, who can access them, and when they are disposed of. The best approach combines several safeguards: retain data only as long as the policy requires, store it in a secure location, restrict access to only those who need it, de-identify data when possible to reduce re-identification risk, and securely destroy or archive materials once the retention period ends. Documenting these procedures ensures everyone follows the same rules and creates an audit trail that supports accountability and consistency across the study. This approach minimizes opportunities for unauthorized access or disclosure, limits exposure by removing direct identifiers when feasible, and ensures data are not kept longer than necessary or exposed to those outside approved contexts. It also maintains data integrity by keeping a clear, repeatable process for retention, handling, and eventual disposition. The other options fail to protect confidentiality for clear reasons: storing data on a personal unencrypted laptop keeps highly vulnerable information at risk and outside formal controls; sharing data with collaborators without a proper agreement or safeguards creates uncontrolled access and potential misuse; archiving data publicly after retention defeats confidentiality by making sensitive information openly available.

Protecting participant confidentiality during data retention hinges on having a solid, documented plan that governs how data are stored, who can access them, and when they are disposed of. The best approach combines several safeguards: retain data only as long as the policy requires, store it in a secure location, restrict access to only those who need it, de-identify data when possible to reduce re-identification risk, and securely destroy or archive materials once the retention period ends. Documenting these procedures ensures everyone follows the same rules and creates an audit trail that supports accountability and consistency across the study.

This approach minimizes opportunities for unauthorized access or disclosure, limits exposure by removing direct identifiers when feasible, and ensures data are not kept longer than necessary or exposed to those outside approved contexts. It also maintains data integrity by keeping a clear, repeatable process for retention, handling, and eventual disposition.

The other options fail to protect confidentiality for clear reasons: storing data on a personal unencrypted laptop keeps highly vulnerable information at risk and outside formal controls; sharing data with collaborators without a proper agreement or safeguards creates uncontrolled access and potential misuse; archiving data publicly after retention defeats confidentiality by making sensitive information openly available.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy