Skip to main content

Table 16 Acceptable monitoring of credentialing.

From: Security and privacy requirements for a multi-institutional cancer research data grid: an interview-based study

Credential Monitoring Process

Count

Periodic compliance checks with random audits

3

Annual compliance check

2

Quarterly compliance check

1

Annual Peer Review

1

No monitoring necessary if data truly de-identified and no risk

1

  1. Scenario 1 – Question 10. A total of 8 interviews provided responses. Respondents included Information Security Officers, IRB directors and privacy and compliance officers. Data was aggregated with interview as the unit of analysis.