Skip to main content

Table 16 Acceptable monitoring of credentialing.

From: Security and privacy requirements for a multi-institutional cancer research data grid: an interview-based study

Credential Monitoring Process Count
Periodic compliance checks with random audits 3
Annual compliance check 2
Quarterly compliance check 1
Annual Peer Review 1
No monitoring necessary if data truly de-identified and no risk 1
  1. Scenario 1 – Question 10. A total of 8 interviews provided responses. Respondents included Information Security Officers, IRB directors and privacy and compliance officers. Data was aggregated with interview as the unit of analysis.