Chapter 3: Data Collection and Storage
Module 11: Ethical Data Storage and Privacy
Would you feel comfortable engaging in a research project if you knew your data would have no security protocols to keep it private? No!
This module details the importance of ethical data storage and privacy, legal compliance, secure data management, and participantsâ rights to their data.
Learning Objectives
- Learn about and apply understanding of data privacy and storage in research
Case Study
Quinnâs research on negative healthcare experiences involves collecting sensitive survey data. While working at a cafĂ©, she connects to what she believes is the cafĂ©âs Wi-Fi and begins sorting through participant responses. Later, she learns the network was a malicious hotspot used to steal data from unsuspecting users. Unsure of the extent of the breach, Quinn must decide what steps to take next.
The Importance of Privacy
Protecting participant data is a central pillar of ethical obligation in research. Privacy breaches can undermine trust and compromise the integrity of findings. Ethical data storage makes sure that sensitive information is handled securely, reducing risks of unauthorized access, misuse, or loss.
In working with structurally and systemically marginalized groups, privacy and data leaks are even more devastating. Consider the following commentary:
For historically marginalized groups, the right to privacy is a matter of survival. Privacy violations have put these groups at risk of ostracization, discrimination, or even active physical danger. (Lai & Tanner, 2022)
This remains true today. Marginalized groups experience disproportionate levels of harm when their privacy is violated. This makes ensuring data security and privacy on all fronts is clearly defined and maintained at a high level.
For example, for individuals living in countries with highly monitored digital ecosystems may avoid participating in research to avoid penalization or persecution. How do you think this can change how you would do your digital research?
Researchers must implement clear protocols for data storage, ensuring confidentiality from collection to long-term retention. Consider that what is considered sufficiently de-identified or private for a participant may vary. As such, consulting with members of historically marginalized groups to determine comfortability, data sharing agreements, data security, and privacy will inform best practices for your work.
Finally, be sure to learn the legal obligations of your jurisdiction, as well as participant rights in data control as you plan your research. In Canada, TCPS 2 (2022) is a useful resource to source, however make sure that you also consider the data management plan of your institution.
For more information around the TCPS 2 data laws, feel free to review the following policy and guidance from the Tri-Council.
Best Practices For Data Management
So how can you make sure that your research maintains these standards? Go through the following points.
Can you identify when there might be added concern when it comes to digital research?Â
Limit Personal Information Collected |
|
Use Secure and Long-Lasting File Formats |
|
Backup Data Safely â Follow the 3-2-1 Rule |
|
Protect Data with Secure Storage & Encryption |
|
Restrict Access & Maintain Data Logs |
|
Ensure Data Privacy & Report Security Issues |
|
Proper Data Retention & Disposal |
|
Avoid Storing Sensitive Data on Networked Devices |
|
Feedback/Errata