Social Media, Research, and Ethics: Challenges and Strategies
|
|
|
- Adelia Floyd
- 10 years ago
- Views:
Transcription
1 Social Media, Research, and Ethics: Challenges and Strategies Elizabeth A. Buchanan, Ph.D. Endowed Chair in Ethics University of Wisconsin-Stout Presentation for The Department of Energy and the University of Southern California Community IRB Members
2 Objectives To define types of Internet and social media To review examples of research intersecting with the Internet and social media To describe the types of ethical and regulatory issues that these interactions raise To discuss how IRBs are reviewing novel forms of research recruitment, data collection, dissemination, and storage of data To provide strategies for successful research and review of research in social media/internet-based research
3 Internet Research
4 Internet Research Internet-based research, broadly defined, is research which utilizes the Internet to collect information through an online tool, such as an online survey; studies about how people use the Internet, e.g., through collecting data and/or examining activities in or on any online environments; and/or, uses of online datasets, databases, databanks, repositories. Internet as a TOOL FOR research or Internet as a MEDIUM/LOCALE OF research TOOL=search engines, databases, catalogs, etc MEDIUM/LOCALE=chat rooms, MUDs, MOOs, newsgroups, web sites, MMORPGs, blogs, skype, social media, tweets, online course software, etc Increasingly, the line between tool and locale is blurring in the face of social media
5 Key Ethical and Regulatory Issues Recruitment Consent Age verification Documentation Privacy/Anonymity/Confidentiality Data Sharing Data Storage TOS/EULA bind the user/subject to other terms?
6 What is Ethically Unique to E-Data? Greased Malleable Trackbackable/Mineable Mashable Travels across platforms (collapse of internet and cell/mobile/grid)
7 Forms of Research Venues , listserves, archives, chat rooms, SMS, IM, social network sites, blogs, home pages, media sharing sites, virtual worlds, online marketplaces, online gaming, databanks, repositories Non-place based sites such as mobile data collection and dissemination
8 Forms of Research: Exploring Where Human Subjects Fit Consider Methodologies, Venues, Types of Data Generated through: Quantitative Research Data Aggregation, Scraping, Transaction Log Analysis, Network Analysis, Statistical Analysis, Surveys, etc Qualitative Research Ethnography, Focus Groups, Observation, Surveys, Content/Discourse Analysis, etc Emerging use of synchronous data collection/sharing across methodologies Emerging use of mixed venues leads to greased and malleable data flow 8
9 California Clinical Trials For Example
10
11
12
13
14 Subject recruitment OHRP considers subject recruitment part of informed consent Recruitment plan must receive IRB review/approval prior to initiation Online recruitment methods YouTube Twitter streams Blog postings Push methods
15 Subject recruitment (2) OHRP guidance on IRB review of clinical trial websites No IRB review needed for descriptive information: study title purpose of the study protocol summary basic eligibility criteria study site location(s), and how to contact the study site for further information.
16 Subject recruitment (3) IRB review needed if additional information is provided Description of research risks/potential benefits Solicitation of identifiable private information (e.g. eligibility survey) Incentives monetary and non-monetary What needs to be reviewed: Recruitment plan, not the actual webpage
17 Social media vs. Traditional Recruitment Uncontrolled following discussion among viewers/participants (and others, possibly) Interactive, not static Subsequent posts may modify already posted information Must PI/IRB actively monitor social media sites used for recruitment? -FDA watch for reporting
18 Privacy.
19 Recorded in a manner whereby subjects may be identified Is an address an identifier? Do tweets contain identifiers? Does the inclusion of IP address make information identifiable? Possibility of reidentification how meaningful is this decision point?
20 Public and Private Spaces Is a particular forum, listserve, chat room, bulletin board, etc considered by its members to be a public space or a private space? What expectations of privacy exist? What role does the researcher play in the space? (Observer, participant, member, other?) What is the content of the data? (Sensitive/non-sensitive?) Sveningsson s continuum: Private Non-Sensitive Information?? No? Sensitive Information Public
21 IRB Review Risks--Two main sources of harm: Participation in the research No direct contact with subjects; can t deal with individual reactions (intervention or debriefing) Breach of confidentiality Reliability and validity of the data skewed subject populations ease with which subjects can mislead investigators difficulty in preventing multiple submissions Invalid research can have no benefit inappropriate when there is risk to subjects
22 Minimal Risk Probability and magnitude of harm or discomfort in the research not greater than ordinarily encountered in daily life or during performance of routine physical or psychological examinations/tests (.102(i)) Gateway to expedited review (.110); waiver of consent (.116(d)) and documentation (.117(c)(2)); no need to explain compensation or any treatments for research-related injury in consent (.116(a)(6)); Subparts B, C, D categories of permissible research Have the risks associated with breaches of data security or the likelihood of access by 3 rd parties altered the conception of minimal risk in internet research? Less privacy, more observation in general in daily life activities
23 Consent
24 Informed consent Consider waiver of consent and/or documentation, if appropriate Where consent required but documentation is waived, a portal can be used to provide consent information. e.g., subjects must click on consent page to get to next page. Virtual worlds consent rooms and tokens Where documentation required consider alternatives to traditional documentation --e.g., electronic signature
25 Consent Portal
26
27 Research with Minors/Vulnerable Populations Points to consider in screening out children: use internet monitoring software or adult check systems none of these is foolproof. Since it may be difficult to guarantee that children won t access research, some research may not be appropriate in the online context Importance of using chunked consent documents
28 We started with a welcome page which briefly summarized the points of key interest
29 We brought our eligibility criteria forward so we did not waste noneligible persons time.
30
31 Encryption Guide? Thanks for your interest in participating in an online interview with me as part of the Drugs on Forums project. I use instant messaging as a means of conducting the online interview. This webpage explains how this process can be conducted with the same kind of confidentiality that applies to face-to-face or telephone interviews. As you may already be aware, s and instant messages are insecure when sent in plain text. Firstly, they can be intercepted (read by others or altered by others), and secondly, the reader cannot be certain that the sender is who they claim to be. The most effective way of ensuring that what we write will only be read by each other is to use encryption. All the program options I recommend below are free and you will be able to use them with anyone once you show them how. Some are packaged as portable software, which means you can run them from a USB flash drive on any computer. If you are unable or unwilling to use these programs, using an instant messaging account that is not linked to your full name (eg. [email protected]) will also provide a degree of confidentiality. If we communicate without encryption, it is possible that third parties could intercept and read our conversation without our consent. However as long as your identity cannot be easily worked out, any risk to you will be reduced. Many people who are concerned about online privacy may already have an account that has never been associated with their full name. It is easy to start a free webmail account completely for this purpose.
32 Online Support Groups
33 Data Aggregation/Scraping
34
35 Regulatory Considerations Human subjects Private How to interpret reasonably expect that no observation or recording is taking place or reasonably expect will not be made public Identifiability, again Zip code + sex + DOB enough for Latanya Sweeney to identify Structure of social network, search terms, purchase habits, movie ratings on Netflix may uniquely identify individual IP address
36 Regulatory Considerations Exemption 4 When is information recorded in an identifiable manner When are data, documents, or records publicly available on the internet? Does publicly available include large datasets purchased/obtained from Google or Facebook? What if data are semi-restricted -- available only to friends, listserve members? What if data are available through Wikileaks or other source where provenance is questionable?
37 Key Considerations for Review What type of venue Expectations of privacy Consent procedures Sensitivity of data Harm/Risk Age verification Authentication of participants Identification of participants Use of encryption Storage/transmission of data
38 Example Guidelines
39 Resources Internet internetresearchethics.org Expert interentresearchethics.org New Internet research section in JERHRE
IRB Application for Medical Records Review Request
Office of Regulatory Research Compliance Institutional Review Board FORM B1 : Medial Records Review Application FORM B1 IRB Application for Medical Records Review Request Principal Investigator: Email:
What is Covered under the Privacy Rule? Protected Health Information (PHI)
HIPAA & RESEARCH What is Covered under the Privacy Rule? Protected Health Information (PHI) Health information + Identifier = PHI Transmitted or maintained in any form (paper, electronic, forms, web-based,
ETHICAL ISSUES IN SOCIAL NETWORKING RESEARCH. Prof. Paula Swatman Chair, Social Sciences HREC University of Tasmania
ETHICAL ISSUES IN SOCIAL NETWORKING RESEARCH Prof. Paula Swatman Chair, Social Sciences HREC University of Tasmania Ethics in Social Media Research 2 Research into & with Social Media The Internet supports
Using Social Media in Research: Regulatory and IRB Considerations
Using Social Media in Research: Regulatory and IRB Considerations Webinar Housekeeping Questions & Answers Feel free to submit questions at any point during the webinar using the chat box on your webinar
Miami University: Human Subjects Research General Research Application Guidance
Miami University: Human Subjects Research General Research Application Guidance Use the accompanying Word template for completing the research description. You must provide sufficient information regarding
Principal Investigator Responsibilities for Education and Social/Behavioral Researchers
Principal Investigator Responsibilities for Education and Social/Behavioral Researchers Introduction The purpose of this module is to provide a basic understanding of the responsibilities of the principal
Facebook s Emotional Contagion: Social Media Research
Facebook s Emotional Contagion: Social Media Research Mount Allison University March 11, 2015 Gordon DuVal, SJD [email protected] www.gduval.com Emotional Contagion 2 3 Facebook Research In 2012, Facebook
Institutional Review Board
Institutional Review Board Ethical Principles of Informed Consent Informed Consent Guidelines The principle of respect for persons requires that people be given the opportunity to choose what will or will
SOP 502L: INTERNET/SOCIAL MEDIA-BASED RESEARCH
University of Oklahoma Office of Human Research Participant Protection : INTERNET/SOCIAL MEDIA-BASED RESEARCH 1. POLICY Internet/social media-based research projects are reviewed by the IRB just as any
WHEN I WANT TO: I NEED TO SUBMIT: {for CIRB studies, see the specific FAQ}
IRB forms and materials to be submitted WHEN I WANT TO: I NEED TO SUBMIT: {for CIRB studies, see the specific FAQ} 1 2 Request a determination as to whether AHC is the appropriate IRB of record (i.e. is
Winthrop-University Hospital
Winthrop-University Hospital Use of Patient Information in the Conduct of Research Activities In accordance with 45 CFR 164.512(i), 164.512(a-c) and in connection with the implementation of the HIPAA Compliance
Nova Southeastern University IRB - Consent Form Checklist Version Date: 02/17/2010
Nova Southeastern University IRB - Consent Form Checklist Version Date: 02/17/2010 This form is intended to assist researchers in creating consent and assent forms. Informed consent is one of the primary
Human Subjects Research (HSR) Series
Human Subjects Research (HSR) Series CITI Program s HSR series consists of modules from two basic tracks, Biomedical (Biomed) and Social- Behavioral- Educational (SBE), and a set of Additional Modules
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
Instructions for Form: Application for Claim of Exemption
Instructions for Form: Application for Claim of Exemption In order to decide whether your activity involves research that may be reviewed and approved at the exempt level, review the following information.
NOTE: BY CLICKING TO AGREE AND BY USE OF THIS SERVICE YOU ARE CONCLUDING A LEGALLY BINDING AGREEMENT. READ CAREFULLY.
INTERNET BANKING SERVICE AGREEMENT NOTE: BY CLICKING TO AGREE AND BY USE OF THIS SERVICE YOU ARE CONCLUDING A LEGALLY BINDING AGREEMENT. READ CAREFULLY. Introduction. This Internet Banking Service Agreement
IRB 101: HUMAN SUBJECTS PROTECTION PROGRAM
1 IRB 101: HUMAN SUBJECTS PROTECTION PROGRAM Wednesday, April 23, 2014 Cohen Lounge Hila Berger, MPH, CIP Research Compliance Administrator Amy Krenzer, CIP IRB Coordinator 2 Objectives What is the IRB
State Records Guideline No 18. Managing Social Media Records
State Records Guideline No 18 Managing Social Media Records Table of Contents 1 Introduction... 4 1.1 Purpose... 4 1.2 Authority... 5 2 Social Media records are State records... 5 3 Identifying Risks...
Principal Investigator and Sub Investigator Responsibilities
Principal Investigator and Sub Investigator Responsibilities I. Purpose To define the roles and responsibilities of Principal Investigators conducting research at GRU. II. Definition The term Principal
Social Media Research 101. By: Dorean J. Flores, CIP Manager, North Shore-LIJ IRB
Social Media Research 101 By: Dorean J. Flores, CIP Manager, North Shore-LIJ IRB CME Disclosure Statement The North Shore LIJ Health System adheres to the ACCME s new Standards for Commercial Support.
RESEARCH INVOLVING DATA AND/OR BIOLOGICAL SPECIMENS
RESEARCH INVOLVING DATA AND/OR BIOLOGICAL SPECIMENS 1. Overview IRB approval and participant informed consent are required to collect biological specimens for research purposes. Similarly, IRB approval
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Human Subjects Research at OSU
Office of Responsible Research Practices 300 Research Foundation 1960 Kenny Road Columbus, OH 43210-1063 Human Subjects Research at OSU Phone (614) 688-8457 Fax (614) 688-0366 www.orrp.osu.edu Behavioral
Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule
AA Privacy RuleP DEPARTMENT OF HE ALTH & HUMAN SERVICES USA Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule NIH Publication Number 03-5388 The HI Protecting Personal
ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015
ETHICAL ELECTRIC PRIVACY POLICY Last Revised: December 15, 2015 This policy ("Policy") covers the privacy practices that Ethical Electric, Inc. ("Ethical Electric", "we" or "us") employs with respect to
What is Covered by HIPAA at VCU?
What is Covered by HIPAA at VCU? The Privacy Rule was designed to protect private health information from incidental disclosures. The regulations specifically apply to health care providers, health plans,
INSTITUTIONAL REVIEW BOARD (IRB) REVIEW FORM FOR PROJECTS USING HUMAN SUBJECTS
INSTITUTIONAL REVIEW BOARD (IRB) REVIEW FORM FOR PROJECTS USING HUMAN SUBJECTS Investigators are responsible for ensuring that the rights and welfare of human subjects participating in research activities
2014 Metrics on Human Research Protection Program Performance
2014 Metrics on Human Research Protection Program Performance Updated May 15, 2015 About the Metrics Improving the quality of human research protection programs (HRPP) is a top priority of AAHRPP. Effective
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
PMAs, 510(k)s, and Advanced IDE Topics
PMAs, 510(k)s, and Advanced IDE Topics Kenneth J. Cavanaugh Jr., Ph.D. Scientific Reviewer Division of Cardiovascular Devices Office of Device Evaluation Center for Devices and Radiological Health [email protected]
Institutional Review Board for the Use of Human Subjects in Research GUIDELINES FOR A PROPOSAL NARRATIVE
Institutional Review Board for the Use of Human Subjects in Research GUIDELINES FOR A PROPOSAL NARRATIVE In your narrative, address each of the topics outlined below. Every application for IRB review must
MRIA CODE OF CONDUCT FOR MARKET AND SOCIAL MEDIA RESEARCH. Appendix E GUIDELINE FOR QUALITATIVE RESEARCH
MRIA CODE OF CONDUCT FOR MARKET AND SOCIAL MEDIA RESEARCH Appendix E GUIDELINE FOR QUALITATIVE RESEARCH Definition and Scope of Qualitative Research 1. Qualitative research is defined as any research that
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association DISCLAIMER This general information fact sheet is made available
Organizational Policy
Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy
Investigator responsibilities for research conducted under the authority of the UTHSCSA Institutional Review Board (IRB)
March 1, 2006 M E M O R A N D U M F O R R E C O R D TO: FROM: SUBJECT: Deans Department Chairs Principal Investigators Brian Herman, Ph.D. Vice President for Research Investigator responsibilities for
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
DentalTek Privacy Statement
DentalTek Privacy Statement DentalTek (the Company ) is committed to protecting the privacy of individuals who visit the Sites ( Visitors ), individuals who register to use the Services (as defined below)
Data Security Plan Development Guide for Researchers
Data Security Plan Development Guide for Researchers November 2014 Prepared for: Association for Public Policy Analysis and Management Fall Research Conference Submitted by: Sean Owen, CISSP, CAP and Teresa
Data Security Considerations for Research
Data Security Considerations for Research Institutional Review Board Annual Education May 8, 2012 1 PRIVACY vs. SECURITY What s the Difference?: PRIVACY Refers to WHAT is protected Health information about
MYACCLAIM PRIVACY POLICY
MYACCLAIM PRIVACY POLICY 1. Introduction MyAcclaim is an online collaboration tool that allows users to annotate video. MyAcclaim s mission is to allow its users, with ease and simplicity, to unleash the
ARYZTA PRIVACY POLICY
ARYZTA PRIVACY POLICY TABLE OF CONTENTS 1. Privacy Statement 2. Consent 3. Consent to Share and Disclose Information, Including International Data Transfers 4. Consent to Electronic Notice If There is
Engaging E-Patients in Clinical Trials through Social Media. Patient Recruitment and the E-Patient: A Survey Analysis
Engaging E-Patients in Clinical Trials through Social Media Patient Recruitment and the E-Patient: A Survey Analysis Introduction Social media is a powerful medium for reaching patients engaged in their
CoSign for 21CFR Part 11 Compliance
CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed
Guidance on IRB Continuing Review of Research
NOTE: THIS GUIDANCE SUPERSEDES OHRP S JANUARY 15, 2007 GUIDANCE ENTITILED GUIDANCE ON CONTINUING REVIEW. CLICK HERE FOR THE JANUARY 15, 2007 GUIDANCE. Office for Human Research Protections Department of
Social Media Friend or Foe?
12 Maryland Bar Journal March 2011 Social Media Friend or Foe? By Linda D. Schwartz Web 2.0 is a term used to describe Internet communications through interactive commentary or written discussions between
Joint Position on the Disclosure of Clinical Trial Information via Clinical Trial Registries and Databases 1 Updated November 10, 2009
Joint Position on the Disclosure of Clinical Trial Information via Clinical Trial Registries and Databases 1 Updated November 10, 2009 The innovative pharmaceutical industry 2 is committed to the transparency
Human Research Protection Program Good Clinical Practice Guidance for Investigators Investigator & Research Staff Responsibilities
This Guidance Document is to ensure that investigators and research personnel recognize their responsibilities associated with the conduct of human subject research by outlining their responsibilities,
Yale University Open Data Access (YODA) Project Procedures to Guide External Investigator Access to Clinical Trial Data Last Updated August 2015
OVERVIEW Yale University Open Data Access (YODA) Project These procedures support the YODA Project Data Release Policy and more fully describe the process by which clinical trial data held by a third party,
Addressing Public and Private Issues in a Virtual Ethnography Study of an Open Online Community: a Reflective Paper
Addressing Public and Private Issues in a Virtual Ethnography Study of an Open Online Community: a Reflective Paper St. Wisnu Wijaya, Jason Watson, Christine Bruce School of Information System, Faculty
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
IDT Financial Services Limited. Prime Card Privacy Policy
IDT Financial Services Limited Prime Card Privacy Policy Effective and Updated April 7, 2014 General IDT Financial Services Limited and its affiliates ( IDT, us, we, our ) are committed to protecting the
Revision(s) to an Approved Study Form
Revision(s) to an Approved Study Form Revisions may range from a request to change a typographical error in the consent form to a significant change in the study design. Federal regulations and University
To IRB, or Not to IRB? That Is the Question!
To IRB, or Not to IRB? That Is the Question! A presentation by Mary Sapp, Ph.D. Assistant Vice President, Planning & Institutional Research University of Miami and Thomas K. Martin, Ph.D. Associate Vice
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Ubiquity of Email Security Compliance and Content Management
CIBC Global Services Ubiquity of Email Security Compliance and Content Management Stephen Dodd Director Enterprise Accounts [email protected] 416-226-8616 404-551-3077 2006, Echoworx Corporation Agenda
Guidance for Sponsors, Investigators, and Institutional Review Boards. Questions and Answers on Informed Consent Elements, 21 CFR 50.
Guidance for Sponsors, Investigators, and Institutional Review Boards Questions and Answers on Informed Consent Elements, 21 CFR 50.25(c) (Small Entity Compliance Guide) U.S. Department of Health and Human
Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.
Polling Question Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication. Please type in your response. This poll will close promptly at 1:00 pm CDT Getting the
State University of New York at Canton Institutional Review Board. Sample Informed Consent Document
State University of New York at Canton Institutional Review Board Sample Informed Consent Document The following sample informed consent document includes instructions to the person writing the document,
Adventist HealthCare, Inc.
IRB POLICY ON HUMAN RESEARCH PROTECTION (HRP) AND GOOD CLINICAL PRACTICE (GCP) TRAINING Collaborative Institutional Training Initiative (CITI) Requirements at Adventist Healthcare, Inc. I. Required Human
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
Standard Operating Procedures
Standard Operating Procedures Ffff H a r v a r d L o n g w o o d M e d i c a l A r e a Office of Human Research Administration 90 Smith St. Suite 335 Boston, MA 02120 617-432-3071/ 617-432-2157 www.hsph.harvard.edu/ohra
CIIS Human Research Review Committee HRRC APPLICATION PACKET
CIIS Human Research Review Committee HRRC APPLICATION PACKET BEFORE COMPLETING THE APPLICATION, you must have: A complete research proposal reviewed by your chair*. Guidance from your chair in completing
Shiny Server Pro: Regulatory Compliance and Validation Issues
Shiny Server Pro: Regulatory Compliance and Validation Issues A Guidance Document for the Use of Shiny Server Pro in Regulated Clinical Trial Environments June 19, 2014 RStudio, Inc. 250 Northern Ave.
Privacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
City of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
E-Ethics Approval application process
E-Ethics Approval application process 1. Who should complete an E-Ethics form? An E-Ethics Approval application must be submitted by researchers (undergraduate, masters students, PhD students and staff)
