If possible, data should be collected anonymously or the identifiers should be removed and destroyed as soon as possible and access to research data should be based on a “need to know” and "minimum necessary" standard. Protocols should be designed to minimize the need to collect and maintain identifiable information about research subjects.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |