Skip to main content

Currently Skimming:

Practice 8: Respect for Data Providers and Protection of Their Data
Pages 85-90

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 85...
... Effective statistical agencies demonstrate respect for their data providers and protect the providers' data to ensure that agencies can fulfill their missions. To maintain a relationship of respect and trust with survey participants and other data providers, a statistical agency should respect their privacy, minimize the reporting burden imposed on them, and respect their autonomy when they are asked to participate in a voluntary program to collect data.
From page 86...
... In surveys of businesses or other organizations, agencies should seek to obtain information directly from the organization's records and so minimize the need for duplicate responses to multiple requests. Protecting and Respecting the Autonomy of Human Research Participants Collecting data from individuals for research purposes using federal funds falls under a series of regulations, principles, and best practices that the federal government has developed over a period of more than 50 years (see NRC, 2003b, 2014c)
From page 87...
... Under the regulations, most federally funded research involving human participants must be reviewed by an independent institutional review board (IRB) to determine whether the design meets ethical requirements for protection.27 Not all federal statistical agencies' data collections are subject to IRB review.
From page 88...
... For sensitive administrative data obtained from another government agency, there must be a credible pledge of confidentiality in a properly formulated memorandum of understanding or other authorizing document. The Confidential Information Protection and Statistical Efficiency Act (CIPSEA)
From page 89...
... . Both the perception and the reality of agencies' confidentiality protection may be affected by departmental initiatives to consolidate data processing and storage to bolster computer and network security in the federal government, improve the cost-effectiveness of information technology development and maintenance, and protect against cyberattacks.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.