In a legal case, a participant is protected if a Certificate of Confidentiality was issued by which of the following?
A) The National Institutes of Health to prevent forced disclosure
B) The Internal Review Board of the institution to protect the participant
C) The principle researcher to avoid a breach of confidentiality
D) The court to protect a member of a vulnerable group
A
Feedback:
To avoid the risk of forced disclosure of sensitive information (e.g., through a court order), researchers in the United States can apply for a Certificate of Confidentiality from the National Institutes of Health (NIH). The certificate allows researchers to refuse to disclose information on study participants in any civil, criminal, administrative, or legislative proceeding.
You might also like to view...
A nurse working in a rehabilitation center notices clients frequently asking for something to drink while in the facility. Which action indicates the use of creativity in finding a solution to this problem?
1. Calling local beverage distributors to inquire about service pricing 2. Asking all employees to write down their ideas about a solution 3. Determining what type of drinks most clients might want 4. Encouraging clients to bring a drink from home
Raths, Harmin, and Simon (1978) formulated a theory of values clarification and proposed a three-step process for valuing. The three steps in the process include which of the following? Select all that apply
a. choosing c. acting b. prizing d. deciding
A breast examination normally includes checking all of the following features of the breasts, EXCEPT
a. weight. c. discharge. b. contour. d. symmetry.
You are asked to justify the creation of the first public health informatics (PHI) program in your jurisdiction. You will emphasize this likely benefit by ensuring:
a. current PHI can enhance public health surveillance such as identifying clusters of diseases. b. privacy and security issues are avoided because public health informatics data are de-identified at the community level. c. interoperability already exists for public health IT. d. standards already exist for PHI.