This article is part of the network’s archive of useful research information. This article is closed to new comments due to inactivity.  We welcome new content which can be done by submitting an article for review or take part in discussions in an open topic or submit a blog post to take your discussions online.




The article describes several approaches that can be used in meeting the challenges posed by the sharing of confidential data. It provides an overview of two basic methods of protecting the confidentiality of data, which include restricted data and restricted access. It also shows examples of data sharing agreements. Finally, the article summarizes issues to be considered by Institutional Review Board and research administrators.

Link to access full article:


Data Sharing  


Archive  data sharing