JSM 2004 - Toronto

Abstract #301926

This is the preliminary program for the 2004 Joint Statistical Meetings in Toronto, Canada. Currently included in this program is the "technical" program, schedule of invited, topic contributed, regular contributed and poster sessions; Continuing Education courses (August 7-10, 2004); and Committee and Business Meetings. This on-line program will be updated frequently to reflect the most current revisions.

To View the Program:
You may choose to view all activities of the program or just parts of it at any one time. All activities are arranged by date and time.

The views expressed here are those of the individual authors
and not necessarily those of the ASA or its board, officers, or staff.


Back to main JSM 2004 Program page



Activity Number: 403
Type: Topic Contributed
Date/Time: Thursday, August 12, 2004 : 8:30 AM to 10:20 AM
Sponsor: Section on Government Statistics
Abstract - #301926
Title: Federal Data Sharing Requirements and Issues: Contributions to be Made by Statistics, Survey Research, and Related Disciplines
Author(s): Virginia A. de Wolf*+
Companies: Consultant
Address: 522 Oakland Hills Lane, Kerrville, TX, 78028,
Keywords: NIH ; NSF ; HIPAA ; statistical disclosure limitation methods ; accessing confidential data ; data protection
Abstract:

Beginning Fall 2003 the National Institutes of Health (NIH) required that all funding proposals requesting over $500,000 in direct costs in a year include specific plans for data-sharing. These plans must safeguard the privacy of participants and protect confidential and proprietary data. The National Science Foundation (NSF), another major federal source of research funding, has a policy which strongly encourages the sharing of data collected by NSF grantees. And the Privacy Rule of the Health Insurance Portability and Accountability Act (HIPAA) permits the sharing of "protected health information" with or without patients' authorization. Researchers applying for NIH and NSF grants, as well as those requesting data under HIPAA, need to know about methods used to protect confidential data (termed "restricted access" and "restricted data"). The purposes of this paper are to briefly describe these methods, suggest academic disciplines that have knowledge of such methods, and strongly encourage faculty with knowledge of these methods to pool their expertise and serve as resources for their colleagues. Ideas for such collaborations are given.


  • The address information is for the authors that have a + after their name.
  • Authors who are presenting talks have a * after their name.

Back to the full JSM 2004 program

JSM 2004 For information, contact jsm@amstat.org or phone (888) 231-3473. If you have questions about the Continuing Education program, please contact the Education Department.
Revised March 2004