Research Data Events

Previous Research Data Brown Bag Events

Protecting Your Human Subjects Data

Click to see the video

Date and Time: Friday, October 23, 2020, 12pm

Guest Speakers:

Adrienne Tanner, Asst. Director, Office for Protection of Human Subjects

Colleen Kohashi, Institutional Review Board Analyst/Administrator, Committee for Protection of Human Subjects (CPHS-2)

Office for the Protection of Human Subjects | Compliance Services

People who volunteer to participate as subjects in research do so with the understanding that the researcher(s) will protect their identity and the information obtained about them from inadvertent or inappropriate disclosure. All human subject research protocols must have in place an acceptable and documented procedure for the protection of identifiable and/or confidential information before the protocol will be approved. Assistant Director Adrienne Tanner and IRB Administrator Colleen Kohashi from the Office for Protection of Human Subjects will speak about general data security requirements and IRB review. Q&A to follow the presentation. 

How do I Purchase Data, and What is Appendix DS?

Click to see the video

Date and Time: Friday, October 30, 2020, 12pm

Guest Speakers:

Mike Murphy, Procurement Manager

Procurement | Supply Chain Management

For those that purchase sensitive data or may share institutional information with third-party suppliers, this discussion will provide a better understanding of how and when to incorporate the UC Appendix Data Security (PDF) terms and conditions into purchasing agreements/purchase orders with suppliers.

Data and Privacy: FERPA and Recruiting Research Subjects

Click to see the video

Date and Time: Friday, November 6, 2020, 12pm

Guest Speakers:

Scott Seaborn, Interim Campus Privacy Officer

About the Privacy Office | Office of Ethics

As researchers in higher education look to capitalize on the vast treasure trove of student data held by universities, it is important to pause and consider the implications of the Family Educational Rights and Privacy Act (FERPA) on student data sets. In some ways, FERPA is more restrictive than other privacy laws such as HIPAA, and in other ways it is less restrictive. Campus Privacy Officer, Scott Seaborn, will discuss the implications of FERPA on research in higher education and provide some tools to help researchers ensure that their studies comply with FERPA.

Introducing the Secure Research Data and Compute (SRDC) Platform

Click to see the video

Date and Time: Friday, November 13, 2020, 12pm

Guest Speakers:

Chris Hoffman, Associate Director of Research IT

Research IT | at UC Berkeley

In this presentation and discussion, we will describe the SRDC Platform, a new research computing and data management platform for researchers working with highly sensitive data, that brings together high performance computing (HPC), virtual machines, and large data storage and movement. Research IT consultants work with researchers to help determine the security that is required for their research data and project, and can help steer researchers to the appropriate systems and resources, including the SRDC Platform.

Introduction to containers on Savio: creating reproducible, scalable, & portable workflows

Introduction to containers on Savio: creating reproducible, scalable, & portable workflows

This training will introduce you to the key concepts and tools for using containers, in particular, Docker and Singularity containers. Containers make it easy to install software, move your computation between different computing environments, and make your workflow reproducible. The training will focus on the use of Singularity on Savio, the campus high-performance computing cluster, including how to use Docker images by Singularity in a cluster environment. Topics will include: -Overview of why you might use containers -Running containers (using Singularity) on Savio, including using Docker images -Building containers -Using containers for parallel computation with MPI -Using containers with GPUs -Where to find pre-built containers -Reproducibility Please follow these instructions to install Singularity ahead of the training. We will have consultants available starting at 3:15 to answer any questions in advance of the training.