ADHS Data Sharing Request

The University of Arizona and the Arizona Department of Health Services (ADHS) have created a Memorandum of Understanding to provide UA researchers the opportunity to conduct collaborative research based on accessibility to ADHS datasets. This initiative, spearheaded by the UAHS Center for Population Science Discovery, will enable data sharing for projects that have a link to Public Health practice or projects that involve pure research.  

UA researchers can submit proposals to the ADHS/University of Arizona Research Collaboration Steering Group for pre-screening, which includes the evaluation of project feasibility and availability of data as outlined in the UA-ADHS Data Sharing Agreement. 


GETTING STARTED

  • Submit your research project to the UA IRB for review and approval.
  • Complete and submit a UA-ADHS Data Sharing Request (including your UA IRB Approval) to the ADHS/University of Arizona Research Collaboration Steering Group.

        » Submit UA-ADHS Data Sharing Request

  • Each project will be reviewed by the ADHS/University of Arizona Research Collaboration Steering Group consisting of 2-3 persons each from the ADHS and UA.
    • In most cases, the Steering Group will designate the UA IRB for primary oversight of the project.
    • In rare cases, the Steering Group may decide to designate the ADHS IRB for  primary oversight.
    • The Steering Group will work with the UA researcher and ADHS Data Owner to get program consent for the project.
    • Data is transferred from CB2 to the UA researcher after the project has been approved.
    • Research projects that do not include personal identifiers (e.g. HIPPA Limited Data Sets) will receive expedited review/approval. 

DATA SECURITY

The Center for Biomedical Information & Statistics (CB2) is designated as the Honest Brokers for the project data (once approved) and are responsible for ensuring compliance with the data security safeguards including:

  • Ensuring only authorized personnel have access to the data, including agents or subcontractors;
  • Ensuring only secure servers and encrypted devices are used;
  • Prohibiting the use of non-encrypted flash drives, CDs, external drives, smart phones, or other non-networked hard drives;
  • Asking the research team to demonstrate compliance with data security protocols;
  • Ensuring compliance with security breach protocols; and
  • Ensuring data destruction at project termination.