Resources :: Guide :: Data Collection :: Protecting Privacy
Protecting Privacy
As stated in the introduction, privacy relates to the method for collecting data; in other words, the study's location, tools, and planned interactions affect your ability to maintain your participant's privacy.
When you obtain IRB approval for a study, you will need to explain how you will respect the participant’s privacy. Sometimes researchers are confused about how to determine what information is private. A good question to ask is, “Would a reasonable member of the population being studied consider the information to be private?” For example, covert observation of public behavior (e.g., studying pedestrians on a crowded street) would probably not be considered an invasion of privacy, while covert observation of behavior in a person’s home would. Also, behavior that occurs in public places may not be public behavior if the individuals involved have a reasonable expectation of privacy (e.g., if it occurs in a public restroom).
With the exception of some observational studies, most research in the social and behavioral sciences involves private behaviors, and protecting the privacy of your participants means giving them control over the information that they share with you. This means asking permission and getting consent to conduct any study procedures with individual participants, allowing them to refuse to answer any questions or complete any study tasks that they find objectionable, and ensuring that the study is run in a private place. For example, if you are asking sensitive questions, you may want to consider finding a secluded room for interviewing participants and/or using white noise machines to reduce the chance that sensitive information may be overheard. In some cases where a potential invasion of privacy may exist in situations because consent is not possible (e.g., reviewing academic or medical records for epidemiological studies) measures are still taken to protect the privacy of participants. Using anonymous data and/or data stripped of identifiers through appropriate methods protects participants even if their data are accessed without a consent form.