C) Employees with access to data on a need-to-know basis will be advised in writing of
the confidentiality requirements and must agree in writing to abide by these requirements.
D) Subcontractors requiring access to identified data will only do so according to an
information transfer agreement which states that the confidentiality of the data must be
maintained and that the information may only be used for research or statistical purposes;
E) Private persons from whom identified data are obtained or collected will be advised
either orally or in writing that the data will only be used for research and statistical
purposes and that compliance with requests for information is not mandatory. That is,
participation in the research is voluntary and may be withdrawn at any time. If the
notification requirement is to be waived, an explanation must be contained within or
attached to the Privacy Certificate;
F) Adequate precautions will be taken to ensure the administrative and physical security of
the identified data.
G) A log indicating that identified data have been transferred to persons other than those in
NIJ or other OJP bureaus, created under the Omnibus Crime Control Act or its amendments,
or to grantee, contractor, or subcontractor staff will be maintained and will indicate whether
the data has been returned or if there is an alternative agreement for the future maintenance of
such data.
H) Project plans will be designed to preserve the anonymity of persons to whom the informa-
tion relates, including where appropriate, name-stripping, coding of data, or other similar
procedures.
I) Project findings and reports prepared for dissemination will not contain information which
can reasonably be expected to be identifiable to a private person.
J) Upon completion of the project, the security of research or statistical information will be
protected by either:
i. the complete physical destruction of all copies of the materials or the identified portions
of the materials after a three year required recipient retention period or as soon as
authorized by law; or
ii. the removal of identifiers from the data and separate maintenance of a name-code
index in a secure location.
If you choose to keep a name-code index, you must maintain procedures to secure such an
index.