General description |
how the recording will be used to address study goals (and possibility of additional study goals; see data re-use below)
length and scope of recording (e.g., continuous vs snippets, recording radius)
examples of what could be recorded (e.g., environmental sounds, background conversations)
how recordings will be processed (e.g., automated software, researchers listening to short snippets / entire recording)
type of data to be extracted (e.g., speech quantity, emotional markers, conversational content)
whether the recording will be stored or discarded (and whether participants can opt out of this)
other data that will be linked to recordings (e.g., participant demographics, geographic location, date/time)
|
Risks to privacy and confidentiality |
reminder that device could record sensitive or unflattering interactions (e.g., yelling, using the bathroom)
certain activities (e.g., child maltreatment) may not be protected by confidentiality and could be reported to authorities
identify others who may access the recordings under certain conditions, e.g. university research oversight, technical staff
complete confidentiality cannot be guaranteed (e.g. risk of a data breach, reporting mandates)
|
Safeguards to protect privacy and confidentiality |
let participants know they are able to remove the device or pause recording whenever they wish
detail options for participants to vet recording after it is made (e.g., will there be an opportunity to delete portions of the recording?)
describe any options for increasing privacy (e.g., on-device feature extraction)
provide assurance that only trained researchers will have access to the recording unless additional permissions are obtained
no recordings will be shared in publications/presentations without explicit consent
|
Data sharing and re-use |
describe any plans for data sharing and whether participants can opt out of them
provide tiered options allowing sharing of audio data (e.g., data can be shared (1) with select research teams, (2) on a protected repository available to verified researchers, (3) on a repository with unvetted public access)
provide tiered options allowing use of data for additional research questions
|
Strategies to facilitate and ensure comprehension |
|