With the move to online research during the COVID-19 pandemic and growing abundance of available technologies, researchers have started to incorporate new software and hardware into their research methods. From survey platforms to replace pen and paper to medical devices contained within a smartphone; many of these technologies redefined data collection.
Any new software or hardware used to conduct research should be vetted by Teachers College Information Technologies (TC IT) to ensure that it meets privacy and security standards set forth by the College. Prior to submitting a proposal to TC Institutional Review Board (IRB) with a new software, researchers should do the following:
- Check TC IT’s website for a list of approved software.
- If the software is already on TC IT’s published list, the researcher can submit their proposal to the IRB with the proposed software.
- In some cases apps may not be supported by TC IT but commonly used for research (MTurk, ResearchMatch, HonorLock etc.). Some of these apps are listed on TC IRB’s FAQs section.
- Researchers can email TC IRB at IRB@tc.edu with a query if they are not sure whether their software is commonly used in research settings.
- If the software is not on TC IT’s published list, researchers should submit a “Project Request" to TC IT to begin a formal review of the proposed technology. The "Project Request" button can be found on MyTC/Support (upper right corner) "Submit a Project Request."
- In the "Project Request" submission, specify that this technology is proposed for use with human subjects research and if applicable, under IRB review.
- If you have questions about software for research purposes, contact TC IT at servicedesk@tc.columbia.edu or 212-678-3300.
- If you have questions about whether the proposed software is Americans with Disabilities Act (ADA) compliant, contact OASID via email oasid@tc.edu.
- Once the researcher receives approval from TC IT, submit the software along with feedback from TC IT in the TC IRB proposal.
- The IRB will review each protocol on a case-by-case basis.
Researchers can also refer to TC IRB’s Data Sharing & Encryption for more information about privacy and security protections required for human subjects data collection.