General Guidance - Conducting the Study

Even in properly designed protocols, situations can arise that threaten the confidentiality of a subject’s private information. Examples include a court’s subpoena of research documents, the loss of a laptop containing research data, or an investigator’s need to disclose information to comply with a law or protect the subject or a close contact from harm. The links in the box at right provide more information about these topics.