Info@cihpng.org
DEFINITION OF TERMS AND CONCEPTS
Dissemination: the process of sharing program or research findings with stakeholders and wider audiences. Dissemination is essential for uptake, and uptake and use of research findings are crucial for the success and sustainability of the intended outcomes or impact of a program or intervention.
Data use: For the purpose of this SOP, data use refers to how data is managed securely, including storage or archiving, encryption, or destruction to prevent unauthorized access, and is retrieved or shared for further analysis for information purposes while ensuring adequate confidentiality and privacy.
Privacy: this is both a legal and an ethical concept that provides the overall framework within which both confidentiality and security are implemented The legal concept refers to the legal protection that has been accorded to an individual to control both access to and use of personal information and provides the overall framework within which both confidentiality and security are implemented.
Data Confidentiality: relates to the right of individuals to protect their data during storage, transfer, and use, to prevent unauthorized disclosure of information to third parties. Decisions must be made whether and under what conditions nominal, anonymized, or pseudo‐anonymized data can be collected, stored, and used.
Data Security: is a collection of technical approaches that address issues covering physical, electronic, and procedural aspects of protecting information collected as part of the scale‐up of HIV services. At each level of service provision, security discussions should include the identification of potential threats to the systems and data, the likelihood of harm from any of these threats to security, and the development of strategies to manage identified threats, protection of data from accidental or malicious inappropriate disclosure, and non‐availability of data due to system failure and user errors.
INTRODUCTION
The Centre for Integrated Health Programs (CIHP) aims to promote better health outcomes through its numerous health programs that target key disease burdens in the Nigerian population in collaboration with partners, funders, and the Government. These health program activities, which include surveillance and research, generate a huge amount of data and information that are important for providing insight and direction for decision-making. To enable effective decision-making, strategic dissemination objectives targeting the right stakeholders must be implemented using best practices. At the same time, there is a need to guard against improper use of data or information by staff, stakeholders, and collaborators alike. This standard operating procedure (SOP) document therefore deals with two main issues: how data available to CIHP will be used and how to ensure that important information for strategic decision-making is made available to the right audience while ensuring that ethical requirements for human subjects’ involvement are strictly observed.
PURPOSE OF THE SOP
The purpose of this SOP is to provide guidance on the steps and processes that should be followed for data use and sharing information about CIHP’s programs (e.g. lessons learned, success stories, or outcomes of projects) and research studies conducted, to ensure adequate data are secured and confidential, dissemination objectives are met, technical quality standards are assured and required clearances are secured.
SCOPE OF THE SOP
The SOP is developed as a guide for CIHP staff members or units involved in the planning, implementation, and evaluation of programs, data management/analysis, and the reporting of project activities/processes, outcomes, and research findings. The SOP will cover protocol requirements for human subject information products, key considerations for data use and protection, developing dissemination plans, identification of relevant audiences or stakeholders, and messages using appropriate dissemination channels. It will also document requirements for developing scientific papers for publications and conference meetings, and monitoring/evaluation of dissemination activities.
The SOP is adapted to cover the relevant regulatory requirements of funders, collaborating institutions, and the National Health Research Ethics Committee.
OBJECTIVES OF THE SOP
MONITORING PROJECT IMPLEMENTATION AND RELATED ACTIVITIES
Public health interventions and their evaluations are characteristically focused on human populations. CIHP will continue to participate in the Government of Nigeria and donor-supported, especially PEPFAR-funded surveys-surveillance, research, and evaluation (SRE) activities1 as well as similar strategic information activities funded by other grants. Therefore, to ensure human subject protection, health interventions, and related activities must be conducted under the guidance of an ethically approved protocol.
CIHP will ensure that a project performance monitoring plan (PPMP) is developed for and tailored to each proposed intervention project. The components of the PPMP will include:
Technical documents will be archived physically (as applicable) and electronically as part of the PPMP.
DATA USE AND PROTECTION
This section outlines the procedures to be followed when dealing with CIHP data. It intends to protect the information assets of the organization within a secure environment and inform authorized data users of the principles governing the retention, use, and disposal of information.
The three interrelated concepts that have an impact on the development and implementation of protections for sensitive data are privacy, confidentiality, and security (see definition). While interrelated, each is distinct, and each is developed and implemented in a different manner.
2 United Nations Educational, Scientific and Cultural Organization. Universal Declaration on Bioethics and Human Rights. Adopted by acclamation on 19 October 2005 by the 33rd session of the General Conference of UNESCO
Data collection that fails to conform to these standards should not be used for the program activity. Funding organizations should comply with these standards and have an obligation to make adequate funding available to implement them, sufficient to ensure the protection of the data collected and used. Funding organizations must also require that maintaining these standards is a condition for funding of any implementing partners or agencies.
CIHP as an organization and its staff will comply with the following requirements:
CIHP will ensure that individual-level information should not be shared with those charged with law enforcement, immigration control, management of the public welfare system, or other non-health functions without consent from the individual to whom the information relates, except in circumstances involving the threat of imminent danger of grave physical harm to individuals or populations.
New and existing technologies deployed to service persons living with HIV should conform to Health Information Exchange standards.
The amount of personal data to be stored should be based on the medical needs of the patient and the requirements to adequately monitor and evaluate special programs or routine healthcare, and should not be stored longer than necessary (see disposal of data section below).
CIHP will put in place procedures and systems to monitor the use of all types of data stored in order to detect potential threats to data confidentiality or actual security breaches. Such procedures include but not limited to:
Threat or disaster management analysis will be performed periodically to assess all potential events that could increase the risk of inadvertent release of data or the destruction of data at sites housing confidential and program data, such as acts of vandalism, fires, civil unrest, and storms. Appropriate preventive measures established to support this process by the IT team in line with approved IT policy, will be monitored for efficiency and preparedness. Information stored on computer systems must be regularly backed up over a secure channel on the organization’s server and drives in addition to the hard drive such that it can be restored when necessary.
CIHP in collaboration with partnering facilities, organizations, and institutions will ensure that rooms/offices containing individual medical records or HIV program data, whether stored as paper documents or electronically, are properly secured to limit unauthorized access.
CIHP as an organization, its staff, and partners will ensure that all removable or portable equipment is properly secured within facilities – room or cabinets – which are locked and appropriately monitored. Computers and other hardware should be properly pass-worded.
Identification tags are applied to fixed and portable equipment to facilitate the creation and maintenance of a regularly updated inventory which will allow detection of equipment losses.
All public health intervention and study data are stored and backed up, usually at physically separate facilities, to prevent loss or damage to the stored data, and to enable data recovery in the event of natural disaster or other data loss. Therefore, backup policies will be implemented to ensure that backed-up data are maintained with the same level of privacy, confidentiality, and security as the original data being used for patient management.
Data storage must anticipate changes to storage technology over the anticipated life span of the data system. As HIV therapy is expected to be a life‐long activity for infected patients, stored data (including backups) must be periodically migrated to newer, more efficient, or compatible storage media.
All additions, deletions, and modifications to electronically and paper-based stored data must always be recorded in a separate file or log. Logs generated during this process must be secured, regularly reviewed, and safely stored.
Rigorous and frequent evaluation of network security is required, which should include ensuring the presence of an effective firewall or other controls where required. All computers need an up‐to‐date anti‐virus and intrusion‐detection software. Linking computers to different networks needs to be done within the context of preserving network security.
CIHP as an organization ensures the control of access to critical information that requires protection against unauthorized disclosure or modification. This refers to the permissions assigned to staff or systems that are authorized to access specific resources. Access controls exist at different layers in the organization, including the network and it is implemented by username and password. Retrieval of information is duly based on access authorized to staff and such requests must be approved by the unit head. At the application and database level, other access control methods (access control lists (ACLs), and group policies) and use of data are implemented to further restrict access.
CIHP as an organization and its staff may share data between or among organizations or institutions provided that:
Access control mechanisms, such as encryption, should be deployed to maintain the confidentiality of data shared. With the increased use of mapping tools for geographic display of data analysis, measures should be taken to indirectly identify individuals via precise location on geographical displays. Data recipients must incorporate available geographic masking techniques for the display of confidential information.
The provision of HIV program information for purposes beyond the needs of public health, or of monitoring and evaluation of services must be contingent on an appropriate scientific protocol addressing a demonstrable need, signing of relevant confidentiality statements, and subject to ethics committee or institutional review board (IRB) approval. Personally identifiable data are most likely to be sent only for clinical management issues and should be sent only by and to people who have signed the relevant confidentiality agreements.
Access to HIV information for non‐public health purposes, for instance for legal issues, should be granted only in circumstances involving the threat of imminent danger of grave physical harm to individuals or populations.
Data designated for disposal should be destroyed in a secure manner according to the approved protocol in relation to data management, including keeping to the timeline for data archiving. All sensitive or confidential paper documents should be placed in the shredding bins or destroyed in the manner indicated by the protocol. Both paper and electronic records should be destroyed, including all data backups.
If modified datasets have been provided to healthcare professionals from outside the institution, upon completion of the authorized work datasets will have to be destroyed by the professionals who analyzed them. Such parties must make a written declaration indicating that this has been done.
CIHP as an organization will ensure to make the data security and confidentiality SOP available to all new and existing staff.
CIHP as an organization and its staff will ensure that the privacy, confidentiality, and security standards outlined in this SOP must apply to all forms of data exchange/transmission. The IT department shall be responsible for monitoring data exchange/transmission over the organization’s network and flagging data exchange/transmission process that goes contrary to the organization’s policies. The SI department shall work in conjunction with the IT department to ensure that tools deployed for data collection and reporting are being used appropriately for the purpose for which they are deployed or else it flags where not to be used appropriately.
CIHP will oversee the data privacy and data protection policies to ensure the operationalization of those policies through all organizational units.
CIHP is obligated to monitor internal compliance and ensure that its staff and partners process personal data in compliance with applicable data protection laws.
DATA DISSEMINATION
A data dissemination plan must be developed to guide how program and research product findings will be shared with stakeholders who need to use the information for their purposes. This should be done in the formative stage of the proposal development in consultation with stakeholders who can potentially affect or be affected by the planned project. The following should be included in a dissemination plan:
A brief summary of the project and/or study
The type and content of information to be shared will depend on identified stakeholders who are important to the project outcomes, either as beneficiaries, facilitators or potential opponents of the project.
A stakeholder analysis should be conducted to map out stakeholders using common tools such as the power/interest matrix (which maps out stakeholders according to their levels of power and interest they have concerning the project) or the AIIM tool (which maps out stakeholders according to their levels of interest and influence as well as alignment to the project).
Along with this analysis, the information needs of each respective groups of stakeholders identified will be clearly defined and documented through a brainstorming session involving the project/research team and other relevant collaborators. This will feed into the messages that will be developed for the stakeholders giving considerations to level of technical understanding.
To ensure timely feedback to target populations/communities participating in research, results will be shared with key stakeholders within two months of the end of data collection and prior to the release of a report. A full report will thereafter be shared with key stakeholders within a required timeframe.
The activities required for dissemination consists of the various means of engaging stakeholders and informing them of the progress of the project/study. Specifically, these include:
Budget lines for data dissemination activities should be factored into the planning for dissemination as appropriate, depending on the type of activities that will be required for a specific project/study.
As an organization, we strive to do high-quality research that will advance science. We come up with what we believe are unique hypotheses, base our work on robust data and use an appropriate research methodology.
In developing manuscripts and other scientific publications, CIHP will ensure compliance with funder requirements/guidelines and this will be considered on a case by case basis.
As we write up our findings, we aim to provide theoretical insight, and share practical implications about our work. Then we submit our manuscript for publication in a peer-reviewed journal.
Submitting our publications in a peer reviewed journal is the vital part of research and so we come up with critical steps to ensure that our manuscript publication is eventually published in the shortest time possible
Figure 1: Evaluation Process, Acceptance for publication
The following adapted rules and plans apply to us as an organization as much as to any organization into publications.
Rules Guiding Authorship Requirements
According to the 2008 International Committee of Medical Journal Editors Statement on Authorship Requirements (verbatim) and which the organization adopts; authorship credit should be based on:
Authors should meet at least one of conditions 1, 2, or 3. All persons designated as authors should qualify for authorship, and all those who qualify should be listed. Each author should have participated sufficiently in the work to take public responsibility for appropriate portions of the content. It is important to note that acquisition of funding, collection of data, or general supervision of the research group does not justify authorship. This indicates no automatic authorship for technicians, students, coordinators, or chairmen; an active contribution is always required.
A manuscript development plan shall be completed and approved as a perquisite for submission to a journal. (See Appendix 2 for template)
All dissemination materials must be go through successive levels of review for technical quality. This entire process will be led by the Associate Director, Epidemiology Surveillance, Research and Outcome; AD-ESRO.
Within CIHP, the first level of review will be conducted by the AD-ESRO or his/her designate.
A satisfactory revised version will be forwarded for a second level review (with possible iterative feedback and revision) and subsequent approval by the D-SI.
In projects or studies conducted in collaboration with other institutions, external reviews may be indicated.
In such circumstances, and where required, external approvals will be secured before information sharing.
A working timeframe for reviews and final sign-off of data dissemination materials is given below in Table 1:
Table 1: Approval Process for Technical Review of Dissemination Products*
Stage | Description of task | Responsible person | Timeline | Remark |
1 | Draft and circulate 1st draft of dissemination material | Designated CIHP staff (may involve multiple persons) | As soon as developed. Could be mandated 5-10 days from assigned date | |
2 | Review zero draft and feedback | Technical team (CIHP) | Within 5 days of receipt | Leadership by AD- ESRO |
3 | Revise and share 1st draft | AD-ESRO or designate | Within 2 days of feedback receipt | Submission for the DSI review |
4 | Review and feedback | D-SI | Within 2 days | |
5 | Revise and share 2nd draft | Designated staff | 1 day | Submission to AD- ESRO for review |
7 | Review and share 3rd draft | AD-ESRO | 2 days | Final submission to D- SI for finalization and to CEO for final internal approval. |
8 | Final approval | CEO | Within 2 days of receipt | Sign-off will be final at this stage except need for external review and approval |
Where external review is required; | ||||
9 | Circulate to external reviewers/Co-Authors for review (if required by TOR) | AD-ESRO | Within 24 hours of D-SI | |
10 | Review and feedback | External Reviewers/Co- Authors | Within 5 days of receipt | |
11 | Joint revision and finalization | CIHP Designated Staff | Within 2 days of receipt | Submit to CEO for final approval |
12 | Final approval | CEO | With 24 hrs. |
Note: D-SI – Director Strategic Information (CIHP); AD-ESRO – Associate Director, Epidemiology Surveillance, Research and Outcome CEO – Chief Executive Officer (CIHP)
*The timelines are considered adequate for the maximum time required to review any information product.
CIHP will collaborate with program partners and funders according to the terms of reference (ToR) which pertains to awarded grants. This collaboration may include the provision of technical assistance to develop program activities, data management and analysis, quality assurance, the presentation and publication of program results and findings, and the management and tracking of finances or other activities as defined by the specific ToR.
Dissemination sessions will be planned with policy makers, donors, IPs, researchers, network of PLWHIV and the academia to discuss findings. Key stakeholders in the HIV response will be prioritized for program data dissemination in line with relevant policies, based on interest and power, for meaningful engagement geared towards the adoption and use of data/findings.
Stakeholders will include government (Ministry of Health) at federal, state and facility levels, network of people living with HIV, donors, implementing agencies, implementing partners, academia and international technical experts.
Strategies will be implemented to ensure that disseminated data are of topmost quality due to their importance for public health policies and actions based on these data.
Non-identifiable summary data will be disseminated to stakeholders and the public in line with relevant procedures, policies and guidelines. Summary data will be disseminated in a manner that facilitates understanding by affected populations. Since some aggregate data could be used to identify individuals, relevant policies will be applied to restrict the release of certain data elements to avoid a confidentiality breach.
Indicators will be developed and a follow up system will be put in place to track dissemination activities are actually carried out as planned and specific audience are reached according to set objectives.
It is also important to assess the extent of adoption of recommendations and possible impact on behavior, practice or changes in policy as a distal effect of dissemination. The findings of such assessments should be documented for continuous learning and planning of future interventions and should form part of the project/study reports.
CIHP
We firmly believe that the internet should be available and accessible to anyone, and are committed to providing a website that is accessible to the widest possible audience, regardless of circumstance and ability.
To fulfill this, we aim to adhere as strictly as possible to the World Wide Web Consortium’s (W3C) Web Content Accessibility Guidelines 2.1 (WCAG 2.1) at the AA level. These guidelines explain how to make web content accessible to people with a wide array of disabilities. Complying with those guidelines helps us ensure that the website is accessible to all people: blind people, people with motor impairments, visual impairment, cognitive disabilities, and more.
This website utilizes various technologies that are meant to make it as accessible as possible at all times. We utilize an accessibility interface that allows persons with specific disabilities to adjust the website’s UI (user interface) and design it to their personal needs.
Additionally, the website utilizes an AI-based application that runs in the background and optimizes its accessibility level constantly. This application remediates the website’s HTML, adapts Its functionality and behavior for screen-readers used by the blind users, and for keyboard functions used by individuals with motor impairments.
If you’ve found a malfunction or have ideas for improvement, we’ll be happy to hear from you. You can reach out to the website’s operators by using the following email
Our website implements the ARIA attributes (Accessible Rich Internet Applications) technique, alongside various different behavioral changes, to ensure blind users visiting with screen-readers are able to read, comprehend, and enjoy the website’s functions. As soon as a user with a screen-reader enters your site, they immediately receive a prompt to enter the Screen-Reader Profile so they can browse and operate your site effectively. Here’s how our website covers some of the most important screen-reader requirements, alongside console screenshots of code examples:
Screen-reader optimization: we run a background process that learns the website’s components from top to bottom, to ensure ongoing compliance even when updating the website. In this process, we provide screen-readers with meaningful data using the ARIA set of attributes. For example, we provide accurate form labels; descriptions for actionable icons (social media icons, search icons, cart icons, etc.); validation guidance for form inputs; element roles such as buttons, menus, modal dialogues (popups), and others. Additionally, the background process scans all the website’s images and provides an accurate and meaningful image-object-recognition-based description as an ALT (alternate text) tag for images that are not described. It will also extract texts that are embedded within the image, using an OCR (optical character recognition) technology. To turn on screen-reader adjustments at any time, users need only to press the Alt+1 keyboard combination. Screen-reader users also get automatic announcements to turn the Screen-reader mode on as soon as they enter the website.
These adjustments are compatible with all popular screen readers, including JAWS and NVDA.
Keyboard navigation optimization: The background process also adjusts the website’s HTML, and adds various behaviors using JavaScript code to make the website operable by the keyboard. This includes the ability to navigate the website using the Tab and Shift+Tab keys, operate dropdowns with the arrow keys, close them with Esc, trigger buttons and links using the Enter key, navigate between radio and checkbox elements using the arrow keys, and fill them in with the Spacebar or Enter key.Additionally, keyboard users will find quick-navigation and content-skip menus, available at any time by clicking Alt+1, or as the first elements of the site while navigating with the keyboard. The background process also handles triggered popups by moving the keyboard focus towards them as soon as they appear, and not allow the focus drift outside it.
Users can also use shortcuts such as “M” (menus), “H” (headings), “F” (forms), “B” (buttons), and “G” (graphics) to jump to specific elements.
We aim to support the widest array of browsers and assistive technologies as possible, so our users can choose the best fitting tools for them, with as few limitations as possible. Therefore, we have worked very hard to be able to support all major systems that comprise over 95% of the user market share including Google Chrome, Mozilla Firefox, Apple Safari, Opera and Microsoft Edge, JAWS and NVDA (screen readers).
Despite our very best efforts to allow anybody to adjust the website to their needs. There may still be pages or sections that are not fully accessible, are in the process of becoming accessible, or are lacking an adequate technological solution to make them accessible. Still, we are continually improving our accessibility, adding, updating and improving its options and features, and developing and adopting new technologies. All this is meant to reach the optimal level of accessibility, following technological advancements. For any assistance, please reach out to