The principal investigator decides to store data on the network. Although the PI feels it is necessary to have the assistance of the LAN Administrator, the PI intends to implement one of a series of strategies to protect participant confidentiality.
These are some possible outcomes: |