Ethics and IRB - sparklabnyc/resources GitHub Wiki

Ethically, we strive to uphold high standards of integrity in every step of our research. We document every step of the journey. We write good code and note processes thoroughly so others can replicate or build on it. We promote transparency and choose open source. We protect the privacy and confidentiality of data involving human subjects.

IRB and Rascal

The Institutional Review Board (IRB) is a committee that reviews and monitors research involving human participants. Its role is to protect the rights, safety, and privacy of those who participate in research. IRB makes sure that your experiment adheres to ethical standards. Apply via Rascal if your project needs IRB review.

What is Rascal?

  • Rascal is Columbia's official system streamlined for research endeavors. Rascal is used for research compliance.

  • Research involving human participants or sensitive data must be submitted, tracked, and managed with Rascal to meet IRB requirements

Why Rascal?

  • Rascal is mandated by Columbia for all research involving human subjects
  • Rascal protects participants and ensures that studies meet ethical and legal standards
  • Rascal tracks your studies and keeps clear documentation on valid IRB

Code of conduct

We expect all lab members, collaborators, and visitors to maintain a welcoming, inclusive, and professional environment.

Our Lab Code of Conduct includes:

  • Treat everyone with respect and courtesy. Communicate openly and constructively
  • Maintain honesty and integrity in researching
  • Keep personal information to yourself
  • Disagreements and critiques should always be respectful and focused on the work itself. Ad hominem comments or personal insults are never acceptable in meetings, peer reviews, or any lab communication.
  • Report any behavior that undermines these values

Online safety

Protecting data, privacy, and digital information is essential for online safety.

Best practices:

  • Use secured, encrypted passwords
  • Use multiple passwords and change them frequently
  • Do not share sensitive information with anyone
  • Keep an eye out for phishing, data loss, breaches, or security compromises