1 hipaa, researchers and the irb: part two alan homans, irb chair and nancy stalnaker, irb...

Download 1 HIPAA, Researchers and the IRB: Part Two Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator

Post on 19-Dec-2015

215 views

Category:

Documents

2 download

Embed Size (px)

TRANSCRIPT

  • Slide 1
  • 1 HIPAA, Researchers and the IRB: Part Two Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator
  • Slide 2
  • 2 Introduction AGAIN Dont kill the messenger we didnt write this rule!Dont kill the messenger we didnt write this rule! Be kind we do NOT have all the answers but we do want to hear the questions - we will will continue to work towards answering them.Be kind we do NOT have all the answers but we do want to hear the questions - we will will continue to work towards answering them.
  • Slide 3
  • 3 What Research is Affected? Privacy rule applies to research that uses Protected Health Information (PHI). PHI is individually identifiable health information received from a covered entity.
  • Slide 4
  • 4 What Research is Affected? Three categories of identifiability: Three categories of identifiability: 1.PHI Identifiable rule applies 2.De-Identified Information - rule does not apply 3.Limited Data Set a middle option - limited parts of the rule apply
  • Slide 5
  • 5 What Research is Affected? De-Identified there are 18 specific identifiers which must be removed to be considered de- identified thus not covered by rule.De-Identified there are 18 specific identifiers which must be removed to be considered de- identified thus not covered by rule. Limited Data Set Not fully de-identified can retain certain dates, geographic info and unique identifying numbers. Most privacy rule requirements do not apply, the minimum necessary standard does apply and a data use agreement is required.Limited Data Set Not fully de-identified can retain certain dates, geographic info and unique identifying numbers. Most privacy rule requirements do not apply, the minimum necessary standard does apply and a data use agreement is required.
  • Slide 6
  • 6 18 Items Which Must Be Removed to Be De-identified 1.Names 2.ALL geographic subdivisions smaller than the state 3.All elements of dates smaller than a year (i.e. birth date, admission, discharge, death, etc.) 4.Phone numbers 5.Fax numbers 6.E-mail addresses 7.SS numbers 8.Medical record number 9.Health plan beneficiary
  • Slide 7
  • 7 10.Any other account numbers 11.Certificate/license numbers 12.Vehicle identifiers 13.Device identification numbers 14.WEB URL's 15.Internet IP address numbers 16.Biometric identifiers (fingerprint, voice prints, retina scan, etc) 17.Full face photographs or comparable images 18.Any other unique number, characteristic or code. 19.Diagnoses are not included in this list 18 Items Which Must Be Removed to Be De-identified (continued)
  • Slide 8
  • 8 How to obtain PHI for research? 1.Authorization from Research Subject 2.Waiver of Authorization
  • Slide 9
  • 9 Elements of Authorization Required elements in an authorizationRequired elements in an authorization Specific and meaningful description of what information will be used or disclosed Who may use or disclose To whom the PHI will be disclosed Why the use or disclosure is being made (each purpose) Notice that authorization may be revoked; Notice that the information may be disclosed to others not subject to the Privacy Rule
  • Slide 10
  • 10 Elements of Authorization II Required elements in an authorizationRequired elements in an authorization Statement of how long the use or disclosure will continue (no expiration date is allowed for research purposes - but this must be explicitly stated in the authorization form) Notice that the covered entity may or may not condition treatment or payment on the individuals signature Individuals signature and date Required elements in an authorizationRequired elements in an authorization Statement of how long the use or disclosure will continue (no expiration date is allowed for research purposes - but this must be explicitly stated in the authorization form) Notice that the covered entity may or may not condition treatment or payment on the individuals signature Individuals signature and date
  • Slide 11
  • 11 How to obtain Authorization? The Draft FAHC Authorization language template is now finished and will be piloted beginning this week. It is a SEPARATE document to be executed in addition to the Informed Consent Document.
  • Slide 12
  • 12 How to obtain Authorization Protocols Approved Prior to 4/14/03: Surveys were sent to PIs to determine which approved protocols will require authorization (PHI + new accruals after 4/14/03).Surveys were sent to PIs to determine which approved protocols will require authorization (PHI + new accruals after 4/14/03). Forms and processes will be piloted beginning this week and adjustments made.Forms and processes will be piloted beginning this week and adjustments made. IRB will email PIs having protocols identified as needing an authorization with instructions and the template, as soon as possible.IRB will email PIs having protocols identified as needing an authorization with instructions and the template, as soon as possible.
  • Slide 13
  • 13 How to obtain Authorization? Review of authorization forms for existing protocols will be done on a first-come, first-serve basis if you know you will be entering new subjects soon after 4/14/03, get your authorizations as soon as possible.
  • Slide 14
  • 14 How to obtain Authorization? NEW PROTOCOLS: The process for determining which new protocols will require authorization is currently being developed, including a revision to our protocol cover sheet. We will let you know as soon as this is available.
  • Slide 15
  • 15 How to obtain Waiver of Authorization? In research, authorization is not required if it meets the criteria for waiver outlined in the privacy rule.
  • Slide 16
  • 16 No more than minimal riskNo more than minimal risk Not adversely affect rights and welfare of subjectsNot adversely affect rights and welfare of subjects Research cannot be done without waiverResearch cannot be done without waiver When appropriate, information will be provided to subjects of researchWhen appropriate, information will be provided to subjects of research No more than minimal risk to privacy, based on, at least: Plan to protect identifiers Plan to destroy identifiers ASAP Written assurance that PHI will not be used/disclosed with few exceptions Research cannot be done without waiver, and Research cannot be done without this PHI COMMON RULEPRIVACY RULE CRITERIA FOR WAIVER OF AUTHORIZATION
  • Slide 17
  • 17 How to obtain Waiver of Authorization? The process and forms are currently being developed to address the required criteria necessary for the IRB to approve a waiver. We will let you know when these are available.
  • Slide 18
  • 18 TRANSITION TO PRIVACY RULE Compliance date: April 14, 2003Compliance date: April 14, 2003 If you have a waiver of consent under the common rule prior to 4/14/03, you do NOT need to apply for a waiver under HIPAAIf you have a waiver of consent under the common rule prior to 4/14/03, you do NOT need to apply for a waiver under HIPAA All new enrollment of subjects on research involving PHI falls under HIPAA & requires an authorizationAll new enrollment of subjects on research involving PHI falls under HIPAA & requires an authorization
  • Slide 19
  • 19 Authorization/Waiver Reminders If you need to do an authorization, the IRB will contact you to inform you what you need to do If you need to do an authorization, the IRB will contact you to inform you what you need to do If you havent completed your survey yet, please do so immediately! If you havent completed your survey yet, please do so immediately! HIPAA is in addition to current IRB human subject requirements - when both regulations apply, both requirements must be followed. HIPAA is in addition to current IRB human subject requirements - when both regulations apply, both requirements must be followed.
  • Slide 20
  • 20 DATABASES/REGISTRIES HIPAA will add a new level of scrutiny to use of all PHIHIPAA will add a new level of scrutiny to use of all PHI UVM and FAHC need to place ourselves in the best compliance position possibleUVM and FAHC need to place ourselves in the best compliance position possible
  • Slide 21
  • 21 DATABASES/REGISTRIES In order to ensure that the development, maintenance and release of data involving PHI meets these requirements, we will be surveying all researchers about existing databases.In order to ensure that the development, maintenance and release of data involving PHI meets these requirements, we will be surveying all researchers about existing databases. Processes are being developed for the IRB to review existing databases and, when appropriate, approve waiver of consent and/or authorization.Processes are being developed for the IRB to review existing databases and, when appropriate, approve waiver of consent and/or authorization.
  • Slide 22
  • 22 DATABASES/REGISTRIES Model procedures for developing and operating databases and registries will be drafted and made available upon completion.Model procedures for developing and operating databases and registries will be drafted and made available upon completion.