Audrey R. Chapman, Ph.D. October 22, 2014

Slides:



Advertisements
Similar presentations
The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Advertisements

HIPAA Privacy Rule “Standards for Privacy of Individually Identifiable Health Information” 45 CFR 160 and 164* *
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Informed Consent.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Training In HIPAA Privacy Regulations for Researchers and Research Staff Adapted from a presentation prepared by Human Subjects Division, University of.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Privacy and Information Security Essentials
Human Specimen Repositories: Requirements of 45 CFR part 46 PRIM&R May 5, 2004 Julie Kaneshiro DHHS Office for Human Research Protections Phone:
Ellen Wright Clayton, MD, JD Craig-Weaver Professor of Pediatrics Director, Center for Biomedical Ethics and Society Vanderbilt University.
University of Miami1 HIPAA Survival Skills An Introduction to HIPAA and Research University of Miami Human Subjects Research Office October 31, 2006 Evelyne.
OHRP Electronic Access Web Site:
Use of Children as Research Subjects What information should be provided for an FP7 ethical review?
1 HIPAA, Researchers and the IRB: Part Two Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
HIPAA, Researchers and the IRB Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
CUMC IRB Investigator Meeting November 9, 2004 Research Use of Stored Data and Tissues.
IRB Monthly Investigator Meeting Columbia University Medical Center IRB October 11, 2005.
Human Investigation Committee  Is it research?  If yes, does it involve human subjects?  If yes, can it be exempt?  If no, will a Request for.
Health Insurance Portability and Accountability Act (HIPAA)
Cornell Evaluation Network The Use of Human Participants in Research Office of Research Integrity and Assurance ~ May 14, 2007.
Human Research Protection Programs 1a: How to Navigate Human Subject Protection Regulations Sponsored by the American Society for Investigative Pathology.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
Treuman Katz Center for Pediatric Bioethics Conference Banking Biological Samples for Pediatric Research Jeffrey R. Botkin, M.D., M.P.H. Professor.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
Revised February 4, Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy Rule: UCSF Education Module for Researchers, Research.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
HIPAA Privacy and Research August 21, 2015
Help us Help you: IRB Policy Updates Susan Bankowski, MS, JD IRB Chair.
Health Insurance Portability and Accountability Act (HIPAA)
Health information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be.
Future Use of Stored Samples & Data and the NIH Policy on GWAS and dbGaP NIAID/DAIDS Dione Washington, M.S. -- ProPEP Sudha Srinivasan, Ph.D.-- TRP Tanisha.
Submitting IRB Applications (or “Do I have to do an IRB?”) Linda A. Detman, Ph.D. Research Associate Lawton & Rhea Chiles Center for Healthy Mothers and.
Planned Emergency Research Exception from Informed Consent Requirements September 2007.
PwC Tissue Banking and Repositories – Human Subject Protections Privacy Protections Medical Research Summit Tom Puglisi, Ph.D. Friday March 7 – 9:15 am.
HIPAA and Research Basics for IRB Tim Atkinson Director, Research and Sponsored Programs Director, Institutional Review Board Research Privacy Officer.
HIPAA – How Will the Regulations Impact Research?.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Privacy and Confidentiality. Definitions n Privacy - having control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally,
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
1 Ethical issues in genomics research Bernard Lo, M.D. March 3, 2009.
TISSUE REPOSITORIES: THE COMMON RULE and THE HIPAA PRIVACY RULE Mark A. Rothstein, J.D. Herbert F. Boehl Chair of Law and Medicine Director, Institute.
Student Proposal Preparation and IRB Basics Rebecca Novak UTSPH Office of Research October 20, 2015.
Data Sharing in Nursing: What Researchers Need to Know November 9, 2015 Caitlin Bakker, Research Services Librarian |
HIPAA and Human Subjects Research IRB Member CE May 2014 Slideshow by Sean Horkheimer.
Case Studies: Puzzles in Human Research Kevin L. Nellis, M.S., M.T. (A.S.C.P.) Program Analyst, Program for Research Integrity Development and Education.
Use of Data from the Electronic Medical Record in Research Opportunities & Pit Falls Kristin West.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
M6728 Ethics in Research Informed Consent/IRBs Reporting Research Results.
Regulatory Guidance for Genetic Testing. Three Specific Areas Laboratory tests Results of genetic testing – Clinical – Research GenomeWide Association.
Chapter 5 Ethical Concerns in Research. Historical Perspective on Ethics Nazi Experimentation in WWII –“medical experiments” –Nuremberg War Crime Trials.
PwC Issues in HIPAA Research Compliance William R. Braithwaite, MD, PhD “Dr. HIPAA” HIPAA Summit 6 Washington, DC 27 March 2003.
Doing IRB Right … Together JOHN POTTER, OD, MA Chair, Institutional Review Board.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
De-Identified Data: Ethics and Regulation Translational Research Ethics – Applied Topics (TREATs) Bioethics and Subjects Advocacy Program Indiana Clinical.
HIPAA PRIVACY & SECURITY TRAINING
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
Genetic Research in Addicted Individuals and their Families
Issues in HIPAA Research Compliance
Which Projects Do – and do Not – Require IRB Review?
Which Projects Do – and do Not – Require IRB Review?
Case Study Template Kerecis Aurora Awards
Office of the Vice President for Research Human Subjects Protection Program IRB Submission Process Module 4 - Health Insurance Portability and Accountability.
The Health Insurance Portability and Accountability Act
Presentation transcript:

Audrey R. Chapman, Ph.D. October 22, 2014

 Protecting the privacy and confidentiality of research participants is a foundational ethical obligation and a legal requirement  Large-scale genomic databases and biobanks, which are an important contribution to research, impose risks to privacy & confidentiality  Currently many experts believe it is not possible to assure fully the privacy and confidentiality of genetic data in databases  There are some proposed approaches that may help balance data sharing with reducing the vulnerability of genetic data

 Ethical requirement to protect privacy & confidentiality of research data derives from respect for persons and acknowledgement of their autonomy  Autonomy translates into the obligation to obtain consent for medical interventions, participation in research, and use of the data  Surveys shown it is important to individuals to control use of their genetic data  Research on addiction is especially sensitive because alcohol dependence & other addictions are potentially stigmatizing  Protection of privacy & assurance of consent for use enhances willingness to participate in genetic research

 Alcohol & substance dependence very highly stigmatized even when compared with mental disorders  Some experts propose a genetic explanation of addiction would decrease stigmatization of addicted people  Limited studies but preponderance research suggests geneticization more likely to increase than to decrease stigmatization ◦ Increase genetic essentialism & perceptions problem is serious & intractable ◦ But also likely to reduce blame

 Privacy Rule in Health Insurance Portability and Accountability Act (HIPAA) (1996) establishes national standards to protect individuals’ medical records & other personal health information  Federal Policy for Protection of Human Subjects – “Common Rule” (1991) codified at 45 CFR part 46, subparts A through E protects privacy individually identifiable health information while trying to ensure researchers continue to have access to medical information necessary to conduct vital research  Inconsistent requirements of two – Common Rule considered less stringent

 De-identified information & specimens not protected under either Common Rule or Privacy Rule because no longer considered human subjects research  Removal of following identifiers: ◦ names ◦ geographical subdivisions smaller than a state except for first three digits of a ZIP code ◦ All elements of dates (except year) relating to birth date, admission data, & discharge date ◦ Telephone numbers ◦ Fax numbers ◦ addresses

◦ Social security numbers ◦ Medical record numbers ◦ Health plan beneficiary numbers ◦ Account numbers, certificate or license numbers ◦ Vehicle identifiers, including license-plate numbers ◦ Device identifiers and serial numbers ◦ URLs ◦ Internet protocol address numbers ◦ Biometric identifiers ◦ Photographic and comparable images ◦ Any other unique identifying number, characteristic, or code

 Assumption stripping away demographic information renders research record de- identifiable not apply to genetic data which is potentially re-identifiable  Regulatory dichotomy of all or nothing coverage fails to recognize varying degrees of identifiability of health information  Plus anonymizing data precludes recontacting research subjects to share research findings

 Investigators commonly share genomic data and biological samples raising issues about conforming to informed consents.  As of 2011 there were more than 500 million stored specimens in hundreds of biobanks in U.S. & number estimated to grow by at least 20 million per year.  No single rule on whether informed consent legally required under Common Rule or authorization required under HIPAA for integration of data into databases.  NIH Genomic Data Sharing Policy (2014), which applies to all NIH funded research that generates large-scale human genomic data, requires investigators to submit the data, as well as relevant associated data (e.g. phenotype & exposure data), to an NIH-designated repository in timely manner.

 Researchers often need to correlate genotype with phenotype requiring them to match genetic samples with health records  Privacy Rule under HIPAA requires individual to sign an authorization for use & disclosure of protected health information in research  Privacy Rule does not provide a definitive answer to question of whether a prospective authorization is valid that contemplates future addition of individual health information, particularly sensitive information, such as information about substance abuse

 No consent: many medical institutions store patients’ information from past treatment without explicit consent to use for research  Presumed consent/opt out (Icelandic database)  General consent: Many studies ask individuals to give consent for indefinite uses of their samples and data ◦ Advantage of this approach is that it promotes sharing of samples and data and helps to advance scientific research. ◦ Disadvantage is not adequately protect participants’ autonomy, because some participants may not want their samples/data used for certain purposes.

 Specific consent for each use of their samples or data ◦ Advantage - maximizes subjects’ autonomy. ◦ Disadvantages - burdensome on investigators and participants and impedes sharing, since participants would need to be re-contacted each time to approve a new use of their samples or data.  Tiered consent -menu of options on consent forms ◦ Participants can consent to general use of their samples and data or allow only certain types of uses, such as research related to their disease or to exclude specific categories, for example commercial research. ◦ Permits full informed consent, promotes sharing, and minimizes the burden on investigators and participants

 Misuse of stored genetic data for purposes other than those in the informed consent difficult to monitor, especially when data sets are shared between researchers  Breaches have both individual and group dimensions  Havasupai Indian tribe (650 member tribe living in remote part of Grand Canyon) ◦ Samples given to researchers at Arizona State University to investigate cause of tribe’s high incidence of diabetes ◦ Researchers had individuals sign general consents for collection of blood samples & health histories ◦ Allegedly without consent, researchers used samples for other genetic research & published articles about tribe members’ rates of schizophrenia & inbreeding as well as their genetic relatedness to other native peoples (which conflicted with tribe’s creation stories) ◦ Tribe sued and lawsuit was settled in 2010 for $700,000

 Various approaches to breaching privacy ◦ Identity tracing – hacker does not know who is owner of DNA sample but figures it out using DNA identifiers ◦ Attribute disclosure – hacker does know donor’s identity but uncovers additional sensitive information about him or her using data submitted to public DNA databases, including uncovering genomic areas that were masked (finding APOE gene in Jim Watson’s posted genome)

 Possible re-identification of de-identified health records using computerized network databases linking demographic quasi-identifiers to individuals including voter registration records & other public record search engines ◦ An initial study reported successful tracing of medical record of Governor of MA using demographic identifiers in hospital discharge information ◦ Another study reported identification of 30% of Personal Genome Project participants by demographic profiling using zip code & exact birthdates found in PGP profile

 A team of Whitehead Institute researchers led by Yanev Erlich using a computer, an internet connection, & publicly accessible online resources were able to identify nearly 50 individuals who were participants in genomic studies  Methodology used: ◦ Analyzed short tandem repeats on Y chromosomes (Y-STRs) of men whose genetic material collected by Center for Study of Human Polymorphisms & whose genomes were sequenced & made publicly available as part 1000 Genome Project ◦ Genealogists & genetic genealogist companies have established publicly accessible databases that house Y-STR data by surname ◦ Researchers submitted Y-STRs to these databases to identify surnames ◦ With surnames in hand team queried other information sources including Internet record search engines, obituaries, genealogical websites, & public demographic data from National Institute of General Medical Sciences

 An empirical analysis estimated 10-14% of US white male individuals from middle & upper classes are subject to surname inference on basis of scanning two larges Y-chromosome genealogical websites using a built-in search engine ◦ Limitations – false identification of surnames, spelling variants of surnames, and common use of some surnames

 Request consent to open release of their genomic data, with knowledge they can potentially be identified  Access control: Move away from open access and take a more restrictive approach  Cryptographic solutions ◦ Relies on new advances beyond tradition use of encrypting sensitive information by adding additional mathematical properties  Certificates of confidentiality

 For studies using data from specimens collected before the effective data of the GDS Policy an assessment by an IRB, privacy board, or equivalent body that data submission to NIH repository is not inconsistent with informed consent provided by research participant.  For studies initiated after effective date of GDS Policy investigators must obtain participants’ consent for their genomic & phenotypic data to be used for future research purposes & to be shared broadly even if cell lines or clinical specimens are de-identified.  The informed consent needs to specify whether data will be shared through an unrestricted or controlled access repository.

 The submitting institution will have to provide an Institutional Certification prior to receipt of an award ◦ noting any data use limitations in the data sharing plan. ◦ Data submission & subsequent data sharing for research purposes consistent with informed consent of study participants from whom data were obtained. ◦ an IRB, privacy board, and/or equivalent body has reviewed the investigator’s proposal for data submission and assures it is consistent with 45 CFR Part 46.

 Requests for controlled-access data are reviewed by NIH Data Access Committees ◦ Decisions are based on conformity of proposed research to data use limitations established by submitting institution  Investigators approved to download controlled- access data from NIH designated repositories & their institutions required to cosign a Data Use Certification specifying will ◦ only use data for approved research; ◦ Not attempt to identify individual participants from whom data obtained; ◦ Not share any of data with individuals other those listed in the data access request;