Nothing Certificates of Confidentiality: Uses and Limitations as Protection for genetic research on addiction Zita Lazzarini, JD, MPH Division of Public.

Slides:



Advertisements
Similar presentations
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Advertisements

Confidentiality and HIPAA
Ethics, Confidentiality, and HIPAA! 2006 ASAC Drug Court Confidentiality FMJ Multi- County November 8, 2006.
Protecting the Privacy of Family Members in Survey and Pedigree Research Jeffrey R. Botkin, MD, MPH University of Utah.
HONORABLE PEGGY DAVIS ROLES AND BOUNDARIES OF SPECIALTY COURT SUPERVISION.
Code of Federal Regulations Title 42, Chapter 1, Subchapter A Part 2 – CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENTS BRYANT D. MILLER CAC II, MAC,
FERPA 2008 New regulations enact updates from over a decade of interpretations.
CUMC IRB Investigator Meeting November 9, 2004 Research Use of Stored Data and Tissues.
Confidentiality of MH/DD/SA Records Family Court Conference March 9, 2006 Mark Botts School of Government, UNC.
IRB Monthly Investigator Meeting Columbia University Medical Center IRB October 11, 2005.
Ethics in Business Research
Workshop on Health Examination Surveys (HES) Legal and ethical issues Susanna Conti, M. Kanieff, G. Rago Istituto Superiore di Sanità (ISS) (National Public.
1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the.
1 Disclosures © HIPAA Pros 2002 All rights reserved.
Confidentiality in Your TEAP Program By Diane A. Tennies, Ph.D., LADC Lead TEAP Health Specialist October 20,
Legal and Ethical Issues in Pediatrics, Part 2 Nataliya Lishchenko.
Confidentiality and Drug Courts Carson Fox Esq. Steve Hanson M.S. Ed.
Risk by Richard R. Riker MD Vice-Chair, IRB Maine Medical Center.
Confidentiality, Research, & Law
Privacy and Confidentiality. Definitions n Privacy - having control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally,
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Human Subjects Issues Surrounding Ethanol Administration in Humans ARTSS Summer Program June 6, 2011.
Case Studies: Puzzles in Human Research Kevin L. Nellis, M.S., M.T. (A.S.C.P.) Program Analyst, Program for Research Integrity Development and Education.
Privacy/Confidentiality – Principles and Regulations in the Social Sciences and Behavioral Research Moira Keane, MA, CIP University of Minnesota May 4,
Certificates of Confidentiality:
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
CLINICAL TRIALS.
Protecting access to healthcare for immigrants
Surveillance around the world
Kids' legal rights in medical care, your obligations and risk minimisation 27 April 2017.
Chapter 16 Drugs Lesson 3 Staying Drug Free.
IRB BASICS Ethics and Human Subject Protections Summer 2016
What is a Certificate of Confidentiality?
Week 5: Ethical, Legal & Social Issues in Applied Genomics
Upcoming Changes to the Common Rule
Genetic Research in Addicted Individuals and their Families
The Protection of Human Participants in Research
Research with human participants at Carnegie Mellon University
HIPAA and 42 C.F.R. Part 2 Confidentiality
Privacy and Confidentiality in Research
Changes to Exempt Categories
The 2018 Human Subject Rules
HIPAA Pros - Disclosures
Human Research Protection Program (HRPP) Brown Bag Series October 2017
Changes to Exempt Categories
Protection of News Sources
Overview of Important Changes to the Final Rule
Common Rule Changes to Consent and Template
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
GDPR (General Data Protection Regulation)
Introduction to General Medical Conditions
The 2018 Human Subject Rules
CONFIDENTIALITY AND PRIVILEGE
What types of research are exempt and ohrp guidance on exemptions
Secondary Research with Identifiable Information and Biospecimens
Informed Consent (SBER)
Overview of Important Changes to the Final Rule
National Congress on Health Care Compliance
Introduction to Health Privacy
Common Rule Update: Exempt categories UT IRB
Overview of Changes to Human Subjects Research Regulations
IRB Educational Session - IRB Regulations on Expedited Review
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
Revised Common Rule: Informed Consent Changes
BE-5305 Ethics in Research.
The Revised Common Rule
Office of Research Integrity and Protections
Common Rule
Current IRB at DMACC September 2018.
Does my Research need IRB Review?
Presentation transcript:

nothing Certificates of Confidentiality: Uses and Limitations as Protection for genetic research on addiction Zita Lazzarini, JD, MPH Division of Public Health Law & Bioethics Department of Community Medicine University of Connecticut School of Medicine

“But, why would I need a Certificate of Confidentiality?”

“Belt and Suspenders” Here’s why … Your data deserve the “belt and suspenders” approach to protection of confidentiality Here’s why …

If you do research on alcohol or substance abuse … Your data may contain information that Is sensitive Is embarrassing (to the subject) Is evidence of a crime If disclosed, it could lead to social, financial or legal harms For these and other reasons … It may contain information that would be of interest to law enforcement now or sometime in the future …. Other parties may also want data for non-health-related purposes!

If you do research involving genetic testing, or bank samples for future genetic testing …. Your data may contain information that Identifies genetic risks or markers for diseases Links certain genes to stigmatized behaviors Contains very large amounts of medical, social, and behavioral data If disclosed, it could lead to social, financial or legal harms Your data may make your subjects identifiable to others through publicly available genetic data It may contain information that would be of interest to law enforcement now or sometime in the future …. Other parties may also want data for non-health-related purposes!

History Certificates of Confidentiality (COC) created in 1970 as part of the Comprehensive Drug Abuse Prevention and Control Act To protect data collected in research involving psychoactive drugs or alcohol Scope of protection expanded in 1988 (Public Health Services Act) To cover a wide range of health research

Current Scope NIH may grant a COC to any research that: Collects personally identifiable, sensitive information; Collects information that, if disclosed, could have adverse consequences for subjects or damage financial standing, employability, insurability, or reputation; and Has been approved by an IRB

What does a COC do? “Certificates of Confidentiality are issued by the National Institutes of Health (NIH) to protect the privacy of research subjects by protecting investigators and institutions from being compelled to release information that could be used to identify subjects with a research project. . . . . They allow the investigator and others who have access to research records to refuse to disclose identifying information in any civil, criminal, administrative, legislative, or other proceeding, whether at the federal, state, or local level [emphasis added].” (NIH Kiosk, 2003)

How do I get a COC? Application process – NIH detailed instructions on website “Certificates of Confidentiality Kiosk” - http://grants.nih.gov/grants/policy/coc/appl_extramural.htm Timing is extremely important COC ONLY protects data collected AFTER the COC is issued! Application decisions can take 1-2 weeks to 4-6 months, depending on the NIH institute involved

IRBs and Certificates of Confidentiality NIH recommends that research involving genetics, genomics or biospecimen research obtain a COC (1997, 2007, 2011) Yet, in 2003, only ONE of 12 major US biobanks had COC (Eiseman, et al) What role can IRB play? Screen for studies that might benefit from COC Facilitate application to NIH institutes Review informed consent to ensure subjects know scope and limits of protections IRB approval required for issuing COC Proposed rule change (45 CFR 46), bio-banking and COCs ANPRM – for Common Rule (2011) acknowledged changes in risk posed by anonymized biobank-based research ANPRM may make it harder to obtain COC (Williams, Wolf, 2013) Uses a general consent form not subject to IRB review Conflicts with COC requirement to fully explain scope and limit of COC ANPRM Table with CR and changes: http://www.hhs.gov/ohrp/humansubjects/anprmchangetable.html 1997 – NIH – Issues to consider in research use of stored data and tissues: http://www.hhs.gov/ohrp/policy/reposit.html Williams and Wolf propose 3 potential ways to fix this: ANPRM could create a MODEL consent form for biobanks – not a mandatory one – then IRBs would still be able to review for specific studies, insert specfic language, if necessary, but model would include recommended COC language The COC application process could be changed to allow use of a standardized consent form HHS, NIH, OHRP and Congress could adopt a comprehensive protections for ALL resaerch data from those who seek to use it against subjects; make it all protected from subpoena – precedent: AHRQ and CDC have legal protections for all data collected 2007 – NIH - GWAS recommendations 2011 – NCI - biorepositories

Protecting Data Requires More than a COC Certificates of Confidentiality are not a substitute for other privacy and security measures Use stringent security measures to protect identifiable data or lists that link data Assign identifiers to data and remove easily linkable information De-identify data where possible Use anonymized or “quasi-anonymized” data Empirical data suggest studies collecting anonymized or quasi-anonymized data may encourage greater disclosure by participants (Beatty, Chase, Ondersma, 2013) ALSO train all research team in confidentiality protection

Critiques of Certificates of Confidentiality Fall into 3 categories: COCs are not really necessary. Since there are few legal challenges to COCs, how well they actually work remains unproven They offer only partial protection, since they protect against compelled but not voluntary disclosures

Are COCs Necessary? Is there really a risk to subjects if someone gets your data? COCs are the only tool available that can protect your data from a subpoena or court order But they should be part of a range of protections of the privacy and security of your data

Will a Certificate Withstand a Legal Challenge? Few published legal cases have involved COC People v. Newman (1973) Held, COC protected a drug treatment programs records from NYC police who wanted photos of a client State v. Bradley (2006) The defendant sought data from research records Held, on other grounds, information was not relevant and defense’s access to the data was revoked, but not before several members of appellate team and judge saw the records Not answer critical question – will defendant’s constitutional rights “trump” the protection offered by the statute? Evidence of unpublished cases Much more common than published cases Reports of both successes and failures of COCs (Wolf & Zandecki, 2006)

Protection Against Compelled but not Voluntary Disclosure Certificate gives researcher the power to resist a subpoena or court order It does not require a researcher to do so Researchers can and do release some data to report communicable diseases, child or elder abuse, or other criminal activity (Paquette, Ross, 2014) Researchers may feel pressured to release data when and if their institution will not provide them with legal support to challenge a subpoena or court order Informed consent process for subjects should specifically distinguish situations in which a researcher would disclose and those where she would not

Conclusions COCs are necessary but not sufficient to protect sensitive research data Research on genetics, addiction, and risky behaviors pose risks to subjects identified without their consent Researchers should use COCs as one part of a comprehensive data protection plan IRBs should review consent process and forms to ensure subjects understand the scope and limitations of COC protections