1 HIPAA, Researchers and the IRB: Part Two Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.

Slides:



Advertisements
Similar presentations
HIPAA Privacy Rule “Standards for Privacy of Individually Identifiable Health Information” 45 CFR 160 and 164* *
Advertisements

1 The HIPAA Privacy Rule and Research This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
HIPAA, Privacy & Confidentiality Local Accountability for Research Protection in VA Facilities VA Office of Research & Development Baltimore, February.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
RESEARCH COMPLIANCE Agenda 1. No Destruction of local research documents after scanning 2. Training for shipping biological samples/specimens 3. Regulatory.
1 HIPAA and Research and YOU. 2 INTRODUCTION Rule #1:Don’t Panic Rule #2:Bottom Line for Researchers: HIPAA is Manageable thru Education/Awareness and.
HIPAA Requirements for Patient Oriented Research
Informed Consent.
THE FOLLOWING SLIDES EXPLAIN THE REQUIRED ELEMENTS THAT MUST BE INCLUDED FOR A HIPAA AUTHORIZATION TO BE VALID HIPAA Authorizations.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
Training In HIPAA Privacy Regulations for Researchers and Research Staff Adapted from a presentation prepared by Human Subjects Division, University of.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Implementation of Privacy Board Reviews at PCMC Mary Thomason, Intermountain Healthcare Privacy Board Chair.
Privacy and Information Security Essentials
Nora B. McCann Privacy Manager Corporate Compliance Fox Chase Cancer Center
What does this form mean? HIPAA Authorization means prior written permission for use and disclosure of protected health information (PHI) from the information’s.
University of Miami1 HIPAA Survival Skills An Introduction to HIPAA and Research University of Miami Human Subjects Research Office October 31, 2006 Evelyne.
HIPAA, Researchers and the IRB Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
1 HIPAA, Researchers and the IRB: Session Three Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
2012 VA IRB Administrators Meeting Stephania H. Griffin, JD, RHIA, CIPP/G VHA Privacy Officer Director, Information Access and Privacy Privacy Officer.
Data Security and Research 101 Completing Required Forms Kimberly Summers, PharmD Assistant Chief for Clinical Research South Texas Veterans Health Care.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
Revised February 4, Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy Rule: UCSF Education Module for Researchers, Research.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
HIPAA Privacy and Research August 21, 2015
1 Defense Health Agency Privacy and Civil Liberties Office HIPAA Privacy Board Overview August 6, 2015.
August 8, 2011 Leslie J. Pfeffer, BS, CHP. Health Insurance Portability and Accountability Act HIPAA Privacy Rule April 14, 2003 HIPAA Security Rule April.
Health information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be.
PwC Tissue Banking and Repositories – Human Subject Protections Privacy Protections Medical Research Summit Tom Puglisi, Ph.D. Friday March 7 – 9:15 am.
HIPAA and Research Basics for IRB Tim Atkinson Director, Research and Sponsored Programs Director, Institutional Review Board Research Privacy Officer.
HIPAA – How Will the Regulations Impact Research?.
H I P A A T R A I N I N G Self Directed Module 7 Research Disclosures For Data Custodians START Click to begin…
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
HIPAA SURVIVAL SKILLS: An Update University of Miami1 Marisabel Davalos, M.S.Ed., CIP Associate Director of Educational Initiatives November, 2008.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
University of Pennsylvania Health System 1 Session 3.02: Case Studies in Clinical Research Compliance Russell M. Opland, M.P.H., EMT-P Chief Privacy Officer.
Health Insurance portability and Accountability Act (HIPAA)‏
HIPAA and Human Subjects Research IRB Member CE May 2014 Slideshow by Sean Horkheimer.
06/20/03- revised1 Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy Rule: UCSF Education Module for Researchers, Research Administrators,
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
1 The Impact of HIPAA on US Biomedical Research Presented To The: HIPAA SUMMIT Washington, DC March 28, 2003 Oliver Johnson, Chief Privacy Officer Merck.
PwC Issues in HIPAA Research Compliance William R. Braithwaite, MD, PhD “Dr. HIPAA” HIPAA Summit 6 Washington, DC 27 March 2003.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
Winter 2008 HIPAA, Privacy & Confidentiality.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
The HIPAA Privacy Rule: Implications for Medical Research
No No, Yes Yes: Simple Privacy & Information Security Tips Krista Barnes, J.D. Senior Legal Officer and Director, Privacy & Information Security, Institutional.
HIPAA Privacy Rule and Research
Disability Services Agencies Briefing On HIPAA
The HIPAA Privacy Rule and Research
HIPAA Privacy & Security: Medical Research Context
HIPAA & PHI TRAINING & AWARENESS
Issues in HIPAA Research Compliance
Case Study Template Kerecis Aurora Awards
Office of the Vice President for Research Human Subjects Protection Program IRB Submission Process Module 4 - Health Insurance Portability and Accountability.
The Health Insurance Portability and Accountability Act
Presentation transcript:

1 HIPAA, Researchers and the IRB: Part Two Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator

2 Introduction AGAIN… Don’t kill the messenger – we didn’t write this rule!Don’t kill the messenger – we didn’t write this rule! Be kind – we do NOT have all the answers – but we do want to hear the questions - we will will continue to work towards answering them.Be kind – we do NOT have all the answers – but we do want to hear the questions - we will will continue to work towards answering them.

3 What Research is Affected? Privacy rule applies to research that uses Protected Health Information (PHI). PHI is individually identifiable health information received from a covered entity.

4 What Research is Affected? Three categories of identifiability: Three categories of identifiability: 1.PHI – Identifiable – rule applies 2.De-Identified Information - rule does not apply 3.Limited Data Set – a middle option - limited parts of the rule apply

5 What Research is Affected? “De-Identified” – there are 18 specific identifiers which must be removed to be considered de- identified – thus not covered by rule.“De-Identified” – there are 18 specific identifiers which must be removed to be considered de- identified – thus not covered by rule. Limited Data Set – Not fully “de-identified” – can retain certain dates, geographic info and unique identifying numbers. Most privacy rule requirements do not apply, the minimum necessary standard does apply and a data use agreement is required.Limited Data Set – Not fully “de-identified” – can retain certain dates, geographic info and unique identifying numbers. Most privacy rule requirements do not apply, the minimum necessary standard does apply and a data use agreement is required.

6 18 Items Which Must Be Removed to Be “De-identified” 1.Names 2.ALL geographic subdivisions smaller than the state 3.All elements of dates smaller than a year (i.e. birth date, admission, discharge, death, etc.) 4.Phone numbers 5.Fax numbers 6. addresses 7.SS numbers 8.Medical record number 9.Health plan beneficiary

7 10.Any other account numbers 11.Certificate/license numbers 12.Vehicle identifiers 13.Device identification numbers 14.WEB URL's 15.Internet IP address numbers 16.Biometric identifiers (fingerprint, voice prints, retina scan, etc) 17.Full face photographs or comparable images 18.Any other unique number, characteristic or code. 19.Diagnoses are not included in this list 18 Items Which Must Be Removed to Be “De-identified” (continued)

8 How to obtain PHI for research? 1.Authorization from Research Subject 2.Waiver of Authorization

9 Elements of Authorization Required elements in an authorizationRequired elements in an authorization  Specific and meaningful description of what information will be used or disclosed  Who may use or disclose  To whom the PHI will be disclosed  Why the use or disclosure is being made (each purpose) Notice that authorization may be revoked;  Notice that the information may be disclosed to others not subject to the Privacy Rule

10 Elements of Authorization II Required elements in an authorizationRequired elements in an authorization  Statement of how long the use or disclosure will continue (no expiration date is allowed for research purposes - but this must be explicitly stated in the authorization form)  Notice that the covered entity may or may not condition treatment or payment on the individual’s signature  Individual’s signature and date Required elements in an authorizationRequired elements in an authorization  Statement of how long the use or disclosure will continue (no expiration date is allowed for research purposes - but this must be explicitly stated in the authorization form)  Notice that the covered entity may or may not condition treatment or payment on the individual’s signature  Individual’s signature and date

11 How to obtain Authorization? The Draft FAHC Authorization language template is now finished and will be piloted beginning this week. It is a SEPARATE document to be executed in addition to the Informed Consent Document.

12 How to obtain Authorization Protocols Approved Prior to 4/14/03: Surveys were sent to PIs to determine which approved protocols will require authorization (PHI + new accruals after 4/14/03).Surveys were sent to PIs to determine which approved protocols will require authorization (PHI + new accruals after 4/14/03). Forms and processes will be piloted beginning this week and adjustments made.Forms and processes will be piloted beginning this week and adjustments made. IRB will PIs having protocols identified as needing an authorization with instructions and the template, as soon as possible.IRB will PIs having protocols identified as needing an authorization with instructions and the template, as soon as possible.

13 How to obtain Authorization? Review of authorization forms for existing protocols will be done on a first-come, first-serve basis – if you know you will be entering new subjects soon after 4/14/03, get your authorizations as soon as possible.

14 How to obtain Authorization? NEW PROTOCOLS: The process for determining which new protocols will require authorization is currently being developed, including a revision to our protocol cover sheet. We will let you know as soon as this is available.

15 How to obtain Waiver of Authorization? In research, authorization is not required if it meets the criteria for waiver outlined in the privacy rule.

16 No more than minimal riskNo more than minimal risk Not adversely affect rights and welfare of subjectsNot adversely affect rights and welfare of subjects Research cannot be done without waiverResearch cannot be done without waiver When appropriate, information will be provided to subjects of researchWhen appropriate, information will be provided to subjects of research No more than minimal risk to privacy, based on, at least:  Plan to protect identifiers  Plan to destroy identifiers ASAP  Written assurance that PHI will not be used/disclosed with few exceptions Research cannot be done without waiver, and Research cannot be done without this PHI COMMON RULEPRIVACY RULE CRITERIA FOR WAIVER OF AUTHORIZATION

17 How to obtain Waiver of Authorization? The process and forms are currently being developed to address the required criteria necessary for the IRB to approve a waiver. We will let you know when these are available.

18 TRANSITION TO PRIVACY RULE Compliance date: April 14, 2003Compliance date: April 14, 2003 If you have a waiver of consent under the common rule prior to 4/14/03, you do NOT need to apply for a waiver under HIPAAIf you have a waiver of consent under the common rule prior to 4/14/03, you do NOT need to apply for a waiver under HIPAA All new enrollment of subjects on research involving PHI falls under HIPAA & requires an authorizationAll new enrollment of subjects on research involving PHI falls under HIPAA & requires an authorization

19 Authorization/Waiver Reminders If you need to do an authorization, the IRB will contact you to inform you what you need to do If you need to do an authorization, the IRB will contact you to inform you what you need to do If you haven’t completed your survey yet, please do so immediately! If you haven’t completed your survey yet, please do so immediately! HIPAA is in addition to current IRB human subject requirements - when both regulations apply, both requirements must be followed. HIPAA is in addition to current IRB human subject requirements - when both regulations apply, both requirements must be followed.

20 DATABASES/REGISTRIES HIPAA will add a new level of scrutiny to use of all PHIHIPAA will add a new level of scrutiny to use of all PHI UVM and FAHC need to place ourselves in the best compliance position possibleUVM and FAHC need to place ourselves in the best compliance position possible

21 DATABASES/REGISTRIES In order to ensure that the development, maintenance and release of data involving PHI meets these requirements, we will be surveying all researchers about existing databases.In order to ensure that the development, maintenance and release of data involving PHI meets these requirements, we will be surveying all researchers about existing databases. Processes are being developed for the IRB to review existing databases and, when appropriate, approve waiver of consent and/or authorization.Processes are being developed for the IRB to review existing databases and, when appropriate, approve waiver of consent and/or authorization.

22 DATABASES/REGISTRIES Model procedures for developing and operating databases and registries will be drafted and made available upon completion.Model procedures for developing and operating databases and registries will be drafted and made available upon completion.