NIH Data Sharing Dr. Belinda Seto, Deputy Director National Institute of Biomedical Imaging and Biomedical Engineering October, 2006 CODATA Workshop.

Slides:



Advertisements
Similar presentations
Fourth National HIPAA Summit April 26, 2002 Implementation of a HIPAA Data Management Strategy Safeguarding privacy interests while making data available.
Advertisements

Ann Johnson IRB Administrator, IRB Member. Objectives 1. Identify the components necessary for management and oversight of tissue repositories used for.
HIPAA Privacy Rule “Standards for Privacy of Individually Identifiable Health Information” 45 CFR 160 and 164* *
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA Requirements for Patient Oriented Research
Informed Consent.
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
Training In HIPAA Privacy Regulations for Researchers and Research Staff Adapted from a presentation prepared by Human Subjects Division, University of.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Privacy and Information Security Essentials
Human Specimen Repositories: Requirements of 45 CFR part 46 PRIM&R May 5, 2004 Julie Kaneshiro DHHS Office for Human Research Protections Phone:
Ellen Wright Clayton, MD, JD Craig-Weaver Professor of Pediatrics Director, Center for Biomedical Ethics and Society Vanderbilt University.
University of Miami1 HIPAA Survival Skills An Introduction to HIPAA and Research University of Miami Human Subjects Research Office October 31, 2006 Evelyne.
Belinda Seto, Ph.D. Deputy Director National Institute of Biomedical Imaging and Bioengineering National Institutes of Health (NIH) Implementing the NIH.
Tissue Banking Marilyn Mason, Ph.D. January 14, 2009.
1 HIPAA, Researchers and the IRB: Part Two Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
SPECIAL DIABETES PROGRAM FOR INDIANS Competitive Grant Program Special Diabetes Program for Indians Competitive Grant Program SPECIAL DIABETES PROGRAM.
HIPAA, Researchers and the IRB Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
CUMC IRB Investigator Meeting November 9, 2004 Research Use of Stored Data and Tissues.
NSF Data Management Plan Requirements Alex Kanous
Health Insurance Portability and Accountability Act (HIPAA)
Promoting Objectivity in Research by Managing, Reducing, or Eliminating Conflicts of Interest UT HOP UT HOP The University of Texas at Austin.
Data Security and Research 101 Completing Required Forms Kimberly Summers, PharmD Assistant Chief for Clinical Research South Texas Veterans Health Care.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
Cornell Evaluation Network The Use of Human Participants in Research Office of Research Integrity and Assurance ~ May 14, 2007.
Human Research Protection Programs 1a: How to Navigate Human Subject Protection Regulations Sponsored by the American Society for Investigative Pathology.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
NIH Data Sharing Policy University of Nebraska Medical Center.
Data Sharing: Biomedical Research Data versus Personal Health Data Belinda Seto, Ph.D. Deputy Director National Institute of Biomedical Imaging and Bioengineering.
Revised February 4, Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy Rule: UCSF Education Module for Researchers, Research.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
De-identifying Pathology Reports for Pathology Informatics
Health information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be.
Future Use of Stored Samples & Data and the NIH Policy on GWAS and dbGaP NIAID/DAIDS Dione Washington, M.S. -- ProPEP Sudha Srinivasan, Ph.D.-- TRP Tanisha.
PwC Tissue Banking and Repositories – Human Subject Protections Privacy Protections Medical Research Summit Tom Puglisi, Ph.D. Friday March 7 – 9:15 am.
HIPAA and Research Basics for IRB Tim Atkinson Director, Research and Sponsored Programs Director, Institutional Review Board Research Privacy Officer.
HIPAA – How Will the Regulations Impact Research?.
NIH Data Sharing Dr. Belinda Seto, Deputy Director National Institute of Biomedical Imaging and Biomedical Engineering (NBIB) June 23, 2004 Collaborative.
Privacy and Confidentiality. Definitions n Privacy - having control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally,
How to Successfully Apply to the IRB Richard Gordin, IRB Chair True Rubal, Administrator / Director For the Protection of Human Participants in Research.
1 Ethical issues in genomics research Bernard Lo, M.D. March 3, 2009.
Integrating a Federated Healthcare Data Query Platform With Electronic IRB Information Systems Shan He IPHIE 2010.
Health Insurance portability and Accountability Act (HIPAA)‏
Data Sharing in Nursing: What Researchers Need to Know November 9, 2015 Caitlin Bakker, Research Services Librarian |
Research & Economic Development Office of Grants and Contracts Administration Data Security Presented by Debbie Bolick September 24, 2015.
06/20/03- revised1 Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy Rule: UCSF Education Module for Researchers, Research Administrators,
WELCOME to the TULANE UNIVERSITY HUMAN RESEARCH PROTECTION OFFICE WORKSHOP for SOCIAL/BEHAVIORAL RESEARCH (March 2, 2010) Tulane University HRPO Uptown.
Use of Data from the Electronic Medical Record in Research Opportunities & Pit Falls Kristin West.
DOE Data Management Plan Requirements
Data Management Lesley A. Brown Director of Proposal Development.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
VETERANS HEALTH ADMINISTRATION SLIDE 0 New Requirements for VA ORD Investigators: Implementation of Data Management and Access Plans.
PwC Issues in HIPAA Research Compliance William R. Braithwaite, MD, PhD “Dr. HIPAA” HIPAA Summit 6 Washington, DC 27 March 2003.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
Epidemiology and Genomics Research Program
The HIPAA Privacy Rule: Implications for Medical Research
Research Ethics Matthew Billington
Transfer of Materials, Confidential Information, and Data
Issues in HIPAA Research Compliance
Research with Human Subjects
Office of the Vice President for Research Human Subjects Protection Program IRB Submission Process Module 4 - Health Insurance Portability and Accountability.
The Health Insurance Portability and Accountability Act
From Baby Boomers to Millennials
Presentation transcript:

NIH Data Sharing Dr. Belinda Seto, Deputy Director National Institute of Biomedical Imaging and Biomedical Engineering October, 2006 CODATA Workshop

“Data should be made as widely and freely available as possible while safeguarding the privacy of participants, and protecting confidential and proprietary data.” -- NIH Statement on Sharing Research Data February 26, 2003 NIH Viewpoint

NIH expects timely release and sharing of final research data for use by other researchers. NIH expects grant applicants to include a plan for data sharing or to state why data sharing is not possible, especially if $500K or more of direct cost is requested in any single year NIH expects contract offerors to address data sharing regardless of cost Effective with October 1, 2003 receipt date for NIH applications NIH Data Sharing Policy

Caveats for Studies Including Human Research Participants Investigators need to carefully consider –Studies with very small samples –Studies collecting very sensitive data However, even these data can be shared if safeguards exist to ensure confidentiality and protect the identity of subjects

How to Share Data Provide in publications Share under the investigator’s own auspices Place datasets in public archives Place in restricted access data centers or data enclaves

Challenges  Cultural Challenges –Obtaining data in a traditionally data sharing adverse environment –Overcoming the competitive and costly “silo” approach to biomedical research –Removing barriers to information flow across the complex, heterogeneous environment  Technical Challenges –Dealing with a lack of interoperable technologies, unifying architectures, standards, and terminologies –Implementing strategies to process and analyze terabytes of data efficiently –Maintaining systems in a biologically changing environment –Securing, protecting, and tracking patient data across disparate systems

Option 1: De-identified Health Information  Completely de-identified information (18 elements removed) and no knowledge that remaining information can identify the subject. OR  Statistically “de-identified” information where a statistician certifies that there is a “very small” risk that the information could be used to identify the subject. Special topic: Data Sharing and HIPAA Privacy Rule

The Privacy Rule defines 18 identifiers –Names –Geographic info (including city, state, and zip) –Elements of dates –Telephone #s –Fax #s – address –Social Security # –Medical record, prescription #s –Health plan beneficiary #s –Account #s – Certificate/license #s – VIN and Serial #s, license plate #s – Device identifiers, serial #s – Web URLs – IP address #s – Biometric identifiers (finger prints) – Full face, comparable photo images – Unique identifying #s Special topic: Data Sharing and HIPAA Privacy Rule

Option 2: Limited Data Set with Data Use Agreement  The Privacy Rule permits limited types of identifiers to be released with health information (referred to as a Limited Data Set) -- City, State, Zip; Elements of Date; Unique identifiers not listed as one of 16 direct identifiers  Limited Data Sets can only be used and released in accordance with a Data Use Agreement between the covered entity and the recipient. Special topic: Data Sharing and HIPAA Privacy Rule

Data Sharing in the Post- Genomic Era

Genome Wide Association Study: Data Sharing

What is Genome-Wide Association Study?  A genome-wide association study is currently defined as any study of genetic variation across the entire human genome that is designed to identify genetic associations with observable traits (such as blood pressure or weight), or the presence or absence of a disease or condition.  Both clear phenotype information and extensive genotyping ( ,000 SNPs) are expensive and labor- intensive.

Rationale for Data Sharing  Genome-wide association studies (GWAS) use scarce human and economic resources, which are diverted from other activities.  The populations studied by NIH-supported investigators are limited in number, and represent an immensely valuable resource.  The amount of data obtained exceeds that which can be analyzed by any single group of investigators by many orders of magnitude.

Rationale (continued)  The cost of extensive genotyping has fallen rapidly, and continues to fall, making studies feasible which would not have been possible even 4 years ago.  NIH is getting applications for many of these studies representing many millions of dollars.  If the data remain sequestered, work may be unnecessarily duplicated, and the potential value of multiple analyses and approaches will be lost.

Guiding Principle: The greatest public benefit will be realized if data from GWAS are made available, under terms and conditions consistent with the informed consent provided by individual participants, in a timely manner to the largest possible number of investigators.

Goals of the Proposed Policy  Advance science for the benefit of the public through the creation of a centralized NIH GWAS data repository.  Facilitate research and medical science to better address the health needs of people based on their individual genetic information.

Proposed NIH Policy for GWAS  Data Sharing Procedures  Data Access Principles  Intellectual Property  Protection of Research Participants

Public Access Controlled Access NIH Supported or Conducted GWAS Study NIH GWAS Research Overview Submitting investigators & institutions responsible for: Compliance with applicable laws/policies Data submitted using random code without identifiers Notation of any limitations on data use Dataset specific access rights Data Users and institutions responsible for: Compliance with app. laws/policies Use for specified research purpose Agreement not to identify individuals Protecting data confidentiality GWAS Data Repository Login Control Coded Genotype – Phenotype Dataset Pre-computes Study Protocol Descriptive Information Data Access Committee Requested Research Use Peer Review GWAS application Coded Phenotype Data Coded Genotype Data

Data Sharing Procedures  Central GWAS Data Repository at NCBI, National Library of Medicine  Data Submission –All NIH supported investigators of GWAS are expected to submit protocol, questionnaires, study manuals, measured variables, and other documentation

Data Sharing Procedures  Data Submission –NIH strongly encourages submission of curated and coded phenotype, exposure, genotype and pedigree data –All data will be submitted without identifiable information using a random, unique code consistent with the HIPAA Privacy Rule  Submitted data to be accompanied by: –Certification by the responsible IRB –Institutional statement that data is in accord with all applicable laws and regulations (Continued)

Potential Identifiers  Geographic subdivisions smaller than the state will be needed for genetic- environmental interaction studies  Dates smaller than a year may be needed for some studies  A code will be retained to link to data so that it can be updated or withdrawn

Data Access  Basic descriptive information available to the public  Access to genotype and phenotype datasets along with pre-computed analyses for research purposes will be provided through NIH Data Access Committee (DAC)  PIs seeking data will submit a Data Use Certification that is co-signed by the designated Institutional Official for approval by the appropriate DAC  Confirmation that the proposed research use is consistent with any restraints identified at the Institution submitting the dataset

Publication  Period of exclusivity for Primary Investigators, proposed 9 months  Acknowledgement of contributing investigators and funding organization

Intellectual Property  NIH hopes that genotype-phenotype associations will remain available to all investigators, unencumbered by IP claims  Discourage premature claims on pre- competitive information  NIH encourages broad use of NIH supported genotype-phenotype data with NIH’s Best Practices for Licensing with Genomic Inventions

Intrinsic limitations  Return of results –To study subjects –To primary investigators  Limited control on use of data by secondary investigators  Participants can withdraw consent and data, but once data are released, they cannot be retrieved.

Risks  Sensitive information: ancestry, disease susceptibility can be revealed.  Genetic information reveals things about people to whom you are related: family, ethnic group.  This information is not obvious, and requires great sophistication and effort to obtain.  For real benefits, it must be possible to update information, and a code must be maintained.

Risks (continued)  Privacy –Removed from most identifiers –Ultimately identifiable – IF you have extensive genetic information on the person or a close relative –Information is subject to FOIA.  Genetic discrimination –The science is way ahead of the law on this.

Google: “GWAS policy” NIH Public Consultation on Sharing Genetic Data