NIH Data Sharing Dr. Belinda Seto, Deputy Director National Institute of Biomedical Imaging and Biomedical Engineering (NBIB) June 23, 2004 Collaborative.

Slides:



Advertisements
Similar presentations
Advanced Issues in HIPAA Research Compliance The Sixth National HIPAA Summit March 27, 2003 Kim P. Gunter Senior Consultant.
Advertisements

HIPAA Privacy Rule “Standards for Privacy of Individually Identifiable Health Information” 45 CFR 160 and 164* *
1 The HIPAA Privacy Rule and Research This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
NATIONAL FORUM ON YOUTH VIOLENCE PREVENTION: HIPAA PRIVACY RULE CONSIDERATIONS November 1, 2011 Iliana L. Peters, JD, LLM HHS Office for Civil Rights.
HIPAA, Privacy & Confidentiality Local Accountability for Research Protection in VA Facilities VA Office of Research & Development Baltimore, February.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA and Research and YOU. 2 INTRODUCTION Rule #1:Don’t Panic Rule #2:Bottom Line for Researchers: HIPAA is Manageable thru Education/Awareness and.
HIPAA Requirements for Patient Oriented Research
Informed Consent.
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
Training In HIPAA Privacy Regulations for Researchers and Research Staff Adapted from a presentation prepared by Human Subjects Division, University of.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Privacy and Information Security Essentials
Human Specimen Repositories: Requirements of 45 CFR part 46 PRIM&R May 5, 2004 Julie Kaneshiro DHHS Office for Human Research Protections Phone:
NIH Data Sharing Dr. Belinda Seto, Deputy Director National Institute of Biomedical Imaging and Biomedical Engineering September, 2005 South Africa Workshop.
Nora B. McCann Privacy Manager Corporate Compliance Fox Chase Cancer Center
University of Miami1 HIPAA Survival Skills An Introduction to HIPAA and Research University of Miami Human Subjects Research Office October 31, 2006 Evelyne.
Belinda Seto, Ph.D. Deputy Director National Institute of Biomedical Imaging and Bioengineering National Institutes of Health (NIH) Implementing the NIH.
1 HIPAA, Researchers and the IRB: Part Two Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
HIPAA, Researchers and the IRB Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
CUMC IRB Investigator Meeting November 9, 2004 Research Use of Stored Data and Tissues.
Informed Consent and HIPAA Tim Noe Coordinating Center.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
Data Security and Research 101 Completing Required Forms Kimberly Summers, PharmD Assistant Chief for Clinical Research South Texas Veterans Health Care.
1 VUMC Confidentiality Policy and HIPAA Implications for Clinical Research General Clinical Research Center Skills Workshop March 2, 2007 Gaye Smith Privacy.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
NIH Data Sharing Policy University of Nebraska Medical Center.
NIH Data Sharing Dr. Belinda Seto, Deputy Director National Institute of Biomedical Imaging and Biomedical Engineering October, 2006 CODATA Workshop.
Revised February 4, Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy Rule: UCSF Education Module for Researchers, Research.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
HIPAA Privacy and Research August 21, 2015
1 Defense Health Agency Privacy and Civil Liberties Office HIPAA Privacy Board Overview August 6, 2015.
Health Insurance Portability and Accountability Act (HIPAA)
Health information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
PwC Tissue Banking and Repositories – Human Subject Protections Privacy Protections Medical Research Summit Tom Puglisi, Ph.D. Friday March 7 – 9:15 am.
HIPAA and Research Basics for IRB Tim Atkinson Director, Research and Sponsored Programs Director, Institutional Review Board Research Privacy Officer.
HIPAA – How Will the Regulations Impact Research?.
H I P A A T R A I N I N G Self Directed Module 7 Research Disclosures For Data Custodians START Click to begin…
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Health Insurance portability and Accountability Act (HIPAA)‏
Research & Economic Development Office of Grants and Contracts Administration Data Security Presented by Debbie Bolick September 24, 2015.
06/20/03- revised1 Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy Rule: UCSF Education Module for Researchers, Research Administrators,
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
VETERANS HEALTH ADMINISTRATION SLIDE 0 New Requirements for VA ORD Investigators: Implementation of Data Management and Access Plans.
PwC Issues in HIPAA Research Compliance William R. Braithwaite, MD, PhD “Dr. HIPAA” HIPAA Summit 6 Washington, DC 27 March 2003.
Human Subjects Update E. Wethington, Chair, UCHS.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Winter 2008 HIPAA, Privacy & Confidentiality.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
The HIPAA Privacy Rule: Implications for Medical Research
HIPAA Administrative Simplification
The HIPAA Privacy Rule and Research
Making Your IRBs and Clinical Investigators HIPAA-Ready
HIPAA Privacy & Security: Medical Research Context
Issues in HIPAA Research Compliance
Analysis of Final HIPAA Privacy Modification Rule
Office of the Vice President for Research Human Subjects Protection Program IRB Submission Process Module 4 - Health Insurance Portability and Accountability.
The Health Insurance Portability and Accountability Act
Presentation transcript:

NIH Data Sharing Dr. Belinda Seto, Deputy Director National Institute of Biomedical Imaging and Biomedical Engineering (NBIB) June 23, 2004 Collaborative Meeting

“Data should be made as widely and freely available as possible while safeguarding the privacy of participants, and protecting confidential and proprietary data.” -- Final NIH Statement on Sharing Research Data February 26, 2003 NIH Viewpoint

PHS Grants Policy Statement April 1994 “Restricted availability of unique resources upon which further studies are dependent can impede the advancement of research and the delivery of medical care. Therefore, when these resources are developed with PHS funds and the associated research findings have been published or after they have been provided to the agencies under contract, it is important that they be made readily available for research purposes to qualified individuals within the scientific community. This policy applies to grants, cooperative agreements, and contracts.”

NIH expects timely release and sharing of final research data for use by other researchers. NIH expects grant applicants to include a plan for data sharing or to state why data sharing is not possible, especially if $500K or more of direct cost is requested in any single year NIH expects contract offerors to address data sharing regardless of cost Effective with October 1, 2003 receipt date for NIH applications NIH Data Sharing Policy

Caveats for Studies Including Human Research Participants Investigators need to carefully consider –Studies with very small samples –Studies collecting very sensitive data However, even these data can be shared if safeguards exist to ensure confidentiality and protect the identity of subjects

In general, no later than the acceptance for publication of the main findings from the final dataset No timeline specified—will vary depending on nature of the data collected First and continuing use, but not prolonged exclusive use –Investigators who collected the data have a legitimate interest in benefiting from their investment of time and effort What Is Meant by Timely?

How to Share Data Provide in publications Share under the investigator’s own auspices Place datasets in public archives Place in restricted access data centers or data enclaves Other ways?

YES! In application—budget and budget justification Administrative supplements Will NIH Provide Support for Data Sharing?

Examples of Current NIH Data Sharing Activities National Human Genome Research Institute (NHGRI)  Release of genomic sequence data National Library of Medicine (NLM)  Genome sequence submission and distribution  Enhanced access to other research data/tools  Outreach to research community  Possible support for research and development related to data sharing

The National Longitudinal Study of Adolescent Health (Add Health): An Example of Sensitive Data and Multi-Tiered Access Examples of Current NIH Data Sharing Activities

The National Longitudinal Study of Adolescent Health (Add Health)  20,745 adolescents enrolled in grades 7-12, followed between 1994 and  Data from: –adolescents and parents; –90,118 students attending sample schools; –school administrators; – independent data on neighborhood/community  Data collected in three waves,  Measures of: –health –health-related behaviors (e.g., sex, drugs) –determinants of health at the individual, family, school, peer group, and community level.

Reasons for Sharing Data  Scope  Potential  Cost Add Health: Sensitive Data Sharing Example

Challenges to Sharing Data  Data sensitivity  Need to protect confidentiality  Danger of deductive disclosure Add Health: Sensitive Data Sharing Example

A further challenge… The timely release of these public use samples is essential. Reviewers understand this to mean that investigators outside of the Carolina Population Center will have ready access to the data as soon as investigators inside the center have such access. Procedures for the guarantee of confidentiality … should apply to all users, both the general public and those at University of North Carolina. Add Health: Sensitive Data Sharing Example

Solution: a multi-tiered system  Public use data  Contractual data sets  Cold room for on-site data use Add Health: Sensitive Data Sharing Example

Public use data  Made available through Sociometrics, a small business data archive  Contains only a subset of cases (6,504)  Rare over-samples not included  Contains most data on included cases  Potentially identifying information redacted Add Health: Sensitive Data Sharing Example

Restricted-use contractual data  Full data set available only under contract  Available to researchers with: –IRB- and UNC-approved data security plan –Signed agreement to maintain confidentiality –Fee covering costs of providing data & user support; monitoring compliance  Requires annual progress report and renewal after 3 years Add Health: Sensitive Data Sharing Example

Cold room for on-site use  Initial plan required access to some data only on-site at UNC  Cold room constructed at UNC  Limited use to date Add Health: Sensitive Data Sharing Example

Data security caveats  Security requirements require periodic updating as technology advances  IRBs often lack understanding of security needs  Smaller institutions handicapped in creating secure environments for restricted data Add Health: Sensitive Data Sharing Example

New Concepts Introduced by the Privacy Rule  An individual’s written Authorization is required for use or disclosure of protected health information unless waived or excepted.  Authorization waivers can be granted by IRBs or Privacy Boards.  Decedent’s information is protected but Authorization is not required.  Accounting and reporting of disclosures are required. Special topic: Data Sharing and HIPAA Privacy Rule

Key Points about Research  In general, the Privacy Rule requires an individual’s written Authorization before the use and disclosure of PHI.  For research, the Privacy Rule permits covered entities to use and disclose PHI for research conducted: –with individual authorization, or –without individual authorization under limited circumstances. Special topic: Data Sharing and HIPAA Privacy Rule

Authorizations for Research  Must be for a specific research study – Authorization for future, unspecified research is NOT permitted but authorization may be used to create a repository or database  Review/approval by IRB/Privacy Board NOT needed  Different from, but may be combined with, informed consent  Must contain “core elements” & “required statements”  Need not expire Special topic: Data Sharing and HIPAA Privacy Rule

Research Use and Disclosure of PHI Without Authorization 1.De-identify PHI 2.Limited Data Set with Data Use Agreement 3.IRB or Privacy Board waiver of Authorization requirement 4.Activity preparatory to research 5.Research is on decedent’s information 6.Research qualifies for the Transition Provisions 7.Disclosure to a public health authority or as required by law Special topic: Data Sharing and HIPAA Privacy Rule

Option 1: De-identified Health Information  Completely de-identified information (18 elements removed) and no knowledge that remaining information can identify the subject. OR  Statistically “de-identified” information where a statistician certifies that there is a “very small” risk that the information could be used to identify the subject. Special topic: Data Sharing and HIPAA Privacy Rule

The Privacy Rule defines 18 identifiers –Names –Geographic info (including city, state, and zip) –Elements of dates –Telephone #s –Fax #s – address –Social Security # –Medical record, prescription #s –Health plan beneficiary #s –Account #s – Certificate/license #s – VIN and Serial #s, license plate #s – Device identifiers, serial #s – Web URLs – IP address #s – Biometric identifiers (finger prints) – Full face, comparable photo images – Unique identifying #s Special topic: Data Sharing and HIPAA Privacy Rule

Option 2: Limited Data Set with Data Use Agreement  The Privacy Rule permits limited types of identifiers to be released with health information (referred to as a Limited Data Set) -- City, State, Zip; Elements of Date; Unique identifiers not listed as one of 16 direct identifiers  Limited Data Sets can only be used and released in accordance with a Data Use Agreement between the covered entity and the recipient. Special topic: Data Sharing and HIPAA Privacy Rule

For More Information NIH Office of Extramural Research (OER) Web site on Data Sharing Policy: Office for Civil Rights Web site with Departmental guidance on HIPAA: Educational information from NIH and other research agencies about HIPAA Privacy Rule: