Download presentation
Presentation is loading. Please wait.
Published byKevin Foster Modified over 9 years ago
1
Cornell Evaluation Network The Use of Human Participants in Research Office of Research Integrity and Assurance 255-3943 ~ oria@cornell.edu May 14, 2007
2
Office of Research Integrity and Assurance Began March 2006 to respond to Research Compliance Concerns Laws, Circulars, Regulations, Issues of Public Trust
3
ORIA Institutional Review Board for Human Participants (IRB) Institutional Animal Care and Use Committee Biosafety Committee (rDNA and Biological Agents) Conflicts of Interest Scientific Misconduct Export Controls
4
Background for Human Participants Nuremberg Code Declaration of Helsinki (World Medical Association) Belmont Report –Principle Based –Separation of Clinical Care vs. Research –Process of Informed Consent
5
Belmont Report –B. Basic Ethical Principles 1. Respect for Persons 2. Beneficence 3. Justice –C. Applications 1. Informed Consent 2. Assessment of Risk and Benefits 3. Selection of Subjects
6
Federal Regulations No laws in US for Research with Human Participants Regulations –45 CFR 46 and Relevant Subparts –21 CFR 50 and 21 CFR 56 Federal Wide Assurances
7
Definitions of Research & Human Participants Research: “…a systematic investigation, including research development, testing and evaluation, designed to develop or contribute to generalizable knowledge.” Human participants: “…living individuals about whom an investigator (faculty, student, and/or staff) conducting research obtains (1) data through intervention or interaction with the individual, or (2) identifiable private information.”
8
IRB: Three Review Levels Exempt – Does not require review from the IRB, but investigator may not self- exempt – application must come to ORIA. Expedited – Requires a complete review by only one IRB member. Full Review – Requires a complete review of the convened IRB.
9
Exemptions [45 CFR 46.101(1-6) Must still come to the UCHS – no Investigator can self-exempt Less than minimal risk to participants No prisoners are involved If a study is granted exemption, it does not require annual review
10
Full Review If you are including a vulnerable population in an interaction –Prisoners, including those in juvenile detention centers (does not include someone on probation or parole) – no exemptions apply to this population –Pregnant or nursing women (when subjected to an interaction other than survey/interview-type data collection, i.e., a nutritional study) –Children – Very minimal risk can be expedited; exemption #2 cannot be applied to this population unless it is strictly public observation. If serious deception is involved (these tend to be psychological studies) If your study puts participants at more than minimal risk
11
Full Review Submit 16 copies of application, recruitment and consent documents. Submit 4 copies of measurement instruments and, when applicable, 4 copies of grant application and/or secondary data agreement (include data security plan). Must be submitted by noon on the Friday 3 weeks prior to the next committee meeting.
12
Expedited Review Submit one copy of complete application and supporting documents at least two weeks prior to planned initial contact with participants or identifiable data. Protocols are reviewed as they are received and are not subject to the schedule for the full review protocols. When appropriate, include copy of grant application and/or secondary data agreement (include data security plan).
13
Decision Tree Developed to respond to needs of faculty, students, and staff Designed to help investigators determine what activities do not need IRB review & approval
14
Use of Secondary Data Still considered human participant research if identifiers are attached. Identifiers include: AddressEmail addressTelephone or fax # Elements of dates (e.g., birth date) Social Security #Medical record # Health Insurance #Certificate or license #sVehicle ID# Account #s (e.g., credit card) Internet protocol addressSerial #s Other unique ID #sBiometric identifiers (e.g., voice, fingerprint) Device ID #s Full face photos / images
15
Use of Secondary Data Confidentiality Concerns –Publications & Presentations –Online research –Identifiable by the investigator using the data Coded data Combination of de-identified data sets –Co-investigator holding links
16
Vulnerable Participants Regulations specify categories –Pregnant Women, Fetuses, Neonates –Prisoners –Children Others? –Individuals with diminished cognitive capacity
17
Informed Consent Process Types of Consent –Written –Information Sheet –Oral –Deferred Consent –Waiver
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.