CTSI Core Leaders Retreat 1 Committee on Human Research (CHR) Issues for Core Laboratories UCSF CTSI Core Leaders Retreat Elizabeth Tioupine, CIP

Slides:



Advertisements
Similar presentations
Ann Johnson IRB Administrator, IRB Member. Objectives 1. Identify the components necessary for management and oversight of tissue repositories used for.
Advertisements

HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
National Cancer Institute Cancer Therapy Evaluation Program (CTEP) presents: How to Obtain Protected Health Information (PHI) from an Outside Healthcare.
HIPAA Health Insurance Portability and Accountability Act.
Criteria For Approval 45 CFR CFR Minimized risks Reasonable risk/benefit ratio Equitable subject selection Informed consent process Informed.
HIPAA Requirements for Patient Oriented Research
Informed Consent.
Protecting Client Data HIPAA, HITECH and PIPA Part 1A
Health information security & compliance
THE UW HEALTH SCIENCES IRB S OVERVIEW PRACTICAL REGULATORY ISSUES IN HUMAN SUBJECTS RESEARCH.
Human Specimen Repositories: Requirements of 45 CFR part 46 PRIM&R May 5, 2004 Julie Kaneshiro DHHS Office for Human Research Protections Phone:
Common Errors to avoid in IRB- 03 (VA) Applications.
Human Relations and Communications
What does this form mean? HIPAA Authorization means prior written permission for use and disclosure of protected health information (PHI) from the information’s.
1 HIPAA, Researchers and the IRB: Part Two Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
HIPAA, Researchers and the IRB Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
CUMC IRB Investigator Meeting November 9, 2004 Research Use of Stored Data and Tissues.
IRB Monthly Investigator Meeting Columbia University Medical Center IRB October 11, 2005.
Human Investigation Committee  Is it research?  If yes, does it involve human subjects?  If yes, can it be exempt?  If no, will a Request for.
Health Insurance Portability and Accountability Act (HIPAA)
Data Security and Research 101 Completing Required Forms Kimberly Summers, PharmD Assistant Chief for Clinical Research South Texas Veterans Health Care.
N ational P rovider I dentifier Type 1 Workforce Training Month Day, Year The NPI will become the standard, unique identifier for health care providers.
How to Obtain Institutional Review Board (IRB) Approval Richard Wagner Associate Director UCSF Human Research Protection Program August 14, 2008.
 About SP ERC  Role of SP ERC  SP ERC Members  ERC Operations  Definition of Research  Definition of Principal Investigator (PI), Co-PI, Collaborator.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
University of Miami1 Privacy, Confidentiality & Security Marisabel Davalos, M.S.Ed., CIP Associate Director of Educational Initiatives November, 2008.
Cornell Evaluation Network The Use of Human Participants in Research Office of Research Integrity and Assurance ~ May 14, 2007.
Human Research Protection Programs 1a: How to Navigate Human Subject Protection Regulations Sponsored by the American Society for Investigative Pathology.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
Revised February 4, Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy Rule: UCSF Education Module for Researchers, Research.
14 May Privacy Requirements Phoenix Ambulatory Blood Pressure Monitoring System © 2006 Christopher J. Adams Copying and distribution of this document.
Health information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be.
Future Use of Stored Samples & Data and the NIH Policy on GWAS and dbGaP NIAID/DAIDS Dione Washington, M.S. -- ProPEP Sudha Srinivasan, Ph.D.-- TRP Tanisha.
HIPAA and Research Basics for IRB Tim Atkinson Director, Research and Sponsored Programs Director, Institutional Review Board Research Privacy Officer.
HIPAA – How Will the Regulations Impact Research?.
Administrative Updates Quick Reference to Commonly Asked Questions Who do I ask aboutResource /Phone Number Building Maintenance &
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
IT Overview January Virtual Tissue Bank for Arizona Biomedical Research will provide a de-identified repository of biospecimens from AZ institutes.
HIPAA Health Insurance Portability and Accountability Act of 1996.
1 Ethical issues in genomics research Bernard Lo, M.D. March 3, 2009.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
Office of Human Research (OHR) Quality Improvement Program Patrick Herbison Heather Krupinski.
06/20/03- revised1 Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy Rule: UCSF Education Module for Researchers, Research Administrators,
Paul Kelly Facility Research Compliance Officer for the Ralph H. Johnson VA Medical Center.
Office of Human Research Protection Georgia Health Sciences University.
Office of Research Oversight Office of Research Oversight 1 Human Subject Protection Issues for HSR&D Researchers Tom Puglisi, PhD, CIP Chief Research.
INVESTIGATOR RESPONSIBILITIES C. Karen Jeans, MSN COACH Project Analyst.
Biomedical Informatics Research Network DATA SHARING HIPAA Compliance & IRB Approvals Martha Payne, Jeffrey Grethe October 10, nd Annual All Hands.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Office of Human Research (OHR) Quality Improvement Program Patrick Herbison Heather Krupinski.
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
UC Riverside Health Training and Development
HIPAA Definitions What Does PHI Include?
No No, Yes Yes: Simple Privacy & Information Security Tips Krista Barnes, J.D. Senior Legal Officer and Director, Privacy & Information Security, Institutional.
Transfer of Materials, Confidential Information, and Data
Secondary Research with Identifiable Information and Biospecimens
HIPAA Overview.
HIPAA & PHI TRAINING & AWARENESS
Which Projects Do – and do Not – Require IRB Review?
Which Projects Do – and do Not – Require IRB Review?
Case Study Template Kerecis Aurora Awards
Office of the Vice President for Research Human Subjects Protection Program IRB Submission Process Module 4 - Health Insurance Portability and Accountability.
Presentation transcript:

CTSI Core Leaders Retreat 1 Committee on Human Research (CHR) Issues for Core Laboratories UCSF CTSI Core Leaders Retreat Elizabeth Tioupine, CIP Human Research Protection Program (HRPP) University of California, San Francisco November 6, 2007

CTSI Core Leaders Retreat2 Main CHR Issues Affecting Cores Does the Core itself need CHR approval? Does the Core itself need CHR approval? Does the investigator have appropriate CHR approval? Does the investigator have appropriate CHR approval? How does HIPAA and restricted access to identifiers affect the work Cores do for researchers? How does HIPAA and restricted access to identifiers affect the work Cores do for researchers? What do Cores need to do to maintain subject privacy and confidentiality of data? What do Cores need to do to maintain subject privacy and confidentiality of data?

CTSI Core Leaders Retreat3 Why Would a Core Need to Have its Own CHR Approval? The Core needs to have its own CHR approval that addresses receipt, processing, storage and distribution of identifiable data and specimens The Core needs to have its own CHR approval that addresses receipt, processing, storage and distribution of identifiable data and specimens Investigator Data & Raw Specimens In Core Receives Processes Stores Distributes Investigator Data & Assay Results/ Processed Specimens Out

CTSI Core Leaders Retreat4 Types of CHR Approval CHR reviewed and approved – will have a hyphenated approval number starting with “H” with date of approval (1 year approval) CHR reviewed and approved – will have a hyphenated approval number starting with “H” with date of approval (1 year approval) Exempt Certification – will have 8 digit number (3 year approval) Exempt Certification – will have 8 digit number (3 year approval) No CHR approval needed – when study doesn’t qualify as human subjects research based on CHR decision tree (PI may present Self- Certification Form for Sponsors) No CHR approval needed – when study doesn’t qualify as human subjects research based on CHR decision tree (PI may present Self- Certification Form for Sponsors)

CTSI Core Leaders Retreat5

6

7 Definitions “Coded” “Coded” Data and specimens are associated with a unique code number; identifiers are retained separately and securely Data and specimens are associated with a unique code number; identifiers are retained separately and securely “De-identified” or “Anonymized” “De-identified” or “Anonymized” Data and specimens have been stripped of identifiers; no code exists to link specimens to identifiers Data and specimens have been stripped of identifiers; no code exists to link specimens to identifiers

CTSI Core Leaders Retreat8 18 Protected Health Identifiers Names Names Dates* Dates* Postal Address* Postal Address* Phone Numbers Phone Numbers Fax Numbers Fax Numbers Addresses Addresses Social Security Numbers Social Security Numbers Medical Record Numbers Medical Record Numbers Health Plan Numbers Health Plan Numbers Account Numbers Account Numbers License/Certificate Numbers License/Certificate Numbers Vehicle ID Numbers Vehicle ID Numbers Device Identifiers/Serial Numbers Device Identifiers/Serial Numbers IP Address Numbers IP Address Numbers Biometric Identifiers Biometric Identifiers Facial Photo/Images Facial Photo/Images Any Other Unique Identifiers Any Other Unique Identifiers *with some exceptions

CTSI Core Leaders Retreat9 Verification of CHR Approval The Core should request the CHR approval # and date of approval The Core should request the CHR approval # and date of approval If a project does not meet the definition of human subject research, the Core could ask the PI to submit the PI Self Certification Form If a project does not meet the definition of human subject research, the Core could ask the PI to submit the PI Self Certification Form Ultimate responsibility for obtaining appropriate CHR approval rests with Principal Investigator Ultimate responsibility for obtaining appropriate CHR approval rests with Principal Investigator

CTSI Core Leaders Retreat10 Working with Identifiable Specimens Request that specimens be labeled with a code, not direct identifiers Request that specimens be labeled with a code, not direct identifiers If you must receive identifiable specimens, assign a code number and remove direct identifiers as quickly as possible If you must receive identifiable specimens, assign a code number and remove direct identifiers as quickly as possible Store identifiable specimens securely Store identifiable specimens securely Store identifiers and code key securely and separately from research data Store identifiers and code key securely and separately from research data

CTSI Core Leaders Retreat11 UCSF Resources Committee on Human Research: Committee on Human Research: UCSF Guide for Research Use of Human Biological Specimens: y05.pdf UCSF Guide for Research Use of Human Biological Specimens: y05.pdf y05.pdf y05.pdf UCSF IT Security: UCSF IT Security: Enterprise Information Security: Enterprise Information Security: Cell Culture Facility – Linda Reilly: Cell Culture Facility – Linda Reilly: Neurosurgery Tissue Core – Cynthia Cowdrey: e_facility.html Neurosurgery Tissue Core – Cynthia Cowdrey: e_facility.html e_facility.html e_facility.html UCSF AIDS Specimen Bank – Yvonne DeSouza: UCSF AIDS Specimen Bank – Yvonne DeSouza: