Data Sharing in Nursing: What Researchers Need to Know November 9, 2015 Caitlin Bakker, Research Services Librarian | 612-301-1353.

Slides:



Advertisements
Similar presentations
Dealing with confidential research information anonymisation techniques and other measures to enable using and sharing research data Data Management and.
Advertisements

Dealing with confidential research information - Anonymisation techniques and access regulations to enable using and sharing research data Data Management.
HIPAA Privacy Rule “Standards for Privacy of Individually Identifiable Health Information” 45 CFR 160 and 164* *
OVERVIEW & LIBRARY SUPPORT FOR DATA MANAGEMENT/SHARING Jim Van Loon, MSME/MLIS Science Librarian.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
Informed Consent.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Privacy and Information Security Essentials
What does this form mean? HIPAA Authorization means prior written permission for use and disclosure of protected health information (PHI) from the information’s.
University of Miami1 HIPAA Survival Skills An Introduction to HIPAA and Research University of Miami Human Subjects Research Office October 31, 2006 Evelyne.
1 HIPAA, Researchers and the IRB: Part Two Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
SPECIAL DIABETES PROGRAM FOR INDIANS Competitive Grant Program Special Diabetes Program for Indians Competitive Grant Program SPECIAL DIABETES PROGRAM.
Registry 201 Excel Registry Training. Registry 201 Excel Registry Training Outline ► Important Information about PHI ► Getting to know you ► Excel Registry.
HIPAA, Researchers and the IRB Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
Registry 201 Excel Registry Training. Registry 201 Excel Registry Training Outline ► Important Information about PHI ► Getting to know you ► Excel Training.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
INTRODUCTION TO RESEARCH DATA MANAGEMENT Robin Desmeules Janice Kung J W Scott Health Sciences Library University of Alberta Libraries.
Data Security and Research 101 Completing Required Forms Kimberly Summers, PharmD Assistant Chief for Clinical Research South Texas Veterans Health Care.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
University of Miami1 Privacy, Confidentiality & Security Marisabel Davalos, M.S.Ed., CIP Associate Director of Educational Initiatives November, 2008.
Cornell Evaluation Network The Use of Human Participants in Research Office of Research Integrity and Assurance ~ May 14, 2007.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
Open for ^ Business Research Data Services & Data Management Planning Ryan Schryver Wendt Commons is our.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
14 May Privacy Requirements Phoenix Ambulatory Blood Pressure Monitoring System © 2006 Christopher J. Adams Copying and distribution of this document.
HIPAA Privacy and Research August 21, 2015
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
De-identifying Pathology Reports for Pathology Informatics
Health information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be.
ACCESS for VALIDITY ACCESS for INNOVATION. Starting January 2011 for NEW proposals Not voluntary – “integral part” of proposal and FastLane Required for.
HIPAA and Research Basics for IRB Tim Atkinson Director, Research and Sponsored Programs Director, Institutional Review Board Research Privacy Officer.
HIPAA – How Will the Regulations Impact Research?.
NIH Data Sharing Dr. Belinda Seto, Deputy Director National Institute of Biomedical Imaging and Biomedical Engineering (NBIB) June 23, 2004 Collaborative.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Privacy and Confidentiality. Definitions n Privacy - having control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally,
RESEARCH ETHICS AND DATA CONFIDENTALITY: ANONYMISATION AND ACCESS CONTROL ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…...
Office of Human Research (OHR) Quality Improvement Program Patrick Herbison Heather Krupinski.
How Not to Be the Only One Who Knows About Your Research Sharing and Archiving for Posterity Melanie Radik and Raphael Fennimore Library & Technology Services.
The United States Department of Transportation. The United States Department of Transportation Public Access Plan is still under development and is subject.
EHR & BIG DATA – RISKS AND ADVANTAGES OF AMASSING MEDICAL DATABASES Sandra Gardiner Technology Law Section October 24, 2014.
DOE Data Management Plan Requirements
Data Management Lesley A. Brown Director of Proposal Development.
Federal Funder open data and literature requirements January 15, 2016 RAWG Meeting.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HETUS Pilot Group 8 Privacy procedures and ethical issues Kimberly Fisher, Centre for Time Use Research – co-ordinator External consultant Kai Ludwigs.
VETERANS HEALTH ADMINISTRATION SLIDE 0 New Requirements for VA ORD Investigators: Implementation of Data Management and Access Plans.
Office of Human Research (OHR) Quality Improvement Program Patrick Herbison Heather Krupinski.
Teaching & POEMs and DOEs in an Online Classroom Jacob Reider, MD David C Ross Albany Medical College.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
Slide 1 Standard Operating Procedures. Slide 2 Goal To review the standard operating procedures Creating the informed consent document Obtaining informed.
HIPAA PRIVACY & SECURITY TRAINING
No No, Yes Yes: Simple Privacy & Information Security Tips Krista Barnes, J.D. Senior Legal Officer and Director, Privacy & Information Security, Institutional.
Transfer of Materials, Confidential Information, and Data
HIPAA & PHI TRAINING & AWARENESS
Case Study Template Kerecis Aurora Awards
Office of the Vice President for Research Human Subjects Protection Program IRB Submission Process Module 4 - Health Insurance Portability and Accountability.
The Health Insurance Portability and Accountability Act
Presentation transcript:

Data Sharing in Nursing: What Researchers Need to Know November 9, 2015 Caitlin Bakker, Research Services Librarian |

(Selected) Data Services at the U Libraries ● data management consultations ● DMPTool and templates ● workshops and customized training for groups AHC IS ● provides secure, on-site data storage ● tools and data analysis through the CTSI Portal OIT ● computing and networking services, including storage options ● security tools and guidance OVPR ● online workshops on research data management and intellectual property

NIH’s Proposed Changes to Data Management Requirements ● Available at Plan.pdf (section on research data begins on page 23) Plan.pdf ● In response to the White House Office of Science and Technology (OSTP) memo from February 2013 ●Federal research funders with $100M in annual funding must develop a strategy that “improves the public’s ability to locate and access digital data resulting from federally funded scientific research.... [The data] should be stored and publicly accessible to search, retrieve, and analyze.” ● Builds on the Data Sharing Policy (2003) and the Public Access Policy (2008) ● Changes will come into effect January 2016

Significant (Proposed) Changes ● All grant applications* will require data management plans which will include: ● Description of the data being collected or produced, mechanisms for securing and storing data, provisions for protecting privacy and intellectual property, etc. ● Researcher’s plans to share their data (emphasis on existing, public repositories) ● Progress reports will be reviewed to ensure compliance with data management plans ● The merits of data management plans will be considered during the peer review process * Excluding grants unlikely to generate data (e.g., training grants)

Not all data should be shared ● Data that is protected by law (HIPAA, FERPA, FISMA) ● IRB restrictions obligate you to secrecy or confidentiality ● When release would seriously jeopardize the privacy of subjects ● Data with potential commercial value (e.g., patentable information) ● Prior to publishing a paper or releasing the results ● When data is proprietary or subject to other agreements (e.g., data retrieved from the Clinical Data Repository)

1.Name 2.All geographic divisions smaller than a state 3. 1.All elements of dates, except the year (includes date of birth, admission date, discharge date, date of death, etc.) 2.All ages over 89 (aggregate category of individuals 90 and older) 4.Phone number 5.Fax number 6. address 7.Social security number 8.Medical record number 9.Health plan number 10.Account numbers 11.Certificate or license numbers 12.Vehicle identification/serial numbers, including license plate numbers 13.Device identification/serial numbers 14.Universal resource locators (URLs) 15.Internet protocol (IP) addresses 16.Biometric identifiers 17.Full face photographs and comparable images 18.Any other unique identifying number, characteristic, or code Privacy & Sensitive Data There are 18+ HIPAA identifiers

Deidentification: The process of removing or obscuring any personally identifiable information to minimize the risk of disclosure of individual participants. One Caveat: “Data can be either useful or perfectly anonymous but never both” 1 1. Ohm P. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review. 2010;57(6):

Privacy & Sensitive Data Direct ● Variables that directly identify an individual (e.g., name, SSN, ) ● Usually collected only when necessary or removed before analysis Indirect ● Variables that in combination could identify an individual (e.g., number of children, a rare medical condition) ● No set list of variables, depends on your data set and what other data sets are available

Prior or During Collection ● Get consent to share and avoid overly restrictive language in the informed consent process ● Some suggestions for language are available here: ment/confientiality/conf-language.html ment/confientiality/conf-language.html ● Don’t “identify” in the data creation process ● When recording audio, do not use names, place of employment, or other information ● Arrange with participants to use pseudonyms ● For audio and video, bleep out names and blur faces or other identifying characteristics

After Data Collection Some Potential Strategies: ● Eliminate the variable entirely from the dataset ● Recoding variables into broader categories ● Top-coding (restricting the upper range of a variable) ● Match unique cases on the indirect identifier, then exchange the values of key variables between the cases ● Be cautious of small subgroups and cases with outliers Best Practice: ● Clearly mark any replacements in the data using brackets, tags, or another consistent method ● Keep a secure copy of the non-anonymized data ● Create a log of all the replacements, aggregations, or removals made in each data file. Store this log file separately from the de- identified data

●ICPSR (Inter-University Consortium for Political and Social Research) - ● includes health and mental health related data resources ● U of M is a member, meaning that affiliated researchers have access to additional data ● Re3data (formerly Databib) - ● Search or browse for data repositories by subject, country, or type of data ● Datacite - ● Searches across multiple data repositories simultaneously ● Still in beta mode ● DRUM (Data Repository for the University of Minnesota) Other Options

●Does the funding agency or journal have a preferred repository? ●What type of data are accepted? ●Who can access the data? ●How is the data licensed? What are the terms and conditions of deposit and of use? ●Does the repository mint a DOI or offer a recommendation for how the data should be cited? ●Is the repository funded by a grant? If so, do they have a business model to sustain it over time (e.g., through fees)? ●Are they actively preserving the data for the long-term? Things to Think About

Questions?