html5-img
1 / 46

Research Involving Sensitive Data & Databases

Research Involving Sensitive Data & Databases. Brenda Cuccherini, Ph.D., MPH VA Office of Research & Development January 2007. Is This True?. "The more the data banks record about each one of us, the less we exist” Marshall McLuhan Canadian philosopher & educator. Topics To Be Covered.

quito
Download Presentation

Research Involving Sensitive Data & Databases

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Research Involving Sensitive Data & Databases Brenda Cuccherini, Ph.D., MPH VA Office of Research & Development January 2007

  2. Is This True? "The more the data banks record about each one of us, the less we exist” Marshall McLuhan Canadian philosopher & educator

  3. Topics To Be Covered • Sensitive data • Database handbook • Definitions • Data Uses • Preparatory to research • One time use • Data Repositories • Long term storage • Re-use of data • Responsibilities

  4. Definition: VA Sensitive Data & Information All Department data which requires protection due to the risk of harm that could result from inadvertent or deliberate disclosure, alteration, or destruction of the information. VA Handbook 6504 June 7, 2006

  5. Examples of Sensitive Data • Data when improperly used or disclosed could adversely affect the ability of an agency to accomplish its mission • Proprietary information • Records about individuals requiring protection under Privacy Act, HIPAA, or other statutes • Information that can be withheld under FOIA

  6. Applicability to Research • VHA researchers develop, collect, use, share, &/or store all categories of sensitive data • Researchers primarily think about protecting subjects’ and patient data and not other data • Misuse or disclosure of other data may have a major impact on: • VHA and individual facilities • VHA’s ability to care for veterans & conduct research

  7. Protecting Sensitive Data • Careful thought • Situational awareness • “Universal Precautions” • Guidance • Policy

  8. Draft policy: Use of Data & Data Repositories in Research (Draft Policy but Good Guidance)

  9. A policy is a temporary creed liable to be changed, but while it holds good it has got to be pursued with apostolic zeal. Mohandas Gandhi

  10. Scope of Database Handbook • Applies to all research activities involving the use of data and data repositories that are conducted in VA approved research, within VHA, and/or by VA investigators while on duty. • VA investigators maybe • Compensated • WOC • IPA • Contractors: similar requirements will be in contract/SOW

  11. Terms Defined for This Discussion • Coded data • DUA or Data Transfer Agreement • Existing data • De-identified data

  12. Definition: Coded Data Information for which the source person can be identified through intermediate links (“coded”) used alone or in combination with other information.

  13. Coded Date & Human Subjects Research • Human subjects research: When individually identifiable information (III) is used • Individually identifiable information (38 CFR 16.102(f)): When the investigator can link data to specific persons directly or through codes. • Common Rule definition differs from HIPAA definition of Individually Identifiable Health Information (IIHI) • Example: III=any information including religious beliefs; IIHI = physical health, mental health, or condition of the individual

  14. Coded Data: Is It Non-human Subjects Research? • Data not collected specifically for current research • Code not based on the 18 HIPAA identifiers, e.g., last 4 digits of SSN, scrambled SSN, initials • Investigator cannot readily ascertain identity of individual • Key to code is destroyed or the investigator cannot get access to the key • Investigator can not otherwise ascertain the identify of the individuals

  15. Definition: Data Use Agreement (Data Transfer Agreement (DTA)) • A written agreement that defines: • What data may be used • How data may be used • How it will be stored and secured • Who may access it • To whom it may be disclosed • Disposition of data after termination of research • Required actions if lost or stolen • Requirement for DUA • HIPAA: when data disclosed outside the covered entity • Privacy Handbook (VHA 1605.1) disclosure outside of VHA • Requirement for DUA or DTA • Database HB: any use of data by others

  16. Definition: Existing Data Data that have already been collected when the research proposal is submitted to a VA reviewing committee

  17. Definition: De-identified Data De-identified data must meet both the following definitions: • HIPAA definition of de-identified • Removal of all 18 identifiers that could be used to identify the individual, individual’s relatives, employers, or household members • Common Rule “definition” of de-identified • Removal of all information that would identify the individual or would be used to readily ascertain the identity of the individual

  18. DATA AND ITS USES

  19. Sources of Data • Internal sources • Austin Automation Service • PBM • VistAWeb • BIRLS • Other administrative and clinical databases • Research databases • External sources • Research subjects

  20. Uses of Data • Preparatory to research • Within a research protocol • Without reuse or storage • With plans for storage and reuse • Populate a research data repository

  21. Preparatory to Research • Access only to prepare protocol prior to submission to IRB & R&D committee • Can record aggregate data for background, justify the research, or show adequate number of subject available, etc. • Cannot: • Record identifiers • Use information reviewed for recruitment or to conduct pilot studies

  22. Preparatory to Research (cont.) • PI must make representation per HIPAA • Access only to prepare protocol • No PHI removed from covered entity • Access necessary for research • Documentation of representation placed in PI’s files

  23. Use of Data For Research • Protocol approved by: • IRB (if human subjects) & R&D Committee • Database administrator or “owner” • Review by Privacy Officer or other expert • To ensure all Privacy Act, HIPAA and security issues are addressed • Use must be consistent with the protocol • Data can not be re-used or stored beyond the retention period, if not covered in protocol • Consent and HIPAA Authorization Issues addressed, e.g., obtained or waived

  24. RESEARCH DATA REPOSITORIES

  25. Data Repository • Data repository = storage & reuse • Location: • At VA on VA servers • Permission required to house elsewhere • Data sources: any • Research or non-research • VA or non-VA

  26. Creation of Research Repositories • Structure • Administrator or administrative board • Advisory committees (science, ethics) • Policies & procedures • IRB of record for oversight • Content • Identified or de-identified data • Location: within VA on VA servers unless waiver obtained

  27. Repository SOPs • Administrative structure • Conflict of Interest • Adding data to repository • Accessing data • Record keeping requirements • Privacy & confidentiality • Storage & security • Termination of repository

  28. Accessing Data from Repository • Access by VA investigators • Specific protocol that has IRB, R&D approval • Protocol must contain required information (discussed later) • DUA or Data Transfer Agreement

  29. Record Keeping • Sufficient Information to track & understand repository activity • How/where data obtained • Data requests and the associated protocols and approvals • Communications with the requester • Administrative activities such as committee meeting minutes • Communications to and from the IRB and R&D committee

  30. Oversight of a Repository • Annual reporting to the IRB (repository treated as a research protocol) and R&D committee • Report information • Source of data being added • Type of data released to others including the protocol for reuse that contains information on: • Confidentiality • Storage and security of data • Disposition of data at end of study • Any unanticipated problems regarding risk to subjects, institutions, etc. • Any incidents of inadvertent disclosure, loss, or theft of data

  31. RESPONSIBILITIES

  32. Investigator Responsibilities • Protocols must contain information on • Source of data & type of data (identified, de-identified) • Consent under which it was collected • How the data will be used • Planned use of & justification for use of real SSNs • Recruitment or re-contact of subjects • Storage ( where, any copies, who will have access, plans to share data) • Justification for waiver of authorization or consent • Privacy & confidentiality related to data

  33. Investigator’s Responsibilities(Continued) • If data collected directly from subjects: • Consent clearly states: • Use of data • If reuse allowed • Who will have access to data (VA investigators, non-VA investigators, drug companies, etc.) • Where it will be stored • How it will be secured • Disposition of data after study • Certificate of Confidentially • HIPAA authorization meets all requirements in VHA Handbook 1605.1 (more then HIPAA)

  34. Investigator’s Responsibilities(Continued) • Data use consistent with protocol • No re-disclosure of data • Appropriate training • When leaving VA data and all copies left at VA • All other responsibilities per VHA policy

  35. Identifiable Data: Special Concerns • SSNs – real and scrambled • Recruitment of subjects • Re-contacting subjects • Storage & Security • Privacy & Confidentiality – next session

  36. Approvals for Research Using Data From a Repository • Who is responsible? • The investigator(s) facility’s IRB and R&D Committee • Who is NOT responsible? • The IRB and R&D Committee for the facility that houses the repository • The IRB and R&D Committee for the facility from which the data came

  37. IRB Responsibilities • Sufficient expertise to review the protocol • Determining if the project is: • Research • If yes, is it human subjects research • If human subjects, is it exempt from IRB review (may still need HIPAA authorization) • Requiring sufficient information • All responsibilities under 38 CFR 16

  38. “Sufficient Information” for IRB • Source of the data & purpose originally collected (non-research, research) • If research: is the re-use consistent with the informed consent & authorization • If collected for non-research purposes, do guidelines under which collected allow re-use for research • Appropriate permissions are obtained to access the data

  39. “Sufficient Information” (Cont.) • Description of the data (de-identified, identified, coded) • Justification for use of identified data • Coded data: a description of the coding scheme and who controls the key • Use of real SSNs adequately justified • Confidentiality and privacy issues addressed • Recruiting or re-contacting subjects

  40. “Sufficient Information” (Cont.) • Major issue: Will the data be safe? • Storage • Security • Transportation or transmission • Copies of data (location, media) • Access (VA and non-VA persons) • Disposition of data at end of study (destruction, storage, etc.) • Risks (subjects, institution, system)

  41. Recruiting from Databases:IRB Considerations • Must have IRB and R&D Committee approvals • May not represent minimal risk • Minimal risk if • Investigator is subject’s health care provider (HCP) • Initial contact from subject’s HCP • Initial approach is general (not disease specific or address sensitive issues) • Initial contact in person or by mail • Minimal concerns if person has agreed to be contacted

  42. R&D Committee Responsibilities • Sufficient expertise to review science • Receive & review “sufficient information” as described for IRB • Review findings of the IRB • If facility does not hold an FWA: • Determine if it is research • If research, determine if it is human subjects research • If any questions regarding this determination, develop procedures for consultation with human subjects experts

  43. Responsibilities of Others • Local P&P must be developed to ensure compliance with applicable VA & VHA policies • Identify knowledgeable person(s) • Privacy Officer • IRB administrator • Research compliance officer • Data repository administrator • Additional training of “knowledgeable persons” may be required • Role: to serve as final check for privacy & security issues

  44. Just a Thought… “Big Brother in the form of an increasingly powerful government and in an increasingly powerful private sector will pile the records high with reasons why privacy should give way to national security, to law and order, to efficiency of operation, to scientific advancement and the like.” William O. Douglas Associate Justice U.S. Supreme Court From 1939-1975

  45. A prudent question is one-half of wisdom. Francis Bacon

  46. “…To care for him who shall have borne the battle and for his widow and his orphan."Abraham Lincoln "To care for him who shall have borne the battle and for his widow and his orphan.“ Abraham Lincoln’s Second Inaugural Address

More Related