Preparing Substantive Materials for IRB Review

advertisement
Protocol Part 3 Research Procedures Records Review
Version: 9/21/12
Note: This template is designed for records review procedures only and should not be used for
trying to provide other research procedures/methodologies. When multiple research methodologies
or research involving more than one subject group (ex. children and their parents) are combined
into a single IRB submittal, more than one Protocol Part 3 document may be necessary for the
project. When uploading multiple procedure documents, name each upload descriptively (e.g.
Consent for teacher interview, Procedure for child observation).
1. Enter a Version Date for this document:
Participants Included in these Procedures:
2. Indicate here which groups of participants and consent procedures are applicable to the
research procedures presented in this particular Part 3 document. If these apply to ALL
participants, simply say so.
3. How will consent be obtained from/waived for persons whose records will be accessed by
the researcher prior to any member of the research team accessing the records?
Consent will not be obtained from any subjects prior to accessing records- Protocol Part 2
PSD for Waiver or Alteration of Consent will be required.
Consent will be obtained from all subjects or parents prior to accessing records- An
appropriate protocol Part 2 Consent Process will be required.
Consent will be obtained from some subjects or parents prior to accessing records but not
from others. An appropriate protocol Part 2 Consent Process and PSD for Waiver or Alteration
of Consent will be required. Provide a description of the groups that will and will not consent
to the record access:
Research and Confidentiality Procedures:
4. Indicate the total number of records/charts to be reviewed:
5. Describe the records to be accessed:
6. Are all records existing at the time of starting the project (e.g. Only school standardized test
records for tests from past years will be accessed) or are new records that will be
created/added to after the date of project inception (e.g. Records accessed will include
grades obtained by students in the upcoming school year)?
7. Describe how the research team will access the records:
8. Describe what information will be taken away from the site where the records reside.
Protocol Part 3 Research Procedures Records Review
Version: 9/21/12
9. When will record information accessed be de-identified? Keep in mind that names are not
the only identifiers.
(Only one of these should apply for a given access to records)
a. The research team will only be given access to records that are completely de-identified
with no reasonable way to figure out any participant’s identity- This situation may not be
human research, consult with the IRB before proceeding further.
b. The research team will only be given access to records that are de-identified but a code
(such as record number) exists so that it would be possible to obtain the identity from the
original supplier of the records but the supplier and researcher have agreed that the research
team will never be given access to information that will allow re-identification- This situation
may not be human research, consult with the IRB before proceeding further.
c. The research team will be provided access to identifiable data but before any information
leaves the possession of the supplier, information will be de-identified (e.g. the researcher is
given access to the file cabinets containing the records but only writes down information in the
research record that is completely de-identified).
d. The research team will be provided access to identifiable data. However, any information
that leaves the possession of the record supplier, will only contain a code so that, if again given
access to the original supplier’s records, a participant could be re-identified but without this
access, the researchers records are essentially de-identified.
e. The research team will be provided access to identifiable data and the information will
remain identifiable in the research record for a period of time before it is de-identified or
identifiable records are destroyed.
f. The research team will be provided access to identifiable data and the information will
permanently remain identifiable in the research record.
10. If you checked d, e, or f in the previous question, explain why access to de-identified data is
either not sufficient for achieving the goals of the study or an impractical method for
obtaining the data:
11. Describe confidentiality procedures for handling of the data obtained including when
applicable:
 How and where data will be stored at each step of the process.
 How data is either coded and/or de-identified
 How and when it is to be placed in permanent storage or destroyed
 Time frames relative to data collection for each of these steps
 Who (the class of individuals) will have access to data at each step
Make certain that all data is accounted for. This is especially important for identifiable records
such as audio or video.
12. Describe any additional procedures for protecting the confidentiality of the subjects’
responses including if the PI has plans to obtain a certificate of confidentiality (not usually
Protocol Part 3 Research Procedures Records Review
Version: 9/21/12
applicable- consult with the IRB on this) to keep data from being subpoenaed. If none, state
so.
Privacy:
Privacy deals with a participant’s control over access to oneself. Protection of privacy is an issue
when data collection is occurring, not an issue of what happens with collected data. What happens
with collected data is a confidentiality issue.
13. When data is obtained from records explain why the data collection does not constitute an
unreasonable invasion of participants’ privacy when the researcher accesses the records
(e.g. Data is obtained from the files of the admissions office at UB. The director of
admission has granted permission for the research team to use this information in the study.
No identifying information will be communicated as a part of the published results of the
study so the only person who will have new access to private information is the researcher.).
Risks:
14. The most common risks associated with a records review are those associated with a breach
of confidentiality. Depending on the records in use, a breach could result in any number of
negative consequences including but not limited to embarrassment, harm to relationships,
loss of job, incarceration, financial loss and even in some cases physical injury or death.
Describe the possible negative consequences that could result for individuals in this study if
a breach were to occur and information were to be released such that it could be associate
with a person’s identity:
15. Given the confidentiality procedures of this study, briefly discuss how likely/unlikely is
would be that a breach would result in any the negative consequences identified above:
16. Other than the risks associated with a breach of confidentiality, discuss any other risks
associated with the records review and protections in place to minimize these risks. If none,
simply state so.
Download