Word Version 3PA Form

advertisement
Third-Party Access Protocol
Q1 IF THERE ARE PERSONAL IDENTIFIERS IN THE DATA TO BE ACCESSED, (EVEN IF
YOU AREN'T REPORTING THEM) YOU MUST SUBMIT THIS FORM
Q2 Responsible Investigator Name [Faculty research mentor, if student research]
Q3 Responsible Investigator E-mail
Q4 Department Chair/Program Director Name
Q5 Department Chair/Program Director E-mail
Q6 Student Investigator Name [Do not include student research assistants for faculty research]
Q7 Student Investigator E-mail
Q8 Title of Project
Q9 Concisely describe how existing data will be involved in the proposed research
Q10 Professional qualifications [to do the proposed research]
Q11 Funding Source [If the research is grant-supported or contract research]
Q12 Purpose of the proposed research [Provide an explicit statement of what is and is not
known about the topic, indicating what the proposed research is intended to add, stated as
benefits to the discipline and to the subjects. The IRB makes a cost/benefit analysis weighing
the potential benefits of the research against the potential costs and risks to the subjects.]
Q13 For the original data collection, was informed consent obtained for:
Select one for each statement
Yes (1)
No (2)
Data use for program
evaluation (1)


Data use for research
purposes (2)


Q14 If you answered Yes to the above question, please append written evidence
Q15 Provide a specific and meaningul description of the information for which access is
requested. Variable lists are appropriate, if the variables are explained. Directly address
whether personal identifiers will be included.
Q16 Explain why the research could not practicably be conducted without access to the data
Q17 Explain why consent of the subjects could not practicably be obtained
Q18 If you answered above that consent has not been obtained for data use for program
evaluation, please show that the individuals—even if personal identifiers are absent—will not be
placed at greater risk by the research [for example by substantial risk of loss of benefits
depending upon the results obtained].
Q19 If personal identifiers are present in the data to be accessed, show how each of the
following is present:
Q20 An adequate plan to protect identifiers from misuse
Q21 An adequate plan to destroy the identifiers at the earliest opportunity consistent with the
research and law
Q22 Adequate assurances that the data will not be disclosed to any other person or entity
except as required by law
Q23 Adequate oversight of the research project
Q24 Attach an additional document here [for example, authorization from an agency]
The actual form has an attachment button
Q25 Attach an additional document here [for example, authorization from an agency]
The actual form has an attachment button
Q26 Attach an additional document here [for example, authorization from an agency]
The actual form has an attachment button
Q27 When the information in this protocol is complete, checked, approved by the faculty mentor
-- if a student project -- proceed to the submission section.
Q28 Required
 I affirm the accuracy and truth of the information in this document (1)
Q29 Required
 I understand that submission is the first step in the IRB review and authorization process. I
will receive a submission confirmation E-mail after I submit this form. (1)
Download