Research Documentation and Data Security

advertisement
Research Documentation: What
to Write, What to Save, How to
Store It
Tracy Rightmer, JD, CIP
Compliance Manager
December 8, 2009
AAHRPP ANNOUNCEMENT



For the past year Yale has been preparing for national accreditation
of its human research protection program.
Revised old policies, created new policies & new website going live
later this month
Structural changes:



Application will be submitted this month.



Kathy Uscinski has been named director of the HRPP, and all of Yale’s
IRBs fall under her administrative authority.
School of Nursing IRB has merged with the HIC, and their protocols will
be reviewed by either the HIC or the HSC, depending on design.
Must be reviewed and approved by AAHRPP
Onsite visit (probably next spring). We will be notified of who the review
team wants to interview, and we will work with all potential interviewees
in preparation for the visit.
We’ll be providing informational emails to the community, updating
you on the process. If you have any questions, email Jean Larson at
jean.larson@yale.edu.
Objectives




Discuss essential elements of a data
and document management plan
Present strategies for efficient
management of research related
documentation
Highlight effective tools for use in
managing study files
Describe measures for ensuring
subject confidentiality and data storage
International Conference on
Harmonization

A unique project that brings together
the regulatory authorities of Europe,
Japan and the United States and
experts from the pharmaceutical
industry in the three regions to discuss
scientific and technical aspects of
product registration
ICH

Purpose: to make recommendations
on ways to achieve greater
harmonization in the interpretation and
application of technical guidelines and
requirements for product registration in
order to reduce or obviate the need to
duplicate the testing carried out during
the research and development of new
medicines
E6:Good Clinical Practice
Consolidated Guidance

An international ethical and scientific
quality standard for the design,
conduct, performance, monitoring,
auditing, recording, analyses, and
reporting of clinical trials.
GCP


Compliance with this standard
provides public assurances that the
rights, safety and well-being of trial
subjects are protected, consistent with
the Declaration of Helsinki, and that
the clinical trial data are credible.
Provide a unified standard to facilitate
internal acceptance of clinical data by
the regulatory authorities in these
jurisdictions.
GCP 2.10

All clinical trial information should be
recorded, handled, and stored in a way
that allows its accurate reporting,
interpretation, and verification.
Documentation is Essential




“If it isn’t documented, it didn’t happen”
Viewed as a bother, but invaluable if a
problem arises
No one method is mandatory (no onesize-fits-all solution)
But there are certain essential
elements
Range of Complexity

Simple anonymous survey or use of
de-identified existing samples
Versus

Multi-site coordination of a doubleblinded drug study with 12 visits over
two years
Jargon




“Regulatory Binder” (File that contains all
HIC communication, approvals, sponsor
materials, etc.)
“Trial Master Files”
“Case Report Forms” (CRFs capture the
data the sponsor wants)
“Source Documentation” (original
documents, data and records, such as
hospital records, lab reports, subjects’
diaries, pharmacy records, etc.)
Approaches to research
documentation

Chronological

By topic/section

Some combination of the two
Maintain copies of all final
documents





History or ‘bread-crumb trail’ or ‘show
your work’
Word-processing functions such as
‘track changes’
Header/footer use for version/dates
Version Control: only one version is
‘active’ at a point in time
Future electronic submission will
necessitate strict electronic version
control
Important sections of a regulatory
binder



Protocol (including all amendments
and all versions)
Consent forms and HIPAA research
authorization forms (approved by IRB)
Regulatory approvals (Other IRB,
RSC, PRC, etc) and any required
reapprovals
Important sections, cont’d



All correspondence, including emails,
letters, faxes, notes of phone calls
Signature log, including name, initials,
signature, dates of involvement, and
study responsibilities
Recruitment materials, including
letters, advertisements, flyers, website
postings, etc (approved by IRB)
Important sections, cont’d

Samples of all forms to be used for
data collection, including screening
logs, eligibility checklists, case report
forms, drug accountability logs

Assessment tools to be used
Important sections, cont’d

Any reporting requirements, such as






Annual report to FDA
Continuing review approved by IRB
Adverse event reports
Protocol deviation/violation reports
Evidence of periodic monitoring (per the
protocol’s DSMP)
DSMB recommendations (if any)
Important sections, cont’d

Versions of all sponsor materials, if
applicable, including:





Sponsor’s clinical protocol
Investigator’s Brochure
Amendments
Sponsor’s correspondence
Records of monitoring visits
ICH Essential Documents



Those documents which individually
and collectively permit evaluation of a
trial and the quality of the data
produced
Focus heavily on pharmaceuticalsponsored trials
Include groups of documents,
generated before the trial commences,
during the clinical trial, and after
termination of the study
GCP Essential Documents

Many sponsor-related items, such as





CVs of investigators
1572s
Laboratory certifications
Laboratory normal values
Master randomization list with plan to
decode
Individual Subject Files






Consent form and RAF, signed and
dated
Eligibility Checklist
Visit flowchart
Case report forms
Source Documents e.g., Lab data,
ECGs, MRIs, Patient diaries
Adverse Events (AE)
*Separate storage


Signed consent
forms
Key linking
identifiers to codes
Study Termination/Close-out




Final report/Form 5C
Publication
Local dissemination of results*
Retention and storage of regulatory
documents per requirements
More complex scenarios


Yale PI is the Sponsor-investigator of
an IND, or the lead investigator on a
multi-site study
Additional responsibilities, including
maintaining CVs and training
certificates of all personnel from all
sites, and IRB approvals (and
reapprovals) from all sites
Multi-site coordination



Lead PI is responsible for data integrity and
data and safety monitoring
Monitoring is an evaluation of the clinical
research process which should occur
throughout the life of the protocol
Lead PI is responsible for informing all coinvestigators of progress, and events such
as Serious Adverse Events (SAEs), etc
Common Audit Findings




36% of audit issues are related to improper
or lack of documentation
Don’t let this happen to you!
Study Start-up Consultations and
personalized In-services are offered by the
HIC
Emails: ysmhic@yale.edu
tracy.rightmer@yale.edu
jean.larson@yale.edu
The 1st Rule to Data Storage


How do I store my data? SECURELY!
Use common sense when dealing with
sensitive personal data
Data Security

Recent developments:

Theft of a laptop with identified data

Theft of a desktop computer with identified data (including
SSN)

HITECH Act







Increased penalties. Prior penalties were up to $100 per incident
capped at $25,000 per year. Now $100-50,000 per incident capped
at $1.5 million per year.
Unauthorized or inappropriate access to unsecured PHI could be
considered a breach
It is not a breach if it is de-identified or encrypted.
If it is a breach, must report to patient and to DHHS within 60 days
If breach involves more than 500 people, must notify the media and
report to DHHS.
All reports to DHHS are available to the public.
Report all potential breaches to security@yale.edu or 432-3262.
Best practices



Work in progress
Several task forces working on these
issues
Review some basics to think about
and incorporate into practice
Confidentiality



Common Rule has always required
that confidentiality be protected to the
extent possible
Good medical practice also
incorporates pledges of confidentiality
Steps must be taken to minimize the
risk of breaches of confidentiality
Common Rule definition


Private information includes information about
behavior that occurs in a context in which an
individual can reasonably expect that no
observation or recording is taking place, and
information which has been provided for
specific purposes by an individual and which
the individual can reasonably expect will not be
made public (for example, a medical record)
Private information must be individually
identifiable (i.e., the identity of the subject is or
may readily be ascertained by the investigator
or associated with the information) in order for
obtaining the information to constitute research
involving human subjects
HIPAA



Adds layers of ensuring privacy and
data security
HIPAA Security focuses on electronic
media, but Privacy covers all forms of
data
Uses somewhat different definitions
Both CR and HIPAA


Need to get permission to access,
share personal information, via
consent or authorization.
If authorized, sharing is allowed per
the specifics of the approved
documents
Jargon

Anonymous
Coded
De-identified

Terms are not synonymous!


Jargon
Anonymous:
1: not named or identified <an
anonymous author> <they wish to
remain anonymous>
2 : of unknown authorship or origin
<an anonymous tip>
3 : lacking individuality, distinction, or
recognizability
Merriam-Webster, on-line
Jargon
Coded:
 a system used for brevity or secrecy of
communication, in which arbitrarily
chosen words, letters, or symbols are
assigned definite meanings
Dictionary.com

Implies there is a link somewhere
Jargon
De-identified:
 Not a word
 Usually thought to refer to stripping the
18 HIPAA identifiers (including dates)
 So may be more stringent than
anonymous, but also could be coded
or not
Jargon
Anonymous is not de-identified nor coded
Some use the term ‘no identifiers’
Anonymous should be reserved for
situations when there are no identifiers
and no code to link back
Anonymous would allow recording of
dates
Coded



Some code is used to track subjects
and their data
Must be master file listing identifiers
(name) with code to allow decoding,
addition of new data
NEVER store the link with the data
Separate
means
separate!
Jargon




Moveable media: CDs,
diskettes, jump drives,
laptops, palm tops,
Blackberry, flash
drives, thumb drives
Encryption
Secure networks
Password protection
Advice

Do not keep data with identifiers on
moveable media

May become more than just advice
Advice
“Tell them never to
leave their laptops
in the back seat of
the car.”
Kristina Borror,
OHRP
Other methods to secure data





Password protection
Fingerprinting
Auto log-off
Lock-down cables on laptops
Restrictions on downloading
Confidentiality section of the HIC
application





Describe all sites where data will be
used or stored
Describe how the data will be
transmitted or transported
Describe specifically who will have
access
Describe how the data will be secured
If copies of data are on moveable
media, describe security measures for
these media
Sharing with co-investigators


Avoid unprotected email
Coded data best
Destruction


Old data/old computers
Via ITS, Procedure 1609, Media Control:
http://mire.med.yale.edu/hipaapolicies/



When use or retention of any media containing confidential
information (including protected health information) is completed, the
confidential information must be destroyed, rendered unrecoverable,
or returned to the system owner.
The primary means for electronic media reuse is zeroing, or
degaussing and the primary means for electronic media disposal is
zeroing, degaussing, or physical destruction, as applicable to the
medium.
Deleting data or reformatting the disk is NOT sufficient if electronic
media contains electronic Protected Health Information or other
confidential information.
Destruction cont.




Zeroing uses a disk utility (e.g., Data Removal Service
software) to write “zero” to all areas of a disk, thereby
overwriting any data that may be on the disk. Zeroing is
required rather than simply formatting or initializing the disk
which simply marks the disk as blank, so that it only appears
empty - other disk utilities are available that can "unformat" the
disk and recover the data, so formatting/reformatting is not an
acceptable practice.
Degaussing or demagnetizing is a procedure that reduces the
magnetic flux on the disk to virtual zero by applying a reverse
magnetizing field. Degaussing a magnetic storage medium
removes all the data stored on it.
In general, other electronic media (DVD, CD, diskette, zip
drive etc.,) must be physically destroyed to be rendered
unreadable.
Medical campus: use the online instructions or contact the
ITS-Med Help Desk http://its.med.yale.edu/help/
Conclusions



Take steps to develop a specific
document management plan tailored
to the protocol
Take steps to implement data security
measures
Stay tuned!
References



Common Rule:
http://www.hhs.gov/ohrp/humansubjects/guidance/4
5cfr46.htm
ICH GCP:
http://www.fda.gov/ScienceResearch/SpecialTopics/
RunningClinicalTrials/GuidancesInformationsheetsa
ndNotices/default.htm
HIPAA Privacy and Security:
http://info.med.yale.edu/hic/hipaa/index.html

HIC: http://info.med.yale.edu/hic/
Take-Away






If it isn’t documented, it didn’t happen
No one-size-fits-all solution
How do I store my data? Securely!
Bread-crumb trail
Separate means separate
An amendment is an amendment
Download