SlideShare a Scribd company logo
1 of 11
P R E V E N T I N G F O R C E D D I S C L O S UR E
CERTIFICATES OF
CONFIDENTIALITY
WHAT ARE THEY?
• Authorizations that allow investigators to protect the
privacy of participants taking part in research
activities that involve disclosures about sensitive
topics
• Protects against compulsory disclosure of identifying
information about or identifying characteristics of
research participants
• Exceptions
STATUTORY AUTHORITY
Under section 301(d) of the Public Health Service Act
(42 U.S.C. 241(d)) the Secretary of Health and Human
Services may authorize persons engaged in
biomedical, behavioral, clinical or other research to
protect the privacy of individuals who are the subject
of that research. This authority has been delegated
to the National Institutes of Health.
WHAT IS MEANT BY SENSITIVE
INFORMATION?
• Disclosure of identifying information could have adverse
consequences
• Includes but not limited to:
• Sexual attitudes, preferences, or practices
• Use of alcohol, drugs or other addictive products
• Information pertaining to illegal conduct
• Information that if released, could damage an individual’s
financial standing, employability, or reputation
• Information that if released, might lead to social stigmatization
or discrimination
• Information pertaining to an individual’s psychological well-
being or mental health
• Genetic information, tissue samples, genetic susceptibility or
family pedigree
INELIGIBILITY FOR CERTIFICATES OF
CONFIDENTIALITY
• Not research
• Not collecting personally identifiable information
• Not reviewed and approved by the IRB
• Collecting information that if disclosed would not
significantly harm or damage the participant
HOW TO APPLY FOR A CERTIFICATE OF
CONFIDENTIALITY
• Certificates of Confidentiality are issued by NIH
• Research must be within NIH mission area
• NIH funding is not a condition of application for and receipt
of a Certificate of Confidentiality
• Applications must have
• IRB approval and letter signed by authorized representative
from IRB holding an FWA with applicable assurance
number
• Application Letter
• Informed consent document containing information about
Certificate of Confidentiality and its safeguards
• PI and Institutional Official signatures
APPLICATION LETTER
• On institutional letterhead
• Name and address of institution which granted IRB
approval of research
• Sites where research will be conducted and brief
description of facilities
• Title of the research project
• Source and number of supporting grant, if
applicable
• Name, title, mailing and email addresses, telephone
and fax numbers of PI and other key personnel
APPLICATION CONTINUED
• Brief summary of scientific training of PI and key
personnel
• Beginning and expected end dates of the project
• Concise description of project aims and research
methods
• Description of data security and storage
• Number of subjects to be included in the study
• Description of population
• Source of recruitment
• Methods for protecting subjects’ identities
APPLICATION CONTINUED
• Reason for requesting a Certificate of
Confidentiality
• brief description of sensitive and identifying information to
be collected
• Specific assurances to be inserted verbatim in application
letter
DURATION OF CERTIFICATES OF
CONFIDENTIALITY
• Issued with a specific effective date and expiration
date
• Protection afforded is permanent
• Written requests must be submitted for extensions

More Related Content

Similar to Certificates of Confidentiality

Webinar Slides: Biobanking & Future Research: Addressing the "Unknown" in the...
Webinar Slides: Biobanking & Future Research: Addressing the "Unknown" in the...Webinar Slides: Biobanking & Future Research: Addressing the "Unknown" in the...
Webinar Slides: Biobanking & Future Research: Addressing the "Unknown" in the...Quorum Review - Independent Review Board
 
HIPAA and Confidentiality training
HIPAA and Confidentiality trainingHIPAA and Confidentiality training
HIPAA and Confidentiality trainingLaTanceiaGodfrey
 
HIPAA week1
HIPAA week1HIPAA week1
HIPAA week1wbryant1
 
Hipaa basics.pp2
Hipaa basics.pp2Hipaa basics.pp2
Hipaa basics.pp2martykoepke
 
Mha690 week 1 discusssion 2
Mha690 week 1 discusssion 2 Mha690 week 1 discusssion 2
Mha690 week 1 discusssion 2 Aletha Ratcliff
 
Clinical research ethics and regulation
Clinical research ethics and regulationClinical research ethics and regulation
Clinical research ethics and regulationRoger Watson
 
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...
iHT2 Health IT Summit in Austin 2012 –  Deborah C. Peel, MD, Founder and Chai...iHT2 Health IT Summit in Austin 2012 –  Deborah C. Peel, MD, Founder and Chai...
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...Health IT Conference – iHT2
 
Introduction to clinical research
Introduction to clinical researchIntroduction to clinical research
Introduction to clinical researchAnor Abidin
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Designbradley_g
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsDr Ghaiath Hussein
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsDr Ghaiath Hussein
 
medical proffessionalism
medical proffessionalismmedical proffessionalism
medical proffessionalismmitepajoseph
 
Security compentency s lideshare july 2015
Security compentency s lideshare july 2015Security compentency s lideshare july 2015
Security compentency s lideshare july 2015Patrick Doyle
 
hipaa by roy.pptx
hipaa by roy.pptxhipaa by roy.pptx
hipaa by roy.pptxSubhamRoy63
 

Similar to Certificates of Confidentiality (20)

Webinar Slides: Biobanking & Future Research: Addressing the "Unknown" in the...
Webinar Slides: Biobanking & Future Research: Addressing the "Unknown" in the...Webinar Slides: Biobanking & Future Research: Addressing the "Unknown" in the...
Webinar Slides: Biobanking & Future Research: Addressing the "Unknown" in the...
 
Navigating the IRB
Navigating the IRBNavigating the IRB
Navigating the IRB
 
HIPAA and Confidentiality training
HIPAA and Confidentiality trainingHIPAA and Confidentiality training
HIPAA and Confidentiality training
 
Liza Dawson, "The Common Rule and Research with Data, Big and Small"
Liza Dawson, "The Common Rule and Research with Data, Big and Small"Liza Dawson, "The Common Rule and Research with Data, Big and Small"
Liza Dawson, "The Common Rule and Research with Data, Big and Small"
 
HIPAA week1
HIPAA week1HIPAA week1
HIPAA week1
 
Hipaa basics.pp2
Hipaa basics.pp2Hipaa basics.pp2
Hipaa basics.pp2
 
Mha690 week 1 discusssion 2
Mha690 week 1 discusssion 2 Mha690 week 1 discusssion 2
Mha690 week 1 discusssion 2
 
Clinical research ethics and regulation
Clinical research ethics and regulationClinical research ethics and regulation
Clinical research ethics and regulation
 
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...
iHT2 Health IT Summit in Austin 2012 –  Deborah C. Peel, MD, Founder and Chai...iHT2 Health IT Summit in Austin 2012 –  Deborah C. Peel, MD, Founder and Chai...
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...
 
Healthcare Data Ecosystem 101
Healthcare Data Ecosystem 101Healthcare Data Ecosystem 101
Healthcare Data Ecosystem 101
 
Introduction to clinical research
Introduction to clinical researchIntroduction to clinical research
Introduction to clinical research
 
Erin Rothwell, "Investigator’s Role for Innovative Consent Methods with Biosp...
Erin Rothwell, "Investigator’s Role for Innovative Consent Methods with Biosp...Erin Rothwell, "Investigator’s Role for Innovative Consent Methods with Biosp...
Erin Rothwell, "Investigator’s Role for Innovative Consent Methods with Biosp...
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Design
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical records
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical records
 
medical proffessionalism
medical proffessionalismmedical proffessionalism
medical proffessionalism
 
Security compentency s lideshare july 2015
Security compentency s lideshare july 2015Security compentency s lideshare july 2015
Security compentency s lideshare july 2015
 
GROUP 6-1.pptx
GROUP 6-1.pptxGROUP 6-1.pptx
GROUP 6-1.pptx
 
hipaa by roy.pptx
hipaa by roy.pptxhipaa by roy.pptx
hipaa by roy.pptx
 
INFORMED CONSENT.pptx
INFORMED CONSENT.pptxINFORMED CONSENT.pptx
INFORMED CONSENT.pptx
 

Certificates of Confidentiality

  • 1. P R E V E N T I N G F O R C E D D I S C L O S UR E CERTIFICATES OF CONFIDENTIALITY
  • 2. WHAT ARE THEY? • Authorizations that allow investigators to protect the privacy of participants taking part in research activities that involve disclosures about sensitive topics • Protects against compulsory disclosure of identifying information about or identifying characteristics of research participants • Exceptions
  • 3. STATUTORY AUTHORITY Under section 301(d) of the Public Health Service Act (42 U.S.C. 241(d)) the Secretary of Health and Human Services may authorize persons engaged in biomedical, behavioral, clinical or other research to protect the privacy of individuals who are the subject of that research. This authority has been delegated to the National Institutes of Health.
  • 4. WHAT IS MEANT BY SENSITIVE INFORMATION? • Disclosure of identifying information could have adverse consequences • Includes but not limited to: • Sexual attitudes, preferences, or practices • Use of alcohol, drugs or other addictive products • Information pertaining to illegal conduct • Information that if released, could damage an individual’s financial standing, employability, or reputation • Information that if released, might lead to social stigmatization or discrimination • Information pertaining to an individual’s psychological well- being or mental health • Genetic information, tissue samples, genetic susceptibility or family pedigree
  • 5. INELIGIBILITY FOR CERTIFICATES OF CONFIDENTIALITY • Not research • Not collecting personally identifiable information • Not reviewed and approved by the IRB • Collecting information that if disclosed would not significantly harm or damage the participant
  • 6.
  • 7. HOW TO APPLY FOR A CERTIFICATE OF CONFIDENTIALITY • Certificates of Confidentiality are issued by NIH • Research must be within NIH mission area • NIH funding is not a condition of application for and receipt of a Certificate of Confidentiality • Applications must have • IRB approval and letter signed by authorized representative from IRB holding an FWA with applicable assurance number • Application Letter • Informed consent document containing information about Certificate of Confidentiality and its safeguards • PI and Institutional Official signatures
  • 8. APPLICATION LETTER • On institutional letterhead • Name and address of institution which granted IRB approval of research • Sites where research will be conducted and brief description of facilities • Title of the research project • Source and number of supporting grant, if applicable • Name, title, mailing and email addresses, telephone and fax numbers of PI and other key personnel
  • 9. APPLICATION CONTINUED • Brief summary of scientific training of PI and key personnel • Beginning and expected end dates of the project • Concise description of project aims and research methods • Description of data security and storage • Number of subjects to be included in the study • Description of population • Source of recruitment • Methods for protecting subjects’ identities
  • 10. APPLICATION CONTINUED • Reason for requesting a Certificate of Confidentiality • brief description of sensitive and identifying information to be collected • Specific assurances to be inserted verbatim in application letter
  • 11. DURATION OF CERTIFICATES OF CONFIDENTIALITY • Issued with a specific effective date and expiration date • Protection afforded is permanent • Written requests must be submitted for extensions