Health Privacy Issues For Researchers
Health Privacy Issues For Researchers
Health Privacy Issues For Researchers
This module is for educational purposes only. It is not designed to provide legal advice or
legal guidance. You should consult with your organization's attorneys if you have
questions or concerns about the relevant laws and regulations discussed in this module.
Acknowledgements
The author would like to thank the following individuals for their editorial and
content review of this and prior versions: Jaime Arango, Evelyne Bital, Helenemarie
Blake, Joey Casanova, Anita Cava, Amanda Coltes-Rojas, Ken Goodman, Karen
Hansen, Margaret Rankovic, Daniel Smith, and Sally Mann.
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 1/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
Introduction
This module discusses data protection requirements for human subjects research
that creates, obtains, uses, or discloses health data, principally the protections that
derive from the Health Insurance Portability and Accountability Act (HIPAA).
Although HIPAA is the most prominent source, other federal and state laws as well as
professional and accrediting associations also establish requirements associated
with the protection of individual health information. Individuals with access to any
individually identi able health information for any purpose must understand these
constraints. If you use such health information for human subjects research, you
need to know the speci c limitations that apply to that activity, deriving from HIPAA
and other regulations like 45 CFR 46, Subpart A (also known as the Common Rule).
HIPAA's data-focused protections, which took e ect starting in 2003, work together
with the Common Rule and U.S. Food and Drug Administration (FDA) protections;
they are not a replacement. Institutional Review Board (IRB) reviews using Common
Rule and FDA criteria remain as before, including aspects related to data protection.
IRBs may share responsibilities for addressing some of HIPAA's additional
requirements in their reviews when those apply; or some responsibilities may be
allocated to another kind of body that HIPAA permits (a Privacy Board) or to an
institutional o cial that HIPAA requires (a privacy officer). These federal rules and
regulations provide a minimum standard of practice, complemented by states’ and
accreditation bodies’ additional requirements.
Learning Objectives
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 2/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
Describe situations where full HIPAA privacy protections are required, and those
which can qualify for waivers, alterations, or exemptions with more limited
requirements.
Explain the responsibilities of researchers and organizations for meeting HIPAA’s
privacy requirements and for appropriate data security protections that are
necessary to protect privacy.
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 3/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
HIPAA’s protections reach only a subset of individually identi able health information
-- formally called protected health information or simply “PHI” -- created in or by
what HIPAA calls covered entities. Covered entities include individual healthcare
providers, healthcare provider organizations, health plans, and health information
clearinghouses that engage in electronic healthcare transactions (see Health and
Human Services Covered Entity Decision Charts). HIPAA’s protections for PHI extend
to non-U.S. citizens’ data as well.
Some identi able health information used for research originates outside of covered
entities, and so may not be covered by HIPAA. However, you must check with your
organization’s privacy authorities before assuming your situation falls outside
HIPAA’s scope.
HIPAA regulations set requirements for use and disclosure of PHI by covered entities,
and by extension on all members of a covered entity’s workforce that have contact
with PHI. HIPAA’s data protection requirements also apply “in the same manner” to
business associates (and by extension to the workforce of such business associates)
that perform functions using PHI on a covered entity’s behalf.
HIPAA’s rules on use and disclosure are generally “purpose-based” -- that is, the
intended use sets the rules more than the type of data itself. The research rules
discussed here are di erent than those for, say, treatment or treatment-related
payments (relatively liberal), or for marketing or fundraising (relatively strict). A few
types of data, such as psychotherapy notes do receive special protection under
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 4/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
HIPAA. State laws also often have many categories of data with special protections,
with which you should be familiar (or be in contact with an organizational o cial who
has that knowledge).
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 5/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
The regulations are complex. So, as with the covered entity status, a determination
by an organization’s IRB, designated privacy o cial(s), or legal counsel is usually
required to assure that an activity is “not research” and therefore subject to
different HIPAA rules.
A covered entity may choose to rely on an IRB to assess compliance with both the
FDA and Common Rule requirements and HIPAA research requirements.
Alternatively, HIPAA provides that covered entities may create a Privacy Board to
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 6/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
Research subjects, like patients generally, have recourse to both your organization’s
authorities and to federal and state agencies in the event they wish to le complaints
about or have questions regarding an organization's protective efforts.
As with any other planned activity related to protected health information, research
must be mentioned in a privacy notice that HIPAA requires be provided by covered
entities to their patients/customers. The privacy notice must include the ways in
which data subjects may register complaints and report problems, either locally or
with federal authorities. Every researcher should be familiar with their organization’s
privacy notice, particularly the persons or departments it identi es as enforcement
authorities for the organization.
If the data in question meet the de nition of PHI and are being used for purposes
that fall within HIPAA’s de nition of research, HIPAA generally requires explicit
written authorization (consent) from the data subject for research uses.
However, HIPAA allows for research-related access to individuals’ identi able health
data without authorization under certain circumstances:
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 7/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
Data that do not identify individuals can be used for research without speci c
authorization if:
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 8/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
Use or disclosure of the PHI must involve no more than minimal risk to the privacy of
the research subjects, and include the following elements:
An adequate plan to protect any data identi ers from improper use and
disclosure.
An adequate plan to destroy data identi ers at the earliest opportunity consistent
with conduct of the research (unless there is a health or research justi cation for
retaining the identi ers, or such retention is otherwise required by law).
Adequate written assurances that the PHI will not be reused or disclosed to any
other individual or entity, except as required by law for authorized oversight of the
research project, or for other research for which the use or disclosure of PHI
would be permitted by HIPAA.
The research could not practicably be conducted without access to and use of the
PHI.
The research could not practicably be conducted without the waiver or alteration
to the authorization.
More about what counts as a data identifier is provided in the sections below on de-
identi ed data and limited data sets.
HIPAA provides for two more exceptions to the authorization requirement for
identi able data:
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 9/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
In each case, the researcher must make a written or oral representation to the
covered entity’s designated o cials that such access is necessary for the research
purposes -- someone from the IRB, the Privacy Board, or a privacy o cer / designee -
- who would then determine the appropriateness of the request.
Grandfathered Research
If all informed consents and other legal permissions required at the time were in
place before HIPAA took e ect (April 2003 in most cases), and have not changed
since, a new HIPAA authorization is not required even for identi ed data. Obviously,
this is no longer a commonly used pathway to bypass authorizations.
De-identified Data
A researcher may use fully de-identified health data without any authorization from
individual data subjects.
As the name implies, de-identi ed information must have all direct and
indirect identi ers removed, to eliminate (or at least make highly
improbable) re-identi cation using statistical techniques.
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 10/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
De-identi cation trades privacy protection for research productivity. Sometimes the
trade-o is too steep, and a fully de-identi ed data set will not meet a research need.
As an alternative, a covered entity may disclose PHI in a limited data set (LDS) to a
researcher who has entered into an appropriate data use agreement.
A LDS must have all direct identi ers removed; however, it may still include
information that could “indirectly” identify the subject using statistical
methods.
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 11/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
Delineate the permitted uses and disclosures of such information by the recipient,
consistent with the purposes of research;
Limit the individuals that can use or receive the data; and
Require the recipient to agree not to re-identify the data or contact the individuals.
Uses and disclosures of data for research that are allowed to bypass the
authorization requirement are still subject to the minimum necessary standard --
that is, the uses/disclosures must be no more than the minimum required for the
described research purpose. A covered entity may rely on a researcher's
documentation -- or the assessment of an IRB or Privacy Board -- that the
information requested is the minimum necessary for the research purpose.
Disclosure Accounting
When an accounting is required, it must include disclosures during the six years prior
to the data subject’s request, and include certain types of information depending
on the size of the protocol.
While HIPAA may not require it, many organizations will require that researchers
maintain logs of all disclosures from research data collections as a security measure,
including transfers to other individuals within the covered entity. Electronic data
storage will increasingly o er this capability cheaply and automatically; older
collections will require manual logging.
Characteristics of Authorizations
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 13/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
HIPAA authorizations are normally required to have an explicit expiration date. In the
context of research, it is su cient to specify an expiration “event” -- such as “the end
of the study.” A research authorization can also have no expiration date at all, as
would be the case for a research database or repository, or other future use, though
this absence must be clearly indicated.
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 14/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
As with any informed consent document, researchers are strongly urged to rely on
standard models rather than creating their own authorization forms, lest they make
a critical error in format or content. Most organizations will already have standard
documents available; check with your IRB, Privacy Board, or privacy o cer.
If there are multiple documents that limit information use or disclosure, the most
restrictive one applies. Whether in a single instrument or several, the core
requirement is to provide enough information for the data subject to make an
informed choice.
Revocations of Authorizations
Like other kinds of HIPAA authorizations, those for research may be revoked by the
subject at any time, provided that the revocation is in writing. Revocation of an
authorization is not valid to the extent that the covered entity has taken actions
relying on it, such as in the provision of prior treatment. Such revocations may be
limited “as necessary to maintain the integrity of the research study.”
It is still permissible under HIPAA to discuss recruitment into research with patients
for whom such involvement might be appropriate. This common practice is
considered to fall within the de nition of treatment, at least when the conversation is
undertaken by one of the patient's healthcare providers.
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 15/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
HHS guidance on HIPAA has a rmed that recruitment e orts can qualify as a
“preparatory to research” activity that would allow a researcher to identify potential
research participants, and even contact them for purposes of seeking their
authorization (HHS 2004). However, such e orts must be approved, and the PHI used
for this purpose cannot leave the covered entity during this activity.
"Retrospective" Research
Use or disclosure of PHI for retrospective research studies may be done only with
patient authorization -- or with a waiver, alteration, or exception determination from
an IRB or Privacy Board. It should not be di cult to meet one of the criteria for the
latter for such exploratory e orts. Alternatively, the data collection itself may have
been created with an explicit authorization from subjects for future research.
However, remember that you generally cannot proceed on your own without some
approval from an IRB, Privacy Board, or other designated governing entity.
Security Rule
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 16/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
E orts to meet the Common Rule, FDA, and HIPAA regulations’ privacy requirements
are only part of the researcher's task. HIPAA also has a Security Rule that
complements its Privacy Rule. The Security Rule requires that PHI collections receive
appropriate information security protections for as long as they exist. If you do not
know how to do that, nd a resource at your organization that does. In addition to a
privacy o cer, HIPAA requires designation of a security official, who should be able
to help assure appropriate data protection.
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 17/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
BIO HIPAA
Summary
Although the speci cs are lengthy, the net administrative burden that HIPAA adds to
existing Common Rule and FDA regulations is generally not a large one. Compared to
protocol approval generally -- and the details of informed consent particularly -- a
HIPAA authorization is relatively easy. Additionally, as noted, there are several
pathways around the authorization requirement.
To approve a study under the Common Rule and FDA requirements, IRBs have long
been required to determine that there are adequate provisions to protect the privacy
of subjects and to maintain the con dentiality of data. Where researchers are
meeting those requirements, HIPAA should change very little beyond the additional
“paperwork.”
As noted, HIPAA applies to covered entities and their business associates, and to the
PHI that originates in or by them. Research conducted by organizations that do not
qualify as such, using data that does not derive from any covered entity source, are
not reached by HIPAA. In such cases, the requirements of the Common Rule and FDA
remain as protections for human subjects’ privacy and other interests. The issue then
is not "PHI" but what the Common Rule de nes as identi able "private information."
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 18/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
References
Additional Resources
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 19/20
2/5/2020 CITI - Collaborative Institutional Training Initiative
SUPPORT LEGAL
https://www.citiprogram.org/members/index.cfm?pageID=125&intStageID=194193#view 20/20