Application for an Off-Site Tissue Banking Waiver at a Non-Profit or Academic Institution
|
|
|
- Hilary Austin
- 9 years ago
- Views:
Transcription
1 Application for an Off-Site Tissue Banking Waiver at a Non-Profit or Academic Institution INSTRUCTIONS This form may be filled in and saved using Adobe Reader version 7.0 or higher. The full version of Adobe Acrobat is not needed. When you have completed the application, please it to the ACOS/R or designated person in your Research Office. The Research Office should forward the application to Kristina Hill in Central Office. Please answer all questions. If a question does not apply, please insert N/A. Additional information that would help us review your application should be added on page 5 in section 9D. Before using this application, make sure that the following apply: The biological specimens will be collected and stored for future research purposes that are beyond the scope of work described in the original protocol and informed consent or the biological specimens will be collected under a protocol designed for banking of specimens. Biospecimens will be banked outside of the VA at a non-profit or academic institution (e.g., university or NIH-sponsored biorepository). The study is sponsored by a non-profit institution or if the study is sponsored by a for-profit company, biospecimens will not be sent to the company. 1. VA MEDICAL CENTER A. Station no. B. Name and location (city, state) 2. VA PRINCIPAL INVESTIGATOR A. Last name, first name B. Degree(s) C. VA paid status D. Telephone E. 3. ACOS FOR RESEARCH AND DEVELOPMENT A. Last name, first name B. Degree(s) C. Telephone D. 4. PERSON COMPLETING THIS FORM A. Last name, first name B. Degree(s) C. Telephone D. VA FORM Page 1 of 7
2 5. TISSUE BANK(S) If biospecimens are going to be stored at more than one tissue bank, please give the name, location, and URL for each. A1. Name of tissue bank A2. Name of 2nd tissue bank, if applicable B1. Location of tissue bank (city, state) B2. Location of 2nd tissue bank, if applicable C1. URL of tissue bank web site C2. URL of 2nd tissue bank, if applicable 6. INFORMATION ABOUT THE STUDY A. Title of the study B. No. of subjects you plan to enroll at this site: C. Study sponsor D. Grant or award no. E. Start date F. End date G1. Are other VA Medical Centers participating in this study? T SURE G2. If Yes, please name the other Centers, if known. Note: Only one application should be submitted for all participating VA Medical Centers. H. Is IRB and R&D Committee approval contingent upon this waiver? 7. INFORMATION ABOUT THE BIOSPECIMENS A. Types(s) of biospecimens collected and banked (e.g., blood, lung tissue, buccal swab, DNA) B. How long will the biospecimens be banked? VA FORM Page 2 of 7
3 C1. Have biospecimens already been sent to the tissue bank named in section 5 above? C2. Are the biospecimens being banked at the VA until the off-site tissue bank is approved? D1. Does the informed consent under which the biospecimens were collected specify that they will be used for future research? D2. If, specify the type of future use (e.g., any study on this disease/condition, any future study, genetic studies, etc.). E1. Will all future uses of VA biospecimens be done through VA-approved protocols? E2. If, provide a clear description of the reasons and the mechanisms used by the bank to distribute biospecimens to researchers, including a description of the oversight. F. How are the biospecimens secured? (locked freezer, locked room, etc.) The biospecimens MUST be labeled with a code that does not contain the subject s name, initials, SSN, or anything derived from the 18 HIPAA identifiers listed on page 6. F. Describe the code used to identify the samples (e.g., bar code or study site number followed by a hyphen and 5 random numbers and letters). Note: Subject s initials are a HIPAA identifier and may not be used as part of the code. VA FORM Page 3 of 7
4 G1. Will the key to the code that links the biospecimens to the subject's identity be maintained ONLY at the VA facility? G2. If, indicate where else a copy of the key will be maintained and why. (Exceptions are not routinely approved.) H1. Who has access to the key? (PI, study coordinator, data coordination center director, etc.) H2. Are any of the people who have access to the key outside of the VA? H3. If, who? (study coordinator, data coordination center director, etc.) I. How is the key secured at all locations? (locked file cabinet, in a password-protected database that is encrypted, etc.) 8. INFORMATION ABOUT THE STUDY DATA A1. Will any data be sent or stored outside of the VA? (Data includes clinical and/or demographic data, as well as x-rays and scans.) (skip to section 9) A2. If, state where and why it needs to be outside the VA. A3. If, will the data be de-identified? (Please see the definition of de-identified on page 6 of this form.) (skip to section 9) B. If data leaving the VA is T de-identified according to the definition on page 6 of this form, it must be transferred in a secure manner. Indicate how the data will be transferred (VPN, encrypted ). VA FORM Page 4 of 7
5 C. If any of the HIPAA identifiers will be stored in an off-site database, the database should have limited access and be encrypted. It should be clearly stated in the HIPAA authorization what will be stored. Social security numbers should T be stored in an off-site database unless required for billing purposes (any other requests will be handled on a case by case basis). Social security numbers may T be stored in a for-profit company's database. 9. ADDITIONAL INFORMATION A. Provide the justification for banking biospecimens at a non-va repository. B. Upon termination/closing of the bank, what will happen to veterans biospecimens? Biospecimens will be destroyed. Biospecimens will be returned to the originating VA facility. Other. Please provide an explanation. C. If the subject withdraws from a study, what will happen to his/her biospecimens and data? Biospecimens will be destroyed except for any de-identified samples that have been shared with other researchers. The research team will continue to use any information that they have already collected from the subject to ensure the integrity of the research. However, no new information will be collected from the subject. Biospecimens and all data linked to that subject will be destroyed. D. Comments (additional information that would help us review your application) VA FORM Page 5 of 7
6 10. DOCUMENTATION The following documentation is required, in addition to this completed form: Research protocol Informed consent form and separate HIPAA authorization Information regarding the bank s policies, mechanisms of tissue acquisition and redistribution, and all oversight mechanisms in place (or complete the Tissue Bank Operations Form). IRB approval letter* R&D Committee approval letter* *If IRB and R&D Committee approval are contingent upon this waiver, these approval letters may be sent to us after ORD has approved this application. 11. RESEARCH OFFICE CONTACT Person in the research office who forwarded this application Last Name, First Name Phone: PI CERTIFICATION By typing his/her name in the space below, the PI verifies that he/she has reviewed this application for accuracy and completeness. 13. SUBMISSION OF APPLICATION Forward this completed application and the documentation listed in section 10 to your Research Office. The Research Office should forward the application to Kristina Hill in Central Office. Electronic applications (via ) are preferred. Kristina Hill, MPH, MT(ASCP) Department of Veterans Affairs Biomedical Laboratory R&D Service (121E) 810 Vermont Avenue, NW Washington, DC [email protected] Phone: Fax: VA FORM Page 6 of 7
7 14. DEFINITIONS HIPAA Identifiers Names and initials All geographic subdivisions smaller than a state All elements of dates (except year) for dates directly related to an individual Telephone numbers Fax numbers addresses Social security numbers or parts of them, scrambled or unscrambled Medical record numbers Health plan beneficiary numbers Account numbers Certificate/license numbers Vehicle identifiers and serial numbers, including license plate numbers Device identifiers and serial numbers Web URLs Internet Protocol (IP) address numbers Biometric identifiers, including fingerprints and voiceprints Full-face photographic image Any other unique identifying number De-identified Data De-identified data is health information that does not identify an individual and there is no reasonable basis to believe that the information can be used to identify an individual. VHA would consider health information no longer protected health information (PHI) if it has been appropriately de-identified in accordance with the HIPAA Privacy Rule as outlined in VHA Handbook , Appendix B. For protected health information to be de-identified, all of the 18 HIPAA identifiers listed above must be removed. HIPAA identifiers also pertain to the person's employer, relatives, and household members. Along with removing the 18 identifiers, HIPAA also states that for the information to be considered de-identified, the entity does not have actual knowledge that the remaining information could be used alone or in combination with other information to identify an individual who is the subject of the information. According to the Common Rule ( deidentification involves removal of all information that would identify the individual or would be used to readily ascertain the identity of the individual. Note: For VA research purposes, VA research data are considered to be de-identified only if they meet the deidentification criteria of BOTH HIPAA (i.e., removal of all 18 identifiers) AND the Common Rule. Note: If the recipient of the biospecimens or the data has access to the key to the code, the coded information is not considered de-identified. VA FORM Page 7 of 7 MARCH 2009
HIPAA COMPLIANCE INFORMATION. HIPAA Policy
HIPAA COMPLIANCE INFORMATION HIPAA Policy Use of Protected Health Information for Research Policy University of North Texas Health Science Center at Fort Worth Applicability: All University of North Texas
Winthrop-University Hospital
Winthrop-University Hospital Use of Patient Information in the Conduct of Research Activities In accordance with 45 CFR 164.512(i), 164.512(a-c) and in connection with the implementation of the HIPAA Compliance
Memorandum. Factual Background
Memorandum TO: FROM: SUBJECT: Chris Ianelli and Jill Mullan, ispecimen, Inc. Kristen Rosati and Ana Christian, Polsinelli, PC ispecimen Regulatory Compliance DATE: January 26, 2014 You have asked us to
Health Insurance Portability & Accountability Act (HIPAA) Compliance Application
Health Insurance Portability & Accountability Act (HIPAA) Compliance Application IRB Office 101 - Altru Psychiatry Center 860 S. Columbia Rd, Grand Forks, North Dakota 58201 Phone: (701) 780-6161 PROJECT
IRB REVIEW OF USE OF RESEARCH REPOSITORIES
IRB Review of Research Data Repositories at the Portland VA Medical Center IRB REVIEW OF USE OF RESEARCH REPOSITORIES 1. PURPOSE: To set policies and procedures for appropriate establishment, review, approval,
HIPAA COMPLIANCE. What is HIPAA?
HIPAA COMPLIANCE What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) also known as the Privacy Rule specifies the conditions under which protected health information may be used
What is Covered by HIPAA at VCU?
What is Covered by HIPAA at VCU? The Privacy Rule was designed to protect private health information from incidental disclosures. The regulations specifically apply to health care providers, health plans,
Background, Definitions, and Requirements for Protecting VA Research Information
Appendix A Background, Definitions, and Requirements for Protecting VA Research Information 1. Additional Background. The ability of investigators to conduct research within the Department of Veterans
Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule
AA Privacy RuleP DEPARTMENT OF HE ALTH & HUMAN SERVICES USA Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule NIH Publication Number 03-5388 The HI Protecting Personal
HIPAA-Compliant Research Access to PHI
HIPAA-Compliant Research Access to PHI HIPAA permits the access, disclosure and use of PHI from a HIPAA Covered Entity s or HIPAA Covered Unit s treatment, payment or health care operations records for
HIPAA POLICY REGARDING DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION AND USE OF LIMITED DATA SETS
HIPAA POLICY REGARDING DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION AND USE OF LIMITED DATA SETS SCOPE OF POLICY: What Units Are Covered by this Policy?: This policy applies to the following units
Standard Operating Procedures for Research Involving Human Subjects
Section I: Introduction v07/2015 Standard Operating Procedures Indiana University and its affiliates are dedicated to protecting the rights and welfare of human participants recruited to participate in
HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets
HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets FULL POLICY CONTENTS Scope Policy Statement Reason for Policy Definitions ADDITIONAL DETAILS Web Address Forms Related Information
HIPAA-G04 Limited Data Set and Data Use Agreement Guidance
HIPAA-G04 Limited Data Set and Data Use Agreement Guidance GUIDANCE CONTENTS Scope Reason for the Guidance Guidance Statement Definitions ADDITIONAL DETAILS Additional Contacts Web Address Forms Related
Department of Veterans Affairs VHA HANDBOOK 1200.12. Washington, DC 20420 March 9, 2009 USE OF DATA AND DATA REPOSITORIES IN VHA RESEARCH
Department of Veterans Affairs VHA HANDBOOK 1200.12 Veterans Health Administration Transmittal Sheet Washington, DC 20420 March 9, 2009 USE OF DATA AND DATA REPOSITORIES IN VHA RESEARCH 1. REASON FOR ISSUE.
How to De-identify Data. Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008
How to De-identify Data Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008 1 Outline The problem Brief history The solutions Examples with SAS and R code 2 Background The adoption
Guidance on Withdrawal of Subjects from Research: Data Retention and Other Related Issues
Office for Human Research Protections (OHRP) Department of Health and Human Services (HHS) Guidance on Withdrawal of Subjects from Research: Data Retention and Other Related Issues This guidance represents
HIPAA and Clinical Research
To Heal. To Teach. To Discover. HIPAA and Clinical Research 2011 Training Jennifer Edlind, UH Privacy Officer Ryan Terry, UH Information Security Officer 1 Agenda Research credentialing overview HIPAA
Health Insurance Portability and Accountability Policy 1.8.4
Health Insurance Portability and Accountability Policy 1.8.4 Appendix C Uses and Disclosures of PHI Procedures This Appendix covers procedures related to Uses and Disclosures of PHI. Disclosures to Law
HIPAA and You The Basics
HIPAA and You The Basics The Purpose of HIPAA Privacy Rules 1. Provide strong federal protections for privacy rights Ensure individual trust in the privacy and security of his or her health information
What is Covered under the Privacy Rule? Protected Health Information (PHI)
HIPAA & RESEARCH What is Covered under the Privacy Rule? Protected Health Information (PHI) Health information + Identifier = PHI Transmitted or maintained in any form (paper, electronic, forms, web-based,
University of Cincinnati Limited HIPAA Glossary
University of Cincinnati Limited HIPAA Glossary ephi System A system that creates accesses, transmits or receives: 1) primary source ephi, 2) ephi critical for treatment, payment or health care operations
RESEARCH INVOLVING DATA AND/OR BIOLOGICAL SPECIMENS
RESEARCH INVOLVING DATA AND/OR BIOLOGICAL SPECIMENS 1. Overview IRB approval and participant informed consent are required to collect biological specimens for research purposes. Similarly, IRB approval
IRB Application for Medical Records Review Request
Office of Regulatory Research Compliance Institutional Review Board FORM B1 : Medial Records Review Application FORM B1 IRB Application for Medical Records Review Request Principal Investigator: Email:
Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law
Everett School Employee Benefit Trust Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law Introduction The Everett School Employee Benefit Trust ( Trust ) adopts this policy
UPMC POLICY AND PROCEDURE MANUAL
UPMC POLICY AND PROCEDURE MANUAL POLICY: INDEX TITLE: HS-EC1807 Ethics & Compliance SUBJECT: Honest Broker Certification Process Related to the De-identification of Health Information for Research and
UPMC POLICY AND PROCEDURE MANUAL
UPMC POLICY AND PROCEDURE MANUAL POLICY: INDEX TITLE: HS-EC1611 Ethics & Compliance SUBJECT: Use and Disclosure of Protected Health Information (PHI) For Research Purposes Pursuant to the HIPAA Privacy
4. No accounting of disclosures is required with respect to disclosures of PHI within a Limited Data Set.
IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Limited Data Sets and Data Use Agreements 10200 POLICY INFORMATION Major Functional Area (MFA): MFA X - Office of General Counsel
Statement of Policy. Reason for Policy
Table of Contents Statement of Policy 2 Reason for Policy 2 HIPAA Liaison 2 Individuals and Entities Affected by Policy 2 Who Should Know Policy 3 Exclusions 3 Website Address for Policy 3 Definitions
Grand Rapids Medical Education Partners Mercy Health Saint Mary s Spectrum Health. Pam Jager, GRMEP Director of Education & Development
Grand Rapids Medical Education Partners Mercy Health Saint Mary s Spectrum Health Pam Jager, GRMEP Director of Education & Development To understand the requirements of the federal Health Information Portability
VENDOR / CONTRACTOR. Privacy Basics
VENDOR / CONTRACTOR Privacy Basics Introduction Premera s mission is to provide our customers with peace of mind about their healthcare. This requires that everyone who works with or for Premera (the Company
De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " "
De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " " D even McGraw " Director, Health Privacy Project January 15, 201311 HIPAA Scope Does not cover all health data Applies
I. INTRODUCTION DEFINITIONS AND GENERAL PRINCIPLE
Final: Approved by Partners Professional and Institutional Conduct Committee 8/11/04 Policy on Transfers to Third Parties Of Tissues, Other Specimens, and Data Obtained by Partners-Affiliated Providers
HIPAA 101: Privacy and Security Basics
HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually
Issues with Tissues. Bertha delanda Celia Molvin/Kevin Murphy Research Compliance Office Stanford University
Issues with Tissues Bertha delanda Celia Molvin/Kevin Murphy Office Stanford University What are Tissues? Organic material removed from a living individual. Including biological samples For example, Blood
LA BioMed Secure Email
INFORMATION SYSTEMS LA BioMed Secure Email Los Angeles Biomedical Research Institute at Harbor-UCLA 1124 W Carson St Bldg E2.5 Phone 310.222.1212 Table of Contents Intended Audience... 1 Purpose... 1 When
The following list consists of a few tips and tricks to use when navigating eirb.
TIPS/TRICKS The following list consists of a few tips and tricks to use when navigating eirb. GENERAL Submitting applications Only the PI can submit applications. However, the Study Coordinator can submit
HIPAA OVERVIEW ETSU 1
HIPAA OVERVIEW ETSU 1 What is HIPAA? Health Insurance Portability and Accountability Act. 2 PURPOSE - TITLE II ADMINISTRATIVE SIMPLIFICATION To increase the efficiency and effectiveness of the entire health
HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant
HIPAA Privacy and Security Rules: A Refresher Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant Objectives Provide overview of Health insurance Portability and Accountability
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS I. Introduction 2 II. Definitions 3 III. Program Oversight and Responsibilities 4 A. Structure B. Compliance Committee C.
The De-identification of Personally Identifiable Information
The De-identification of Personally Identifiable Information Khaled El Emam (PhD) www.privacyanalytics.ca 855.686.4781 [email protected] 251 Laurier Avenue W, Suite 200 Ottawa, ON Canada K1P 5J6
HIPAA Basics for Clinical Research
HIPAA Basics for Clinical Research Audio options: Built-in audio on your computer OR Separate audio dial-in: 415-930-5229 Toll-free: 1-877-309-2074 Access Code: 960-353-248 Audio PIN: Shown after joining
YALE UNIVERSITY RESEARCHER S GUIDE TO HIPAA. Health Insurance Portability and Accountability Act of 1996 Handbook
YALE UNIVERSITY RESEARCHER S GUIDE TO HIPAA Health Insurance Portability and Accountability Act of 1996 Handbook Table of Contents I. INTRODUCTION... 2 What is HIPAA?... 2 What is PHI?... 2 II. HIPAA s
De-Identification of Clinical Data
De-Identification of Clinical Data Sepideh Khosravifar, CISSP Info Security Analyst IV TEPR Conference 2008 Ft. Lauderdale, Florida May 17-21, 2008 1 1 Slide 1 cmw1 Craig M. Winter, 4/25/2008 Background
IRB Month Investigator Meeting April 2014
April 2014 AUDITS TRENDS EMR COMPLIANCE PRACTICES EMR FEDERAL REGULATIONS MONITORING REGULATORY SECURITY THREATS ACADEMI CINA BREACHES REVIEW COMPUTING MOBILE CLOUD HIPAA CENTER OPERATION S RESEARCH C
PROTECTED HEALTH INFORMATION AND THE JHSPH
PROTECTED HEALTH INFORMATION AND THE JHSPH The Health Insurance Portability and Accountability Act (HIPAA) protects individually identifiable health information, or Protected Health Information ( PHI ),
A. HIPAA Privacy Authorizations and Exceptions for Use of Identifiable Protected Health Information
Protected Health Information and the JHSPH The Health Insurance Portability and Accountability Act (HIPAA) protects individually identifiable health information, or Protected Health Information ( PHI ),
Data Driven Approaches to Prescription Medication Outcomes Analysis Using EMR
Data Driven Approaches to Prescription Medication Outcomes Analysis Using EMR Nathan Manwaring University of Utah Masters Project Presentation April 2012 Equation Consulting Who we are Equation Consulting
IRB Policy for Security and Integrity of Human Research Data
IRB Policy for Security and Integrity of Human Research Data Kathleen Hay Human Subjects Protection Office Terri Shkuda Research Informatics & Computing, Information Technology Overview of Presentation
HIPAA Compliance for Students
HIPAA Compliance for Students The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 by the United States Congress. It s intent was to help people obtain health insurance benefits
Central Application Tracking System (CATS) Privacy Impact Assessment (PIA) Version 1.0. April 28, 2013
Central Application Tracking System (CATS) Privacy Impact Assessment (PIA) Version 1.0 April 28, 2013 Prepared by: Office of the Comptroller of the Currency (OCC) Security & Compliance Services (SCS) DOCUMENT
PRIVACY IMPACT ASSESSMENT (PIA) GUIDE
U.S. Securities and Exchange Commission Office of Information Technology Alexandria, VA PRIVACY IMPACT ASSESSMENT (PIA) GUIDE Revised January 2007 Privacy Office Office of Information Technology PRIVACY
Gaston County HIPAA Manual
Gaston County HIPAA Manual Includes Gaston County IT Manual Action Date Reviewed and Revised December 2012 Gaston County HIPAA Policy Manual has be updated and combined with the Gaston County IT Manual.
De-identification Koans. ICTR Data Managers Darren Lacey January 15, 2013
De-identification Koans ICTR Data Managers Darren Lacey January 15, 2013 Disclaimer There are several efforts addressing this issue in whole or part Over the next year or so, I believe that the conversation
2 Applicability: Effective Date: 1/15/2010 Revised: 8/13/2010, 9/10/10, 5/9/14
2 Applicability: Effective Date: 1/15/2010 Revised: 8/13/2010, 9/10/10, 5/9/14 NDSU research may involve the collaboration or assistance of other research institutions, schools, hospitals, clinics, private
Business Associate Agreement
Business Associate Agreement This Agreement is entered into as of ("Effective Date"), between ( Covered Entity ), and ( Business Associate ). RECITALS WHEREAS, Business Associate provides services on behalf
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
STANDARD OPERATING POLICY AND PROCEDURE
STANDARD OPERATING POLICY AND PROCEDURE SUBJECT: Biospecimen Request and Release Policy Number: 500.0 Policy Date: 1/16/2009 Amendment Date: N/A Revision Date: 5-3-2010 I. INTRODUCTION AND PURPOSE The
DEPARTMENT OF VETERANS AFFAIRS MEDICAL CENTER. Oklahoma City, Oklahoma. 02/01/2009 Center Memorandum 151-20
DEPARTMENT OF VETERANS AFFAIRS MEDICAL CENTER Oklahoma City, Oklahoma 02/01/2009 Center Memorandum 151-20 151/DJS:dt CREDENTIALING OF PERSONNEL INVOLVED IN HUMAN SUBJECTS RESEARCH 1. Summary: Center Memorandum
CONSENT TO PARTICIPATE IN A CLINICAL RESEARCH STUDY
The Feinstein Institute for Medical Research North Shore-Long Island Jewish Health System (NS-LIJHS) TITLE OF PROTOCOL: Genetics and Epidemiology of Absolute Pitch and Related Cognitive Traits Principal
Legal Insight. Big Data Analytics Under HIPAA. Kevin Coy and Neil W. Hoffman, Ph.D. Applicability of HIPAA
Big Data Analytics Under HIPAA Kevin Coy and Neil W. Hoffman, Ph.D. Privacy laws and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule can have a significant
University of Hawai i Human Studies Program. Guidelines for Developing a Clinical Research Protocol
University of Hawai i Human Studies Program Guidelines for Developing a Clinical Research Protocol Following are guidelines for writing a clinical research protocol for submission to the University of
Breast Cancer Registry of Greater Cincinnati (BCRGC) APPLICATION for ACCESS to INFORMATION/DATA
Breast Cancer Registry of Greater Cincinnati (BCRGC) APPLICATION for ACCESS to INFORMATION/DATA Application Date: / / 20 Applicant's Name: LAST FIRST MIDDLE INITIAL Study Title: Institutional Affiliation(s)
HIPAA Policies and Procedures
HIPAA Policies and Procedures William T. Chen, MD, Inc. General Rule 164.502 A Covered Entity may not use or disclose PHI except as permitted or required by the privacy regulations. Permitted Disclosures:
Please use your cell phone to access this website: pollev.com/ucsfprivacy
Please use your cell phone to access this website: pollev.com/ucsfprivacy 1 Privacy and Confidentiality Residents and Fellows Orientation 2015 Deborah Yano-Fong, RN, MS, CHPC Chief Privacy Officer June
