The Use of Patient Records (EHR) for Research



Similar documents
What is Covered by HIPAA at VCU?

Societal benefits vs. privacy: what distributed secure multi-party computation enable? Research ehelse April Oslo

Anonymizing Unstructured Data to Enable Healthcare Analytics Chris Wright, Vice President Marketing, Privacy Analytics

Secondary Use of Healthcare Data for Public Health. Leslie Lenert, MD, MS FACMI Director, National Center for Public Health Informatics

EMR Systems and the Conduct of Clinical Research. Daniel E Ford, MD, MPH Vice Dean for Clinical Investigation Johns Hopkins School of Medicine

Synapse Privacy Policy

IRB Month Investigator Meeting April 2014

RESEARCH INVOLVING DATA AND/OR BIOLOGICAL SPECIMENS

THE STATE OF DATA SHARING FOR HEALTHCARE ANALYTICS : CHANGE, CHALLENGES AND CHOICE

Client Privacy Notice (HIPAA)

Table of Contents. Page 1

Genomics and Health Data Standards: Lessons from the Past and Present for a Genome-enabled Future

EGUIDE BRIDGING THE GAP BETWEEN HEALTHCARE & HIPAA COMPLIANT CLOUD TECHNOLOGY

Georgia Immunization Registry (GRITS)

Remote Monitoring of Clinical Trials and EMRs

IMPROPER USE OF MEDICAL INFORMATION

Accelerating Clinical Trials Through Shared Access to Patient Records

Health Information Technology Backgrounder

Human Subjects Research (HSR) Series

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information

Towards a National Framework for the Secondary Use of Health Data

Hollie Goddard Sr. IRB Coordinator McKesson Specialty Health

Implementing Honest Broker System(s) in Academic Medical Centers: The Pittsburgh Experience

Health Information Technology: A Key Component of Health Reform

BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION

Secondary Uses of Health Data IMPAC s Oncology Data Alliance Program

WHEN I WANT TO: I NEED TO SUBMIT: {for CIRB studies, see the specific FAQ}

THE STATE OF HEALTHCARE COMPLIANCE: Keeping up with HIPAA, Advancements in EHR & Additional Regulations

Effective Date of This Notice: September 1, 2013

MED 2400 MEDICAL INFORMATICS FUNDAMENTALS

BUSINESS ASSOCIATE AGREEMENT

HIPAA-Compliant Research Access to PHI

Reproductive Medicine Associates of New Jersey, LLC

Health Data Governance: Privacy, Monitoring and Research - Policy Brief

1.2: DATA SHARING POLICY. PART OF THE OBI GOVERNANCE POLICY Available at:

Use of Electronic Health Records in Clinical Research: Core Research Data Element Exchange Detailed Use Case April 23 rd, 2009

Chapter 15 The Electronic Medical Record

Notice of Privacy Practices Walter L Cohen High School School-based Health Center. Effective as of August 6, 2004

Using EHRs to extract information, query clinicians, and insert reports

Joe Dylewski President, ATMP Solutions

BUSINESS ASSOCIATE AGREEMENT

Notice of Privacy Practices

Conroe Physician Associates. Patient Consent Form. I fully understand that this is given in advance of any specific diagnosis or treatment.

THE LAW. Legal Issues in School Nursing. Legal Foundations

A Tech Entrepreneur Meets Academic Pathology

Global Policy on Interactions with Healthcare Professionals

NOTICE OF PRIVACY PRACTICES TEMPLATE. Sections highlighted in yellow are optional sections, depending on if applicable

Use of Electronic Health Record Data in Clinical Investigations

HIPAA and Big Data Twenty Third National HIPAA Summit. March 17, 2015 Mitchell W. Granberg, Optum Chief Privacy Officer

Privacy, Security, and Trust with Federated Identity Management

Policy Brief: Protecting Privacy in Cloud-Based Genomic Research

DEPARTMENTAL POLICY. Northwestern Memorial Hospital

Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule

Adopting an EHR & Meaningful Use

SAFER Guides: Safety Assurance Factors for EHR Resilience

State University of New York at Canton Institutional Review Board. Sample Informed Consent Document

HIPAA Privacy & Security Training for Clinicians

Medweb Telemedicine 667 Folsom Street, San Francisco, CA Phone: Fax:

Orientation Manual for Clinical Research Coordinators

HODGES UNIVERSITY SCHOOL OF ALLIED HEALTH MASTER OF SCIENCE IN HEALTH ADMINISTRATION

HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI

APPENDIX 1: Frequently Asked Questions

The Patient Portal Ecosystem: Engaging Patients while Protecting Privacy and Security

Virtual Lifetime Electronic Record (VLER) Health Information Exchange in the Department of Veterans Affairs (VA)

Transcription:

The Use of Patient Records (EHR) for Research Mary Devereaux, Ph.D. Director, Biomedical Ethics Seminars Assistant Director, Research Ethics Program & San Diego Research Ethics Consortium

Abstract The growing availability of electronic medical records, and large databases of health information such as EPIC, afford researchers a range of opportunities. Computerized searches of large troves of de-identified patient medical information promise a better understanding of disease patterns, treatment efficacy, and the contribution of genetic and other factors in health. These possibilities, however, raise a number of ethical, legal, and regulatory challenges.

Challenges What does de-identification mean? Can it be done, and with what assurance? Do patients own their medical information with the right to refuse consent for its use or is such information a shared social resource available to all? What are the responsibilities of biomedical researchers using EHRs and what does the IRB require?

4 Aims To outline ethical challenges in gathering, accessing, and using personal patient information for non-clinical purposes, i.e., secondary use To understand the risks and benefits of secondary use of patient data To apply principles of medical ethics to medical informatics, e.g., research with aggregate patient data and/or data mining To discuss how best to meet these challenges, protecting patient rights and promoting research access.

5 First, two distinctions Research vs. Patient care Primary vs. Secondary Use

6 Research vs. patient care Key distinction

7 Original Use: Patient care Clinicians gather personal patient information to prevent, diagnose and treat disease and advance patient health. Collection of data Family history Lab tests Record of procedures Insurance status Compliance, e.g., prescriptions filled What else gets collected?

8 Secondary Use Defined as Non-direct care use of personal health information (PHI) including but not limited to analysis, research, quality/ safety measurement, public health, payment, provider certification or accreditation, and marketing and other business including strictly commercial activities. Safran et al. Toward a National Framework for the Secondary Use of Health Data: An American Medical Informatics Association White Paper, JAMA 2007 14, 2, fn 1.

9 Examples of Primary vs. Secondary Use Dr. Welby, a community pediatrician, keeps meticulous records on his patients, including data on infant height, weight, and head circumference; immunizations, and so on. She instructs the office nurse to call patients whose children are due for physical exams or vaccinations. A university research team designs and receives IRB approval and funding for a study of emergency medical treatment across the US. They approach the Center for Disease Control and Prevention and request a scrubbed copy of the agency s BioSense data. Safran et al. 2007

Challenges of replacing paper records Paper Records One record One place Limited access Relative ease of control Limited usefulness Electronic Medical Records Many copies Stored here, there, cloud Easy to access Security risks high Extreme usefulness

11 Familiar Arguments for EMR Benefits Improved healthcare delivery Consistent care across providers More access and control Greater efficiency and lower cost Research possibilities of EPIC, national databanks, international databanks

12 Value of Aggregated Health Data Large scale studies of disease trends, public health, outcomes, etc. Expand basic knowledge Improve patient care Increase healthcare system safety and efficiency Lower costs Documenting inequities in care or reimbursement Other?

But also challenges... 13

Familiar issues PRIVACY SECURITY

15 Privacy Who has control of what goes into the record? Who has access? Who should have access? In what circumstances and for what purposes? What penalties for breaches? HIPAA limitations covered entities may disclose de-identified patient information

16 Patient Data Protections Like the rest of clinical medicine, record keeping governed by principles of medical ethics Respect for persons/autonomy, Beneficence (do good and minimize harm), Justice (treat fairly) Also protected by professional guidelines and the law Right to privacy - includes medical records Professional guidelines regarding patient confidentiality HIPAA Privacy Rule re: research

Updated HIPAA Authorization As of September 23, 2013, newly enrolled participants who need to sign a HIPAA authorization must "opt-in" to allow the use of their PHI for optional sub-studies and future secondary use of personal health information (PHI). The HIPAA authorization has been updated to include a checkbox to indicate that the participant has agree to allow information to be disclosed for the additional optional research activities explained in the informed consent process. http://irb.ucsd.edu

Secondary Use of Existing Data Requires IRB Approval or Certificate of Exemption Reminder: Investigators and study staff are reminded that the secondary use of existing data/specimens, including review of existing medical records, student records, accessing computer databases that have been produced from previous studies, etc., requires IRB approval or Certification of Exemption from IRB review. http://irb.ucsd.edu

19 Technical Protections Is technology the solution? Other means of ensuring privacy De-identification Encryption Controlled access Other technical strategies/tools? Necessity for re-identification for some research uses undermines promise of anonymity

20 Security Is any system really safe? Cost Quality of system installed Why do we care about security? What s the big deal about privacy? For patients Doctors Society

21 Beyond Privacy & Security

22 AMIA Identified Issues Public awareness and trust Patients, providers and larger public unaware of benefits and risks of secondary use Ownership and access Who owns health data and who has the right to access and for what purposes? Control Do patients have the right to audit or put other health constraints on the use of their data, even after anonymization?

23 Public awareness and trust Dr./patient relationship based on confidentiality Secondary use is widespread, but providers, physicians, and their patients are generally unaware of this development... Safran et al, p. 5

24 AMIA Recommendation 1 Transparent policies and practices for a start Policies may need to be updated as technology evolves through data life cycles. Acknowledge complexity of process As re-identification of patients remains a possibility, various stake-holders need a place at the table. Ongoing public policy discussions must explicitly and directly address the secondary use of health data.

25 Increased Transparency Consumers willing to share private information for health research Small 2010 Boston study showed support for sharing, especially among the young, healthy, and students, or during public health emergencies Willingness increased with anonymity, research use, engagement with a trusted intermediary, transparency, and payment. Weitzman, ER, et al, (2010) J Med Internet Res 12 (2) E 14.

26 Recommendation 3, 4 Discussion and consensus building Increase public awareness with public education Create taxonomy of secondary uses of health data to clarify societal, public policy, legal, and technical issues.

Discussion 27

28 Ownership and Access Secondary use of private patient information poorly monitored. Patients may have reason to worry Should we adopt opt in rather than opt out models? Should patients have the right to control what information goes public and for what use? Is such a system technically and practically feasible?

29 Control If my information is acquired with my consent and de-identified and held securely, do I have any further rights over what is done with it? Do I have the right to audit my information? May I specify for what kind of research it may be used? Curtailing insurance benefits? Developing programs of bioterrorism? Publishing community health profiles?

30 Sources Safran et al. Toward a National Framework for the Secondary Use of Health Data: An American Medical Informatics Association White Paper, JAMA 2007 14, 2. AMIA White Paper, Charles Safran, Meryl Bloomrosen, W Edward Hammond, et al. JAMIA 2007, 14 1-9 Sharing Medical Data for Health Research: The Early Personal Health Record Experience, Elissa R Weitzman, Liljana Kaci, and Kenneth D Mandi, J Med Internet Res 2010 April-June; 12(2); e14. US Dept. of Health and Human Services: Health Information Privacy: Research http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/ research.html