03.08.2013 Views

Public Health Law Map - Beta 5 - Medical and Public Health Law Site

Public Health Law Map - Beta 5 - Medical and Public Health Law Site

Public Health Law Map - Beta 5 - Medical and Public Health Law Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• An adequate plan to protect health information identifiers from<br />

improper use <strong>and</strong> disclosure.<br />

• An adequate plan to destroy identifiers at the earliest opportunity<br />

consistent with conduct of the research (absent a health or research<br />

justification for retaining them or a legal requirement to do so).<br />

• Adequate written assurances that the PHI will not be reused or<br />

disclosed to (shared with) any other person or entity, except as<br />

required by law, for authorized oversight of the research study, or for<br />

other research for which the use or disclosure of the PHI would be<br />

permitted under the Privacy Rule.<br />

• The research could not practicably be conducted without the waiver or<br />

alteration.<br />

• The research could not practicably be conducted without access to <strong>and</strong> use<br />

of the PHI.<br />

The Privacy Rule does not require an IRB or Privacy Board to review the form<br />

or content of the Authorization a researcher or covered entity intends to use, or<br />

the proposed uses <strong>and</strong> disclosures of PHI made according to an Authorization.<br />

Under the Privacy Rule, an IRB or Privacy Board need only review requests to<br />

waive or alter the Authorization requirement.[HIPAA Research at 17.]<br />

b) Issues Raised by Unauthorized Access<br />

These st<strong>and</strong>ards recognize that there are situations where the individual's right to<br />

control his/her PHI is overridden by society's need for the that individual's PHI for<br />

research that will benefit others. In theory, these exceptions should be as narrow as<br />

possible, <strong>and</strong> the information should be carefully protected from further disclosure.<br />

The identifiers should be destroyed as soon as they are no longer needed, absent<br />

specific reasons to retain them. There are two problems with these st<strong>and</strong>ards which<br />

raise troubling questions. First, there is no review of the underlying importance of<br />

the research being done. There is no balancing between the value of the research<br />

<strong>and</strong> the individual's privacy: any research can qualify for a waiver or modification<br />

of the authorization requirements, without regard to its merits. Second, the IRB or<br />

Privacy Board does not review the actual authorization that will be used. It is only<br />

required to decide whether a waiver or modification is allowable, but it is the<br />

researchers who get to decide what the form will look like. Since this provision<br />

does not prohibit IRBs or Privacy Boards from reviewing these modified forms, it<br />

is anticipated that they will get some review to assure that they really meet the<br />

representations made to the IRB or Privacy Board.<br />

4. Designing Research Studies<br />

Before HIPAA, researchers were often given access to patient records to review<br />

361

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!