



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A comprehensive guide for researchers who wish to use individually identifiable health information in their research while complying with the Health Insurance Portability and Accountability Act (HIPAA). It covers the four steps researchers can take to access such information: obtaining authorization from individuals, obtaining a waiver from an Institutional Review Board, obtaining a limited data set with a limited data use agreement, or obtaining a completely deidentified data set. The document also explains the HIPAA Authorization process, the criteria for obtaining a waiver or alteration of an Authorization, the use of limited data sets and limited data use agreements, and the process of deidentification.
What you will learn
Typology: Exams
1 / 5
This page cannot be seen from the preview
Don't miss anything!
The Health Insurance Portability and Accountability Act (HIPAA) protects individuals’ medical records
from unauthorized use. Medical records, however, are often integral to learning more about important
research questions. This guide is intended to serve as a primer for researchers who seek to use medical
records in their research, especially researchers who wish to conduct research with their own clinical
records.
Please note that the standards here apply even where you do not intend to use the identifiable information.
Any time you will have access to individually identifiable health information for research purposes, it
must be in compliance with the HIPAA requirements detailed below.
HIPAA is a lengthy and complex set of statutes and regulations protecting medical records in many
different contexts. The Privacy Rule is a subpart of the broader HIPAA structure, and it specifically
protects the use of individually identifiable health information in research. In order to use this kind of
information in research, investigators can take one of the following four steps:
1.! Obtain authorization for use or disclosure of that information from the individual 2.! Obtain a waiver from the Utah State University Institutional Review Board to access that
information without authorization from the individual
3.! Obtain a limited data set with a limited data use agreement from the covered entity providing the
information
4.! Obtain a completely deidentified data set which is not able to be reidentified based on other
information available to you
Below, we will detail some basics relating to each of these options for using individually identifiable
health information in research.
The HIPAA Authorization process closely mirrors the Informed Consent process required in almost all
Human Subjects Research projects. A HIPAA Authorization (“Authorization”) is a document that
individuals whose medical information you hope to use can sign to grant you legal access to those
records for research purposes.
An Authorization must contain the following elements, and can be combined with your Informed
Consent document:
!! A specific description of the information that will be accessed and used for the research
!! A specific description of who will have access to the aforementioned information
!! A statement that the individuals receiving the protected health information may not be required
to protect the information in the same way that the providing entity must protect it
!! A statement that if the treatment or intervention is being offered only for research purposes,
declining to sign this Authorization may mean that the individual would not receive the
treatment or intervention; OR that the researcher cannot refuse or alter treatment on the basis of
whether the individual signs the Authorization (this depends on the circumstances of the
treatment or intervention)
!! When the authorization expires (this can be “when the research has ended”)
!! A statement that the individual may revoke their Authorization at any time, that the disclosed
information prior to revocation may still be used for the research purposes described previously,
and who the individual should contact to revoke the Authorization
The following elements of an Authorization are optional, but should be included where relevant:
!! Any circumstances where the researcher would be required by law to release the health
information (for example, Tarasoff reporting requirements, child abuse, etc.)
!! That the individual’s information will not be shared in publications or presentations in an
identifiable way
!! That if the information received is later deidentified to HIPAA standards, it can be shared or
disclosed for other purposes
! When, if ever, the records received for research purposes will be made available to the individual
giving Authorization for access
In crafting your Authorization, it is important to note that the Office for Civil Rights requires that
researchers only use the minimum necessary information contained in the individual’s medical records for
research purposes. In most cases, this will not allow researchers to simply receive access to entire
medical records; the information requested and specified in the Authorization must be the minimum
necessary to address the research question.
The Utah State University Institutional Review Board may waive the requirement to obtain an
Authorization if the following three criteria can be demonstrated by the Principal Investigator and
documented by the IRB:
!! The use or disclosure of protected health information involves no more than a minimal risk to the
privacy of individuals;
!! The research could not practicably be carried out without the waiver; AND
!! The research could not practicably be carried out without access to and use of the protected
individually identifiable health information.
Practicability does not mean mere difficulty. Instead, the IRB must make a determination that obtaining
an Authorization presents an “extreme circumstance of expense or difficulty.”
In order to determine whether the use or disclosure involves no more than a minimal risk to the
individuals whose information would be released, HIPAA requires that the PI demonstrate:
!! An adequate plan to protect the identifiers from improper use and disclosure
!! An adequate plan to destroy the identifiers at the earliest opportunity
!! Written assurances to the IRB that the protected health information will not be reused or
disclosed to any other person or entity, or for other research purposes.
o! Not attempt to reidentify or contact the individuals.
Please note that if you are a part of the covered entity releasing PHI under a limited data use agreement
or for any other reason without an Authorization, your entity must maintain records related to those
disclosures. HIPAA requires that, at the request of any individual, the covered entity must account for
all disclosures of their Protected Health Information for the previous six years.
Covered entities may use or disclose health information without restriction under HIPAA if the health
information has been deidentified to HIPAA standards. There are two ways to accomplish this: 1)
removal of all 18 HIPAA identifiers plus the inability to reidentify the data using actual knowledge; or 2)
established statistical methods which allows some of the 18 HIPAA identifiers to remain in place, while
ensuring reidentification risk is virtually impossible.
Removal of all 18 HIPAA identifiers may render otherwise protected health information
unidentifiable, thus permitting its disclosure. Those 18 identifiers are:
! Names
! Geographic subdivisions smaller
than a state (including address, city,
county, precinct, zip codes [except
for the initial three digits if all zip
codes beginning with those numbers
comprise areas with more than 20,
inhabitants or by changing the first
three digits to 000])
!! All elements of dates, including
DOB, admission date, discharge date,
date of death, and all ages or dates
indicative of an age over the age of 89
!! Telephone numbers
!! Fax numbers
! Email addresses
!! Social security numbers
! Medical record numbers
!! Health plan beneficiary numbers
!! Account numbers
!! Certificate or license numbers
!! Vehicle identifiers/serial numbers,
including license plates
!! Device identifiers or serial numbers
!! URLs
!! IP addresses
!! Biometric identifiers including
fingerprints and voiceprints
! Full-face or comparable photographic
images
!! Any other unique identifying number,
characteristic, code, etc.
In addition to the removal of these identifiers, the covered entity can have no actual knowledge
that the information remaining could render the information identifiable. In cases where
researchers are working in their own clinics, for example, you must ensure that the information
remaining could not be matched back to an identifiable medical file. In that case, researchers will
almost always need to use an Authorization, waiver, or limited data use agreement.
A second way to deidentify protected health information to allow its disclosure or use would be
to use established statistical methods, which may allow you to leave certain identifiers above in
the data set. This may be done so long as the statistician is a “person with appropriate knowledge
of and experience with generally accepted statistical and scientific principles and methods for
rendering information not individually identifiable.” That individual must provide a certification
that there is a “very small” risk that the information could be used by the researcher to reidentify
the individual either alone or with the use of other information available to the researcher. The
certification provided must include the methods used to make that determination, and provide
the analysis that justifies the determination. Both the researcher and the covered entity must
maintain that certification for at least six years after the release of the protected health
information.
Successful deidentification of the protected health information may take you outside of the human
subject research oversight requirements if the data are not within your own clinic and they are
deidentified before you receive them. Otherwise, an Exempt 4 application may be appropriate.