Clinicaltrials.gov Registration #:
Provide the registration number for this study, if applicable. See
“HRP-103- Investigator Manual”, under “ClinicalTrials.gov” for more
information.
Important Instructions for Using This Protocol
Template:
This template is provided to help investigators prepare a protocol
that includes the necessary information needed by the IRB to determine
whether a study meets all applicable criteria for approval.
- GENERAL INSTRUCTIONS:
- Prior to completing this protocol, ensure that you are using the
most recent version by verifying the protocol template version date in
the footer of this document with the current version provided in the
CATS IRB Library.
- Do not change the protocol template version date located in the
footer of this document.
- Some of the items may not be applicable to all types of research. If
an item is not applicable, please indicate as such or skip question(s)
if indicated in any of the instructional text.
- GRAY INSTRUCTIONAL BOXES: Type your protocol
responses below the gray instructional boxes of guidance
language. If the section or item is not applicable, indicate not
applicable.
- Do NOT delete the instructional boxes from the final version
of the protocol.
- The protocol should be written in lay language. Do
NOT copy and paste grant proposal information into the
protocol.
- Add the completed protocol template to your study in CATS IRB (http://irb.psu.edu) on the
“Basic Information” page.
- CATS IRB LIBRARY:
- Documents referenced in this protocol template (e.g., SOP’s,
Worksheets, Checklists, and Templates) can be accessed by clicking the
Library link in CATS IRB (http://irb.psu.edu).
- PROTOCOL REVISIONS:
When making revisions to this protocol as requested by the IRB,
please follow the instructions outlined in the guides available in the
Help Center in CATS IRB (http://irb.psu.edu) for using track changes.
Update the Version Date on page 1 each time this document is
submitted to the IRB office with revisions.
If you need help…
All locations:
Human Research Protection Program
Office for Research Protections
101 Technology Center
University Park, PA 16802-7014
Phone: 814-865-1775
Fax: 814-863-8699
Email: irb-orp@psu.edu
https://www.research.psu.edu/irb
Consent Process and
Documentation
Refer to the following materials: - The “HRP-090- SOP - Informed
Consent Process for Research” outlines the process for obtaining
informed consent.
- The “HRP-091– SOP - Written Documentation of Consent” describes how
the consent process will be documented. - The “HRP-314- Worksheet -
Criteria for Approval” section 7 lists the required elements of consent.
- The “HRP-312- Worksheet - Exemption Determination” includes
information on requirements for the consent process for exempt research.
In addition, the CATS IRB Library contains consent guidance and
templates for exempt research. - The CATS IRB library contains various
consent templates for expedited or full review research that are
designed to include the required information. - Add the consent
document(s) to your study in CATS IRB (http://irb.psu.edu). Links to Penn State’s consent
templates are available in the same location where they are uploaded. DO
NOT include the actual consent wording in this protocol.
[Do not type here]
Consent Process
Check all applicable boxes below:
[ ] Informed consent will be sought and documented with a written
consent form [Complete Sections @ref(obtaining-consent) and
@ref(consent-other); If this is the only box checked, mark Sections
@ref(#waive-doc), @ref(altered-consent) and @ref(no-consent) as ‘Not
applicable’]
[ ] Implied or verbal consent will be obtained – subjects will not
sign a consent form (waiver of written documentation of consent)
[Complete Sections 5.2, 5.3 and 5.6; If this is the only box
checked, mark Sections 5.4 and 5.5 as ‘Not applicable’]
[ ] Informed consent will be sought but some of the elements of
informed consent will be omitted or altered (e.g., deception).
[Complete section @ref(obtaining-consent), @ref(altered-consent) and
@ref(consent-other); If this is the only box checked, mark Section
@ref(no-consent) as ‘Not applicable’]
[ ] Informed consent will not be obtained – request to completely
waive the informed consent requirement. [Complete Section
@ref(no-consent); If this is the only box checked, mark Sections
@ref(obtaining-consent), @ref(waive-doc), @ref(altered-consent) and
@ref(consent-other) as ‘Not applicable’]
[ ] Exempt Research: If you believe that the research activities
outlined meet one or more of the criteria outlined in “HRP-312-
Worksheet- Exemption Determination”, check this box. By checking this
box, you are verifying that the exempt consent process will disclose the
following: Penn State affiliation; name and contact information for the
researcher and advisor (if the researcher is a student); the activities
involve research; the procedures to be performed; participation is
voluntary; that there are adequate provisions to maintain the privacy
interests of subjects and the confidentiality of the data.
If the research includes the use of student educational
records include the following language in this section: The
parent or eligible student will provide a signed and dated written
consent that discloses: the records that may be disclosed; the purpose
of the disclosure; the party or class of parties to whom the disclosure
may be made; if a parent or adult student requests, the school will
provide him or her with a copy of the records disclosed; if the parent
of a student who is not an adult so requests, the school will provide
the student with a copy of the records disclosed.
Note: If this box has been checked, mark Sections
@ref(waive-doc), @ref(altered-consent), (no-consent), and
@ref(consent-other) as “Not applicable.” If the
investigator’s assessment is inaccurate, an IRB Analyst will request
revision to the protocol and ask that consent forms and recruitment
materials be submitted. Except for exemptions where
Limited IRB Review is required (see “HRP-312- Worksheet- Exemption
Determination”) or where otherwise requested by the IRB, consent forms
and recruitment materials are generally not reviewed nor approved by the
PSU HRPP for research undergoing exempt review.
Obtaining Informed
Consent
Consent
Process
Describe where and when the consent process will take place.
[Type protocol text here]
Coercion or Undue
Influence during Consent
Describe the steps that will be taken to minimize the possibility of
coercion or undue influence in the consent process.
[Type protocol text here]
Waiver of Written
Documentation of Consent
Review “HRP – 411 – Checklist – Waiver of Written Documentation of
Consent.”
Indicate which of
the following conditions applies to this research
[ ] The research presents no more that minimal risk of harm to
subjects and involves no procedures for which written consent is
normally required outside of the research context.
OR
[ ] The only record linking the subject and the research would be the
consent document and the principal risk would be potential harm
resulting from a breach of confidentiality. Each subject will be asked
whether the subject wants documentation linking the subject with the
research, and the subject’s wishes will govern. (Note: This condition is
not applicable for FDA-regulated research. If this category is chosen,
include copies of a consent form and /or parental permission form for
participants who want written documentation linking them to the
research.)
OR
[ ] If the subjects or legally authorized representatives are members
of a distinct cultural group or community in which signing forms is not
the norm, that the research presents no more than minimal risk of harm
to subjects and provided there is an appropriate alternative mechanism
for documenting that informed consent was obtained. (Note: This
condition is not applicable for FDA-regulated research.)
For distinct cultural groups, describe the alternative mechanism for
documenting that informed consent was obtained.
[Type protocol text here]
Informed consent will
be sought but some of the elements of informed consent will be omitted
or altered (e.g., deception)
Review “HRP-410-Checklist -Waiver or Alteration of Consent Process”
to ensure that you have provided sufficient information.
Indicate why the
research could not practicably be carried out without the omission or
alteration of consent elements
[Type protocol text here or indicate as not applicable]
Describe why the
research involves no more than minimal risk to subjects.
[Type protocol text here or indicate as not applicable]
Describe why the
alteration/omission will not adversely affect the rights and welfare of
subjects.
[Type protocol text here or indicate as not applicable]
Debriefing
Explain whether and how subjects will be debriefed after
participation in the study. If subjects will not be debriefed, provide a
justification for not doing so. Add any debriefing materials to the
study in CATS IRB.
[Type protocol text here or indicate as not applicable]
Informed consent will
not be obtained – request to completely waive the informed consent
requirement
Review “HRP-410-Checklist -Waiver or Alteration of Consent Process”
to ensure that you have provided sufficient information.
Indicate why the
research could not practicably be carried out without the waiver of
consent.
[Type protocol text here or indicate as not applicable]
Describe why the
research involves no more than minimal risk to subjects.
[Type protocol text here or indicate as not applicable]
Describe why the
alteration/omission will not adversely affect the rights and welfare of
subjects.
[Type protocol text here or indicate as not applicable]
Consent – Other
Considerations
Non-English-Speaking Subjects
Indicate what language(s) other than English are understood by
prospective subjects or representatives.
If subjects who do not speak English will be enrolled, describe the
process to ensure that the oral and written information provided to
those subjects will be in that language. Indicate the language that will
be used by those obtaining consent.
Indicate whether the consent process will be documented in writing
with the long form of the consent documentation or with the short form
of the consent documentation. Review “HRP-091 –SOP- Written
Documentation of Consent” and “HRP-103 -Investigator Manual” to ensure
that you have provided sufficient information.
[Type protocol text here or indicate as not applicable]
Cognitively
Impaired Adults
Refer to “HRP-417 -CHECKLIST- Cognitively Impaired Adults” for
information about research involving cognitively impaired adults as
subjects.
Capability of
Providing Consent
Describe the process to determine whether an individual is capable of
consent.
[Type protocol text here or indicate as not applicable]
Adults Unable to
Consent
Describe whether and how informed consent will be obtained from the
legally authorized representative. Describe who will be allowed to
provide informed consent. Describe the process used to determine these
individual’s authority to consent to research.
For research conducted in the state of Pennsylvania, review “HRP-013
-SOP- Legally Authorized Representatives, Children and Guardians” to be
aware of which individuals in the state of Pennsylvania meet the
definition of “legally authorized representative.”
For research conducted outside of the state of Pennsylvania, provide
information that describes which individuals are authorized under
applicable law to consent on behalf of a prospective subject to their
participation in the procedure(s) involved in this research. One method
of obtaining this information is to have a legal counsel or authority
review your protocol along with the definition of “children” in “HRP-013
-SOP- Legally Authorized Representatives, Children, and Guardians.”
[Type protocol text here or indicate as not applicable]
Assent of Adults
Unable to Consent
Describe the process for assent of the subjects. Indicate whether
assent will be required of all, some, or none of the subjects. If some,
indicate which subjects will be required to assent and which will
not.
If assent will not be obtained from some or all subjects, provide an
explanation of why not.
[Type protocol text here or indicate as not applicable]
Subjects who are
not yet adults (infants, children, teenagers)
Parental
Permission
Describe whether and how parental permission will be obtained. If
permission will be obtained from individuals other than parents,
describe who will be allowed to provide permission. Describe the process
used to determine these individual’s authority to consent to each
child’s general medical care.
For research conducted in the state of Pennsylvania, review
“HRP-013-SOP- Legally Authorized Representatives, Children and
Guardians” to be aware of which individuals in the state of Pennsylvania
meet the definition of “children.”
For research conducted outside of the state of Pennsylvania, provide
information that describes which persons have not attained the legal age
for consent to treatments or procedures involved in the research, under
the applicable law of the jurisdiction in which research will be
conducted. One method of obtaining this information is to have a legal
counsel or authority review your protocol along with the definition of
“children” in “HRP-013-SOP- Legally Authorized Representatives,
Children, and Guardians.”
[Type protocol text here or indicate as not applicable]
Assent of
subjects who are not yet adults
Indicate whether assent will be obtained from all, some, or none of
the children. If assent will be obtained from some children, indicate
which children will be required to assent. When assent of children is
obtained describe whether and how it will be documented.
[Type protocol text here or indicate as not applicable]
HIPAA Research
Authorization and/or Waiver or Alteration of Authorization
This section is about the access, use or disclosure of Protected
Health Information (PHI). PHI is individually identifiable health
information (i.e., health information containing one or more 18
identifiers) that is transmitted or maintained in any form or medium by
a Covered Entity or its Business Associate. A Covered Entity is a health
plan, a health care clearinghouse or health care provider who transmits
health information in electronic form. See “HRP-103 -Investigator
Manual” for a list of the 18 identifiers.
If requesting a waiver/alteration of HIPAA authorization, complete
sections 6.2 and 6.3 in addition to section 6.1. The Privacy Rule
permits waivers (or alterations) of authorization if the research meets
certain conditions. Include only information that will be accessed with
the waiver/alteration.
[Do not type here]
Authorization and/or
Waiver or Alteration of Authorization for the Uses and Disclosures of
PHI
[ ] Not applicable, no identifiable protected health information
(PHI) is accessed, used or disclosed in this study. [Mark all parts of
sections 6.2 and 6.3 as not applicable]
[ ] Authorization will be obtained and documented as part of the
consent process. [If this is the only box checked, mark sections 6.2 and
6.3 as not applicable]
[ ] Partial waiver is requested for recruitment purposes only (Check
this box if patients’ medical records will be accessed to determine
eligibility before consent/authorization has been obtained). [Complete
all parts of sections 6.2 and 6.3]
[ ] Full waiver is requested for entire research study (e.g., medical
record review studies). [Complete all parts of sections 6.2 and 6.3]
[ ] Alteration is requested to waive requirement for written
documentation of authorization (verbal authorization will be obtained).
[Complete all parts of sections 6.2 and 6.3]
Waiver or Alteration
of Authorization for the Uses and Disclosures of PHI
Access, use or
disclosure of PHI representing no more than a minimal risk to the
privacy of the individual
Plan to protect
PHI from improper use or disclosure
Include the following statement as written – DO NOT ALTER OR DELETE
unless this section is not applicable because the research does not
involve a waiver of authorization. If the section is not applicable,
remove the statement and indicate as not applicable.
Plan to destroy
identifiers or a justification for retaining identifiers
Describe the plan to destroy the identifiers at the earliest
opportunity consistent with the conduct of the research. Include when
and how identifiers will be destroyed. If identifiers will be retained,
provide the legal, health or research justification for retaining the
identifiers.
[Type protocol text here or indicate as not applicable]
Explanation for why
the research could not practicably be conducted without access to and
use of PHI
Provide reasons why this research could not practicably be carried
out without access to and use of PHI.
[Type protocol text here or indicate as not applicable]
Explanation for why
the research could not practicably be conducted without the waiver or
alteration of authorization
Provide reasons why this research could not practicably be carried
out without the waiver or alternation of authorization.
[Type protocol text here or indicate as not applicable]
Waiver or alteration
of authorization statements of agreement
By submitting this study for review with a waiver of authorization,
you agree to the following statement – DO NOT ALTER OR DELETE unless
this section is not applicable because the research does not involve a
waiver or alteration of authorization. If the section is not applicable,
remove the statement and indicate as not
applicable.
Protected health information obtained as part of this research
will not be reused or disclosed to any other person or entity, except as
required by law, for authorized oversight of the research study, or for
other permitted uses and disclosures according to federal
regulations.
The research team will collect only information essential to the
study and in accord with the ‘Minimum Necessary’ standard (information
reasonably necessary to accomplish the objectives of the research) per
federal regulations.
Access to the information will be limited, to the greatest extent
possible, within the research team. All disclosures or releases of
identifiable information granted under this waiver will be accounted for
and documented.
Risks
List the reasonably foreseeable risks, discomforts, hazards, or
inconveniences to the subjects related the subjects’ participation in
the research. Include as may be useful for the IRB’s consideration, a
description of the probability, magnitude, duration, and reversibility
of the risks. Consider all types of risk including physical,
psychological, social, legal, and economic risks. Note: Loss of
confidentiality is a potential risk when conducting human subject
research and must be listed here. - If applicable, indicate
which procedures may have risks to the subjects that are currently
unforeseeable. - If applicable, indicate which procedures may have risks
to an embryo or fetus should the subject be or become pregnant. - If
applicable, describe risks to others who are not subjects.
[Type protocol text here]
Subject Payment and/or
Travel Reimbursements
Describe the amount, type (cash, check, gift card, other) and timing
of any subject payment or travel reimbursement. If there is
no subject payment or travel reimbursement, indicate as
not applicable.
Extra or Course Credit: Describe the amount of credit
and the available alternatives. Alternatives should be
equal in time and effort to the amount of course or extra credit
offered. It is not acceptable to indicate that the amount of credit is
to be determined or at the discretion of the instructor of the
course.
Approved Subject Pool: Indicate which approved subject pool will be
used; include in response below that course credit will be given and
alternatives will be offered as per the approved subject pool
procedures.
[Type protocol text here or indicate as not applicable]
Confidentiality,
Privacy and Data Management
IMPORTANT: The following section is required for all
locations EXCEPT Penn State Health and the College of Medicine. Penn
State Health and College of Medicine should skip this section and
complete “HRP-598 Research Data Plan Review Form.” In order to avoid
redundancy, for this section state “See the Research Data Plan Review
Form” if you are conducting Penn State Health research. Delete all other
sub-sections of section 22.
For research being conducted at Penn State Health or by
Penn State Health researchers only: The research data security and
integrity plan is submitted using “HRP-598 – Research Data Plan Review
Form.”
In order to avoid redundancy, for this section state “See the
Research Data Plan Review Form” if you are conducting Penn State Health
research. Delete all sub-sections of section 22.
[For all other research]: Complete the following
section. Please refer to PSU Policy AD95 for
information regarding information classification and security standards
and requirements. It is recommended that you work with local IT staff
when planning to store, process, or access data electronically to ensure
that your plan can be carried out locally and meets applicable
requirements. If you have questions about Penn State’s Policy AD95 or
standards or need a consultation regarding data security, please contact
Penn State IT – Information Security at security@psu.edu.
Which of the
following identifiers will be recorded for the research project? Check
all that apply. If none of the following identifiers will be recorded,
do not check any of the boxes.
| Names and/or initials (including on signed consent documents) |
[ ] |
[ ] |
| All geographic subdivisions smaller than a State, including street
address, city, county, precinct, zip code, and their equivalent
geocodes |
[ ] |
[ ] |
| All elements of dates (except year) for dates directly related to an
individual, including birth date, admission date, discharge date, date
of death; and all ages over 89 and all elements of dates (including
year) indicative of such age, except that such ages and elements may be
aggregated into a single category of age 90 or older |
[ ] |
[ ] |
| Telephone numbers |
[ ] |
[ ] |
| Fax numbers |
[ ] |
[ ] |
| Electronic mail addresses |
[ ] |
[ ] |
| Social security numbers |
[ ] |
[ ] |
| Medical record numbers |
[ ] |
[ ] |
| Health plan beneficiary numbers |
[ ] |
[ ] |
| Account numbers |
[ ] |
[ ] |
| Certificate/license numbers |
[ ] |
[ ] |
| Vehicle identifiers and serial numbers, including |
[ ] |
[ ] |
| license plate numbers |
|
|
| Device identifiers and serial numbers |
[ ] |
[ ] |
| Web Universal Resource Locators (URLs) |
[ ] |
[ ] |
| Internet Protocol (IP) address numbers |
[ ] |
[ ] |
| Biometric identifiers, including finger and voice prints |
[ ] |
[ ] |
| Full face photographic images and any comparable images |
[ ] |
[ ] |
| Any other unique identifying number, characteristic, or code (such
as the pathology number) |
[ ] |
[ ] |
| Study code number with linking list |
[ ] |
[ ] |
| Genomic sequence data |
[ ] |
[ ] |
| State ID numbers |
[ ] |
[ ] |
| Passport numbers |
[ ] |
[ ] |
| Driver’s license numbers |
[ ] |
[ ] |
If storing paper
records of research data, answer the following questions:
How will the paper
records be secured?
[Type protocol text here or indicate as not applicable]
How will access to
the paper records be restricted to authorized project personnel?
[Type protocol text here or indicate as not applicable]
If storing
electronic records of research data, indicate where the electronic data
associated with this research study will be stored. Check all that
apply.
[ ] Penn State-provided database application. Check which of the
following database applications are being used (check all that
apply): - [ ] Penn State REDCap - [ ] Other – Specify -
provided and approved database application:
[ ] Penn State, College, or Department IT file server
[ ] Penn State OneDrive or SharePoint
[ ] Penn State GoogleDrive
[ ] Web-based system provided by the sponsor or cooperative group -
Specify URL and contact information:
[ ] Other – Specify the database application or server:
Please visit datastoragefinder.psu.edu
for assistance with identifying appropriate data storage
options. If the software to be used does not appear on that
site, a software
request form must be completed.** If there is a list/key that links
indirect identifiers (code numbers, participant IDs, etc.) to direct
identifiers, that list must not be comingled (i.e.,
stored in the same location) as the identifiable data, including copies
of signed informed consent forms. Additionally, access to that list/key
must be restricted to authorized project personnel.
Is there a list/key
that links code numbers to identifiers?
[ ] Yes - explain how the list that links the code to identifiers is
stored separately from coded data.
The identifiers will be provided voluntarily by respondents and are
linked to their survey responses as long as the identifiers are stored
by the researchers.
[ ] Not applicable, there is no list that links code numbers to
identifiers. Skip to section 22.6.
Is there a list of
people who have access to the list/key?
[ ] Yes – explain how access to that list is restricted and why
certain persons require access.
The PI and co-investigators on the IRB protocol will have access to
the data.
[ ] No – explain why not:
Describe the
mechanism in place to ensure only approved research personnel have
access to the stored research data (electronic and paper).
[ ] Password-protected files [ ] Role-based security
Specify all other mechanisms used to ensure only permitted users have
access to the stored research data:
The use of mobile devices or wireless activity trackers to collect
identifiable research data may have to be approved by Penn State IT -
Information Security.
Will research data
be stored on a mobile device, such as an electronic tablet/cell phone or
will research data be collected on a wireless activity tracker?
[ ] No – skip to 22.8
[ ] Yes - answer the following questions:
Specify the
provider of the tracker or mobile devices(s)
[ ] Supplied by the sponsor
[ ] Penn State owned device
[ ] A personal device
[ ] Other – Please specify source: [Type protocol text here if box is
checked]
Specify the
type(s) of tracker or mobile device(s) that will be used to capture data
and all identifiers captured on the mobile device(s). Please list all
devices, and if more than one, the identifiers to be collected on
each.
[Type protocol text here]
Specify the type
of data collected on the tracker or mobile devices(s).
[Type protocol text here]
Specify the
application or website used to collect the data from the tracker or
mobile device, if applicable.
[Type protocol text here]
Describe the
measures taken to protect the confidentiality of the data collected on
the tracker or mobile device(s). Please address physical security of the
device(s), electronic security, and secure transfer of data from
device(s) to the previously indicated data/file storage location
provided in section 22.3.
The use of online survey tools and email to collect or send research
data containing identifiers that represent more than minimal risk to
subjects may have to be approved by Penn State IT - Information
Security.
Will any research
data be directly entered/sent by subjects over the internet or via email
(e.g., data capture using on-line surveys/questionnaires, surveys via
email, observation of chat rooms or blogs)?
[ ] No – skip to 22.9
[ ] Yes - answer the following questions:
Specify the
identifiers collected over the internet or via email (Including IP
addresses if IP addresses will be collected).
Specify the type
of data collected over the internet or via email.
Describe the
measures taken to protect the confidentiality of the data
collected?
Describe how the
research team will access the data once data collection is
complete.
If the research
involves online surveys, list the name(s) of the service provider(s)
that will be used for the survey(s) (e.g., REDCap, Penn State licensed
Qualtrics, Survey Monkey, Zoomerang)? (Note: The IRB strongly recommends
the use of REDCap for online surveys that obtain sensitive identifiable
human subjects data.)
[ ] Penn State REDCap
[ ] Penn State Qualtrics
[ ] Penn State Microsoft Forms
[ ] Penn State Google Forms
[ ] Other - Please specify: - Application: - URL (If applicable):
Will any type of
recordings (e.g., audio or video) or photographs of the subjects be made
during this study?
[ ] No - skip to section 22.10
[ ] Yes - answer the following questions:
What will be used
to capture the audio/video/images? Give a brief description of
content.
[ ] Audio – Describe the intended content of the audio recording:
[Type protocol text here]
[ ] Video – Describe the intended content of the video recording:
[Type protocol text here]
[ ] Photographs of the subjects – Describe the intended content of
the photographs:
[Type protocol text here]
[ ] 3-D Images – Describe the intended content of the of 3-D
images:
[Type protocol text here]
[ ] Other - Specify:
[Type protocol text here]
How will the
recordings/photographs/images be stored (electronically or
physically)?
[Type protocol text here]
Where will the
recordings/photographs/images be stored?
[Type protocol text here]
Who will have
access to the recordings/photographs/images?
[Type protocol text here]
Will any of the
recordings be transcribed?
[ ] Not applicable
[ ] No
[ ] Yes – indicate who will be doing the transcribing?
[Type protocol text here]
Will the
recordings/photographs be used for purposes other than this research
study?
[ ] No
[ ] Yes - specify purpose(s) (e.g., publication, presentations,
educational training, future undetermined research):
[Type protocol text here]
Certificate of
Confidentiality (COC) - Is the research biomedical, behavioral, clinical
or other research that is funded by the National Institutes of Health
(NIH)?
[ ] Yes - check one of the following: - [ ] The research
involves human subjects as defined by the DHHS regulations (See
Worksheet HRP-310). - [ ] The research involves collecting or using
biospecimens that are identifiable to an individual. - [ ] If
collecting or using biospecimens as part of the research, there is a
small risk that some combination of the biospecimen, a request for the
biospecimen, and other available data sources could be used to deduce
the identity of an individual. - [ ] The research involves the
generation of individual level, human genomic data.
Note: If [any] of the 4 items above are checked, a COC is
automatically issued by NIH and applies to the research. Information
about the COC must be included in the consent form.
[ ] No - answer the following question. - [ ] If the research is
not funded by NIH, will the investigator apply for a COC for this
research study? - [ ] Yes - [x] No
Note: For research not funded by NIH, the IRB may require a
COC if the research is collecting personally identifiable information
and the information is sensitive and/or the research is collecting
information that if disclosed could significantly harm or damage the
subject.
What steps will be
taken to protect subjects’ privacy interests? (Check all that
apply.)
[ ] Identification and recruitment of potential subjects follows
procedures consistent with privacy standards
[ ] Consent discussion and research interventions will take place in
a private setting
[ ] Limiting the information being collected to only the minimum
amount of data necessary to accomplish the research purposes
[ ] Limiting the people with access to the identifiable research data
to the minimum necessary as specified in the application and consent
process
[ ] Other – Specify:
[Type protocol text here]
What is the process
for ensuring correctness of data entry?
[ ] Double data entry to reduce risk of errors
[ ] Electronic edit checks to ensure data being entered are not
obviously incorrect
[ ] Random internal quality and assurance checking of research
data
[ ] Direct entry by subjects
[ ] Other - Specify:
[Type protocol text here]
Does this research
involve the generation of large-scale human genomic data as defined in
NIH Genomic Data Sharing Policy (http://gds.nih.gov)?
[ ] No
[ ] Yes – describe the plan for de-identifying the dataset before
sharing it with NIH-designated data repositories.
[Type protocol text here]
Note: Data sharing with an NIH-designated data repository may
require execution of an institutional certificate. Please review the
‘Institutional Certification for NIH Genomic Data Sharing’ section of
the Investigator’s Manual for information about seeking institutional
certification.
Does this research
involve transfer or disclosure of data and/or specimens to and/or from
Penn State?
[ ] No - skip the remainder of section 22.14
[ ] Yes - answer the following questions:
Check all that apply:
Data are being transferred or disclosed
to Penn State
What is the name of the third party(ies) (the institution, sponsor,
etc.) sending or providing the data?
[Type protocol text here]
Is the third party requiring us to sign a contract regarding the
data?
[ ] No
Data are being transferred or disclosed
from Penn State
What is the name(s) of the third party(ies) (the institution,
sponsor, etc.) receiving or accessing the data?
[Type protocol text here]
Note: Data transfers or disclosures may require a Data Use
Agreement (DUA).
Specimens are being transferred to
Penn State
What is the name(s) of the third party(ies) (the institution,
sponsor, etc.) sending the specimens?
[Type protocol text here]
Specimens are being transferred from
Penn State
What is the name(s) of the third party(ies) (the institution,
sponsor, etc.) receiving the specimens?
[Type protocol text here]
Note: All material transfers, either sending or receiving,
require a Material Transfer Agreement (MTA). Please contact the Office
of Technology Management for more information.
Describe how the
data/specimens will be securely transferred or disclosed to/from the
third party(ies).
[Type protocol text here]
22.14.6 How are
the research data/specimens being transferred from and/or sent to the
third party(ies)? Complete the appropriate section(s) and check all that
apply within each completed section.
22.14.6.1 Data
being transferred or disclosed to Penn State:
[ ] Data are being received in aggregate/metrics (just counts, no
individual data)
[ ] De-identified individual data are being received and there is no
linking list at either institution (no identifiers, or links to
identifiers, such as code numbers)
[ ] Coded research data without any identifiers are being
received and the linking list remains with the entity sending the data;
the recipient of the data will not have access to the linking
list
[ ] Coded research data with identifiers (such as dates
and/or any of the identifiers listed in section 22.14.7 aside from Study
Code) are being received and the linking list remains with the entity
sending the data; the recipient of the data will not have
access to the linking list
[ ] Data with identifiers (such as dates and/or any of the
identifiers listed in section 22.14.7) are being received and the
linking list remains with the entity sending the data; the recipient of
the data will have access to the linking list
[ ] Data with identifiers along with the linking list are
being received
[ ] Other – Specify:
[Type protocol text here if box is checked]
22.14.6.2 Data
being transferred or disclosed from Penn State:
[ ] Data are being sent in aggregate/metrics (just counts, no
individual data)
[ ] De-identified individual data are being sent and there is no
linking list at either institution (no identifiers, or links to
identifiers, such as code numbers)
[ ] Coded research data without any identifiers are being sent
and the linking list remains with the entity sending the data; the
recipient of the data will not have access to the linking
list
[ ] Coded research data with identifiers (such as dates and/or
any of the identifiers listed in section 22.14.7 aside from Study Code)
are being sent and the linking list remains with the entity sending the
data; the recipient of the data will not have access to the
linking list
[ ] Data with identifiers (such as dates and/or any of the
identifiers listed in section 22.14.7) are being sent and the linking
list remains with the entity sending the data; the recipient of the data
will have access to the linking list
[ ] Data with identifiers along with the linking list are
being sent
[ ] Other – Specify:
[Type protocol text here if box is checked]
22.14.6.3
Specimens being transferred or disclosed to Penn State:
[ ] De-identified specimens are being received and there is no
linking list at either institution (no identifiers, or links to
identifiers, such as code numbers)
[ ] Coded specimens without any identifiers are being received
and the linking list remains with the entity sending the specimens; the
recipient of the specimens will not have access to the linking
list
[ ] Coded specimens with identifiers (such as dates and/or any
of the identifiers listed in section 22.14.7 aside from Study Code) are
being received and the linking list remains with the entity sending the
specimens; the recipient of the specimens will not have access to
the linking list
[ ] Coded specimens with identifiers (such as dates and/or any
of the identifiers listed in section 22.14.7) are being received and the
linking list remains with the entity sending the specimens; the
recipient of the specimens will have access to the linking
list
[ ] Coded specimens with identifiers along with the linking
list are being received
Other – Specify:
[Type protocol text here if box is checked]
22.14.6.4
Specimens being transferred or disclosed from Penn State:
[ ] De-identified specimens are being sent and there is no linking
list at either institution (no identifiers, or links to identifiers,
such as code numbers)
[ ] Coded specimens without any identifiers are being sent and
the linking list remains with the entity sending the specimens; the
recipient of the specimens will not have access to the linking
list
[ ] Coded specimens with identifiers (such as dates and/or any
of the identifiers listed in section 22.14.7 aside from Study Code) are
being sent and the linking list remains with the entity sending the
specimens; the recipient of the specimens will not have access to
the linking list
[ ] Coded specimens with identifiers (such as dates and/or any
of the identifiers listed in section 22.14.7) are being sent and the
linking list remains with the entity sending the specimens; the
recipient of the specimens will have access to the linking
list
[ ] Coded specimens with identifiers along with the linking
list are being sent
[ ] Other – Specify:
[Type protocol text here if box is checked]
22.14.7 If
transferring data/specimens with identifiers to or from Penn State,
which of the following identifiers will be included with the
data/specimens? Check all that apply:
| [ ] Names |
[ ] Medical record numbers |
| [ ] Initials |
[ ] Health plan beneficiary numbers |
| [ ] Street address |
[ ] Account numbers |
| [ ] City |
[ ] Certificate/license numbers |
| [ ] Driver’s License numbers |
[ ] Passport numbers |
| [ ] State |
[ ] State ID numbers |
| [ ] Zip Codes |
[ ] Vehicle identifiers and serialnumbers, including license plate
numbers |
| [ ] County |
[ ] Device identifiers and serial numbers |
| [ ] Geocodes |
[ ] Web Universal Resource Locators (URLs) |
| [ ] Precincts |
[ ] Internet Protocol (IP) address numbers |
| [ ] All elements of dates (except year) for dates directly related
to an individual, including birth date, admission date, discharge date,
date of death |
[ ] Biometric identifiers, including finger and voice prints |
| [ ] Ages > 89 and all elements of dates (including year)
indicative of such age, except that such ages and elements may be
aggregated into a single category of age 90 or older |
[ ] Full face photographic images and any comparable images |
| [ ] Telephone numbers |
[ ] Any other unique identifying number, characteristic, or code
(such as the pathology number) Specify: [Type protocol text here if box
is checked] |
| [ ] Fax numbers |
[ ] Study code numbers |
| [ ] Electronic mail addresses |
[ ] Master list linking study code numbers to subject(s) |
| [ ] Social security numbers |
[ ] Genomic sequence data |
|
[ ] Other – specify:[Type protocol text here if box is checked] |