Protocol Title:

Provide the full title of the study as listed in item 1 on the “Basic Information” page in CATS IRB (http://irb.psu.edu).

Principal Investigator:

Name:

Department:

Telephone:

E-mail Address:

Version Date:

Provide a version date for this document. This date must be updated each time this document is submitted to the IRB office with revisions. DO NOT revise the version date in the footer of this document.

Clinicaltrials.gov Registration #:

Provide the registration number for this study, if applicable. See “HRP-103- Investigator Manual”, under “ClinicalTrials.gov” for more information.

Important Instructions for Using This Protocol Template:

This template is provided to help investigators prepare a protocol that includes the necessary information needed by the IRB to determine whether a study meets all applicable criteria for approval.

  1. GENERAL INSTRUCTIONS1:
  • Prior to completing this protocol, ensure that you are using the most recent version by verifying the protocol template version date in the footer of this document with the current version provided in the CATS IRB Library.
  • Do not change the protocol template version date located in the footer of this document.
  • Some of the items may not be applicable to all types of research. If an item is not applicable, please indicate as such or skip question(s) if indicated in any of the instructional text.
  • GRAY INSTRUCTIONAL BOXES: Type your protocol responses below the gray instructional boxes of guidance language. If the section or item is not applicable, indicate not applicable.
  • Do NOT delete the instructional boxes from the final version of the protocol.
  • The protocol should be written in lay language. Do NOT copy and paste grant proposal information into the protocol.
  • Add the completed protocol template to your study in CATS IRB (http://irb.psu.edu) on the “Basic Information” page.
  1. CATS IRB LIBRARY:
  • Documents referenced in this protocol template (e.g., SOP’s, Worksheets, Checklists, and Templates) can be accessed by clicking the Library link in CATS IRB (http://irb.psu.edu).
  1. PROTOCOL REVISIONS:
  • When making revisions to this protocol as requested by the IRB, please follow the instructions outlined in the guides available in the Help Center in CATS IRB (http://irb.psu.edu) for using track changes.

  • Update the Version Date on page 1 each time this document is submitted to the IRB office with revisions.

If you need help…

All locations:

Human Research Protection Program

Office for Research Protections

101 Technology Center
University Park, PA 16802-7014
Phone: 814-865-1775
Fax: 814-863-8699
Email: irb-orp@psu.edu

https://www.research.psu.edu/irb

1 Objectives

1.1 Study Objectives

Describe the purpose, specific aims, or objectives.

The purpose of this study is to investigate knowledge about Open Science and its practices among graduate students, postdocs, teaching faculty, research staff, research faculty, and administrators. Open Science is a growing movement to make research more transparent, to share data and code, and to publish in venues that are accessible to all. We aim to understand what our colleagues at Penn State know about Open Science as practiced in their fields. We are also interested in learning what barriers respondents find in their adoption of these practices.

[Type protocol text here]

1.2 Primary Study Endpoints

State the primary endpoints to be measured in the study.

Research typically has a primary objective or endpoint. Additional objectives and endpoints are secondary. The endpoints (or outcomes), determined for each study subject, are the quantitative measurements required by the objectives. Measuring the selected endpoints is the goal of a trial (examples: response rate and survival).

[Type protocol text here or indicate as not applicable]

1.3 Secondary Study Endpoints

State the secondary endpoints to be measured in the study.

[Type protocol text here or indicate as not applicable]

2 Background

2.1 Scientific Background and Gaps

Describe the scientific background and gaps in current knowledge. For clinical research studies being conducted at Penn State Health/Penn State College of Medicine, and for other non-PSH locations as applicable, describe the treatment/procedure that is considered standard of care (i.e., indicate how patients would be treated in non-investigational setting); and if applicable, indicate if the study procedure is available to patient without taking part in the study.

[Type protocol text here]

2.2 Previous Data

Describe any relevant preliminary data.

[Type protocol text here]

2.3 Study Rationale

Provide the scientific rationale for the research.

[Type protocol text here]

3 Inclusion and Exclusion Criteria

Create a numbered list below in sections @ref(inclusion-criteria) and @ref(exclusion-criteria) of criteria subjects must meet to be eligible for study enrollment (e.g., age, gender, diagnosis, etc.).

Vulnerable Populations:

You MAY NOT include members of these populations as subjects in your research unless you indicate this in your inclusion criteria because specific regulations apply to studies that involve vulnerable populations.

The checklists referenced below outline the determinations to be made by the IRB when reviewing research involving these populations. Review the checklists as these will help to inform your responses throughout the remainder of the protocol.

  • Children –Review “HRP-416- Checklist - Children”
  • Pregnant Women – Review “HRP-412- Checklist - Pregnant Women”
  • Cognitively Impaired Adults- Review “HRP-417- Checklist - Cognitively Impaired Adults”
  • Prisoners- Review “HRP-415- Checklist - Prisoners”
  • Neonates of uncertain viability or non-viable neonates- Review “HRP-413- Checklist - Non-Viable Neonates” or “HRP-414- Checklist - Neonates of Uncertain Viability”

[Do not type here]

3.1 Inclusion Criteria

Create a numbered list of the inclusion criteria that define who will be included in your final study sample (e.g., age, gender, condition, etc.)

[Type protocol text here]

3.1.1 Does this research involve collecting data from individuals residing outside of the US?

[ ] No
[ ] Yes – identify the countries where data collection will take place

[Type protocol text here]

3.2 Exclusion Criteria

Create a numbered list of the exclusion criteria that define who will be excluded in your study.

[Type protocol text here]

3.3 Early Withdrawal of Subjects

3.3.1 Criteria for removal from study

Insert subject withdrawal criteria (e.g., safety reasons, failure of subject to adhere to protocol requirements, subject consent withdrawal, disease progression, etc.).

[Type protocol text here or indicate as not applicable]

3.3.2 Follow-up for withdrawn subjects

Describe when and how to withdraw subjects from the study; the type and timing of the data to be collected for withdrawal of subjects; whether and how subjects are to be replaced; the follow-up for subjects withdrawn from investigational treatment.

[Type protocol text here or indicate as not applicable]

4 Recruitment Methods

  • Upload recruitment materials for your study in CATS IRB (http://irb.psu.edu). DO NOT include the actual recruitment wording in this protocol.
  • StudyFinder: If StudyFinder (http://studyfinder.psu.edu) is to be used for recruitment purposes, separate recruitment documents do not need to be uploaded in CATS IRB. The necessary information will be captured from the StudyFinder page in your CATS IRB study.
  • Any eligibility screening questions (verbal/phone scripts, email, etc.) used when contacting potential participants must be uploaded to your study in CATS IRB (http://irb.psu.edu).

[Do not type here]

4.1 Identification of subjects

Describe the source of subjects and the methods that will be used to identify potential subjects (e.g., organizational listservs, established recruitment databases, subject pools, medical or school records, interactions during a clinic visit, etc.). If not recruiting subjects directly (e.g., database query for eligible records or samples) state what will be queried, how and by whom.

StudyFinder:

  • If you intend to use StudyFinder (http://studyfinder.psu.edu) for recruitment purposes, include this method in this section.
  • Information provided in this protocol, including the description of study procedures, compensation, and recruitment, needs to be consistent with information provided on the StudyFinder page in your CATS IRB study.

For Penn State Health submissions using Enterprise Information Management (EIM) for recruitment, and for non-Hershey locations as applicable, attach your EIM Design Specification form in CATS IRB (http://irb.psu.edu). See “HRP-103- Investigator Manual, Study Recruitment” for additional information.

DO NOT include the actual recruitment material or wording in this protocol.

[Type protocol text here]

4.2 Recruitment process

Describe how potential subjects first learn about this research opportunity or indicate as not applicable if subjects will not be prospectively recruited to participant in the research. Subject recruitment can involve various methods (e.g., approaching potential subjects in person, contacting potential subjects via email, letters, telephone, ResearchMatch, or advertising to a general public via flyers, websites, StudyFinder, newspaper, television, and radio etc.). DO NOT include the actual recruitment material or wording in this protocol.

[Do not type here]

4.2.1 How potential subjects will be recruited

[Type protocol text here or indicate as not applicable]

4.2.2 Where potential subjects will be recruited

[Type protocol text here or indicate as not applicable]

4.2.3 When potential subjects will be recruited

[Type protocol text here or indicate as not applicable]

4.2.4 Describe the eligibility screening process. Screening begins when the investigator obtains information about or from a prospective participant in order to determine their eligibility.

[ ] Eligibility screening is occurring before consent2
[ ] Eligibility screening is occurring after consent
[ ] Consent is not being obtained in this research
[ ] Not applicable - Eligibility screening is not being done in this research.

[Type protocol text here]

6 HIPAA Research Authorization and/or Waiver or Alteration of Authorization

This section is about the access, use or disclosure of Protected Health Information (PHI). PHI is individually identifiable health information (i.e., health information containing one or more 18 identifiers) that is transmitted or maintained in any form or medium by a Covered Entity or its Business Associate. A Covered Entity is a health plan, a health care clearinghouse or health care provider who transmits health information in electronic form. See “HRP-103 -Investigator Manual” for a list of the 18 identifiers.

If requesting a waiver/alteration of HIPAA authorization, complete sections 6.2 and 6.3 in addition to section 6.1. The Privacy Rule permits waivers (or alterations) of authorization if the research meets certain conditions. Include only information that will be accessed with the waiver/alteration.

[Do not type here]

6.1 Authorization and/or Waiver or Alteration of Authorization for the Uses and Disclosures of PHI

Check all that apply:

[ ] Not applicable, no identifiable protected health information (PHI) is accessed, used or disclosed in this study. [Mark all parts of sections 6.2 and 6.3 as not applicable]

[ ] Authorization will be obtained and documented as part of the consent process. [If this is the only box checked, mark sections 6.2 and 6.3 as not applicable]

[ ] Partial waiver is requested for recruitment purposes only (Check this box if patients’ medical records will be accessed to determine eligibility before consent/authorization has been obtained). [Complete all parts of sections 6.2 and 6.3]

[ ] Full waiver is requested for entire research study (e.g., medical record review studies). [Complete all parts of sections 6.2 and 6.3]

[ ] Alteration is requested to waive requirement for written documentation of authorization (verbal authorization will be obtained). [Complete all parts of sections 6.2 and 6.3]

6.2 Waiver or Alteration of Authorization for the Uses and Disclosures of PHI

6.2.1 Access, use or disclosure of PHI representing no more than a minimal risk to the privacy of the individual

6.2.1.1 Plan to protect PHI from improper use or disclosure

Include the following statement as written – DO NOT ALTER OR DELETE unless this section is not applicable because the research does not involve a waiver of authorization. If the section is not applicable, remove the statement and indicate as not applicable.

6.2.1.2 Plan to destroy identifiers or a justification for retaining identifiers

Describe the plan to destroy the identifiers at the earliest opportunity consistent with the conduct of the research. Include when and how identifiers will be destroyed. If identifiers will be retained, provide the legal, health or research justification for retaining the identifiers.

[Type protocol text here or indicate as not applicable]

6.2.2 Explanation for why the research could not practicably be conducted without access to and use of PHI

Provide reasons why this research could not practicably be carried out without access to and use of PHI.

[Type protocol text here or indicate as not applicable]

6.2.3 Explanation for why the research could not practicably be conducted without the waiver or alteration of authorization

Provide reasons why this research could not practicably be carried out without the waiver or alternation of authorization.

[Type protocol text here or indicate as not applicable]

6.3 Waiver or alteration of authorization statements of agreement

By submitting this study for review with a waiver of authorization, you agree to the following statement – DO NOT ALTER OR DELETE unless this section is not applicable because the research does not involve a waiver or alteration of authorization. If the section is not applicable, remove the statement and indicate as not applicable.

Protected health information obtained as part of this research will not be reused or disclosed to any other person or entity, except as required by law, for authorized oversight of the research study, or for other permitted uses and disclosures according to federal regulations.

The research team will collect only information essential to the study and in accord with the ‘Minimum Necessary’ standard (information reasonably necessary to accomplish the objectives of the research) per federal regulations.

Access to the information will be limited, to the greatest extent possible, within the research team. All disclosures or releases of identifiable information granted under this waiver will be accounted for and documented.

7 Study Design and Procedures

Data collection materials that will be seen or used by subjects in your study must be uploaded to CATS IRB (http://irb.psu.edu). DO NOT include any actual data collection materials in this protocol (e.g., actual survey or interview questions)

[Do not type here]

7.1 Study Design

Describe and explain the study design.

[Type protocol text here]

7.2 Study Procedures

Provide a step by step description of all research procedures being conducted (broken down by visit, if applicable) including such information as below (where and when applicable); describe the following: - HOW: (e.g., data collection via interviews, focus groups, forms such as surveys and questionnaires, medical/school records, audio/video/digital recordings, photographs, EKG procedures, MRI, mobile devices such as electronic tablets/cell phones, observations, collection of specimens, experimental drug/device testing, manipulation of behavior/use of deception, computer games, etc.) - WHERE: (e.g., classrooms, labs, internet/online, places of business, medical settings, public spaces, etc.)

[Type protocol text here]

7.2.1 Visit 1 or Day 1 or Pre-test, etc.

[Type protocol text here]

7.2.2 Visit 2 or Day 2 or Post-test, etc. (If applicable)

[Type protocol text here]

7.3 Duration of Participation

[Type protocol text here]

8 Number of Subjects and Statistical Plan

8.1 Number of Subjects

Indicate the maximum number of subjects to be accrued/enrolled. Distinguish between the number of subjects who are expected to be enrolled and screened, and the number of subjects needed to complete the research procedures if applicable (i.e., numbers of subjects excluding screen failures.)

[Type protocol text here]

8.2 Sample Size Determination

If applicable, provide a justification of the sample size outlined in section 8.1 to include reflections on, or calculations of, the power of the study.

[Type protocol text here or indicate as not applicable]

8.3 Statistical or Analytic Methods

Describe the statistical methods (or non-statistical methods of analysis) that will be employed.

[Type protocol text here]

9 Data and Safety Monitoring Plan

This section is required when research involves more than Minimal Risk to subjects as defined in “HRP-001 SOP- Definitions.”

Minimal Risk is defined as the probability and magnitude of harm or discomfort anticipated in the research that are not greater in and of themselves than those ordinarily encountered in daily life or during the performance of routine physical or psychological examinations or tests. For research involving prisoners, Minimal Risk is the probability and magnitude of physical or psychological harm that is normally encountered in the daily lives, or in the routine medical, dental, or psychological examination of healthy persons.

Please complete each section below if the research involves more than minimal risk to subjects or indicate not applicable.

[Do not type here]

9.1 Periodic evaluation of data

Describe the plan to periodically evaluate the data collected regarding both harms and benefits to determine whether subjects remain safe.

[Type protocol text here or indicate as not applicable]

9.2 Data that are reviewed

Describe the data that are reviewed, including safety data, untoward events, and efficacy data.

[Type protocol text here or indicate as not applicable]

9.3 Method of collection of safety information

Describe the method by which the safety information will be collected (e.g., with case report forms, at study visits, by telephone calls and with subjects).

[Type protocol text here or indicate as not applicable]

9.4 Frequency of data collection

Describe the frequency of data collection, including when safety data collection starts.

[Type protocol text here or indicate as not applicable]

9.5 Individuals reviewing the data

Identify the individuals who will review the data. The plan might include establishing a data and safety monitoring committee and a plan for reporting data monitoring committee findings to the IRB and the sponsor.

[Type protocol text here or indicate as not applicable]

9.6 Frequency of review of cumulative data

Describe the frequency or periodicity of review of cumulative data.

[Type protocol text here or indicate as not applicable]

9.7 Statistical tests

Describe the statistical tests for analyzing the safety data to determine whether harms are occurring.

[Type protocol text here or indicate as not applicable]

9.8 Suspension of research

Describe any conditions that trigger an immediate suspension of research.

[Type protocol text here or indicate as not applicable]

10 Risks

List the reasonably foreseeable risks, discomforts, hazards, or inconveniences to the subjects related the subjects’ participation in the research. Include as may be useful for the IRB’s consideration, a description of the probability, magnitude, duration, and reversibility of the risks. Consider all types of risk including physical, psychological, social, legal, and economic risks. Note: Loss of confidentiality is a potential risk when conducting human subject research and must be listed here. - If applicable, indicate which procedures may have risks to the subjects that are currently unforeseeable. - If applicable, indicate which procedures may have risks to an embryo or fetus should the subject be or become pregnant. - If applicable, describe risks to others who are not subjects.

[Type protocol text here]

11 Potential Benefits to Subjects and Others

11.1 Potential Benefits to Subjects

Describe the potential benefits that individual subjects may experience from taking part in the research. If there is no direct benefit to subjects, indicate as such. Compensation is not considered a benefit. Compensation should be addressed in section 13.0.

[Type protocol text here or indicate “none” if there is no direct benefit to subjects]

11.2 Potential Benefits to Others

Describe the potential benefits to society or others.

[Type protocol text here]

12 Sharing Results with Subjects

Describe whether results (study results or individual subject results, such as results of investigational diagnostic tests, genetic tests, or incidental findings) will be shared with subjects or others (e.g., the subject’s primary care physicians) and if so, describe how information will be shared.

[Type protocol text here or indicate as not applicable]

13 Subject Payment and/or Travel Reimbursements

Describe the amount, type (cash, check, gift card, other) and timing of any subject payment or travel reimbursement. If there is no subject payment or travel reimbursement, indicate as not applicable.

Extra or Course Credit: Describe the amount of credit and the available alternatives. Alternatives should be equal in time and effort to the amount of course or extra credit offered. It is not acceptable to indicate that the amount of credit is to be determined or at the discretion of the instructor of the course.

Approved Subject Pool: Indicate which approved subject pool will be used; include in response below that course credit will be given and alternatives will be offered as per the approved subject pool procedures.

[Type protocol text here or indicate as not applicable]

14 Economic Burden to Subjects

14.1 Costs

Describe any costs that subjects may be responsible for because of participation in the research.

[Type protocol text here or indicate as not applicable]

15 Economic Burden to Subjects

15.1 Costs

Describe any costs that subjects may be responsible for because of participation in the research.

[Type protocol text here or indicate as not applicable]

16 Other Approvals

16.1 Other Approvals from External Entities

Describe any approvals that will be obtained prior to commencing the research (e.g., from engaged cooperating institutions IRBs who are also reviewing the research and other required review committees, community leaders, schools, research locations where research is to be conducted by the Penn State investigator, funding agencies, etc.).

[Type protocol text here or indicate as not applicable]

16.2 Internal PSU Ancillary Reviews

DO NOT ALTER OR DELETE: Ancillary reviews are reviewed by other compliance groups or individuals within Penn State that inform the IRB’s review of a new study or a modification to an existing study.

PSU IRB may set applicable ancillary reviews for your study. Please refer to the “HRP-309 Worksheet – Ancillary Review Matrix” for more information (found in the CATS Library).

[Do not type here]

17 Multi-Site Study

If this is a multi-site study (i.e., a study in which two or more institutions coordinate, with each institution completing all research activities outlined in a specific protocol) and the Penn State PI is the lead investigator, describe the processes to ensure communication among sites in the sections below.

[Do not type here]

17.1 Other sites

List the name and location of all other participating sites. Provide the name, qualifications and contact information for the principal investigator at each site and indicate which IRB will be reviewing the study at each site.

[Type protocol text here or indicate as not applicable]

17.2 Communication Plans

Describe the plan for regular communication between the overall study director and the other sites to ensure that all sites have the most current version of the protocol, consent document, etc. Describe the process to ensure all modifications have been communicated to sites. Describe the process to ensure that all required approvals have been obtained at each site (including approval by the site’s IRB of record). Describe the process for communication of problems with the research, interim results, and closure of the study.

[Type protocol text here or indicate as not applicable]

17.3 Data Submission and Security Plan

Describe the process and schedule for data submission and provide the data security plan for data collected from other sites. Describe the process to ensure all engaged participating sites will safeguard data as required by local information security policies.

[Type protocol text here or indicate as not applicable]

17.4 Subject Enrollment

Describe the procedures for coordination of subject enrollment and randomization for the overall project.

[Type protocol text here or indicate as not applicable]

17.5 Reporting of Adverse Events and New Information

Describe how adverse events and other information will be reported from the clinical sites to the overall study director. Provide the timeframe for this reporting.

[Type protocol text here or indicate as not applicable]

17.6 Audit and Monitoring Plans

Describe the process to ensure all local site investigators conduct the study appropriately. Describe any on-site auditing and monitoring plans for the study.

[Type protocol text here or indicate as not applicable]

18 Adverse Event Reporting

18.1 Reporting Adverse Reactions and Unanticipated Problems to the Responsible IRB

By submitting this study for review, you agree to the following statement – DO NOT ALTER OR DELETE:

In accordance with applicable policies of The Pennsylvania State University Institutional Review Board (IRB), the investigator will report, to the IRB, any observed or reported harm (adverse event) experienced by a subject or other individual, which in the opinion of the investigator is determined to be (1) unexpected; and (2) probably related to the research procedures. Harms (adverse events) will be submitted to the IRB in accordance with the IRB policies and procedures.

19 Study Monitoring, Auditing, and Inspecting

19.1 Auditing and Inspecting

By submitting this study for review, you agree to the following statement – DO NOT ALTER OR DELETE:

The investigator will permit study-related monitoring, audits, and inspections by the Penn State quality assurance program office(s), IRB, the sponsor, and government regulatory bodies, of all study related documents (e.g., source documents, regulatory documents, data collection instruments, study data etc.). The investigator will ensure the capability for inspections of applicable study-related facilities (e.g., pharmacy, diagnostic laboratory, etc.).

20 Future Undetermined Research: Data and Specimen Banking

If this study is collecting identifiable data and/or specimens that will be banked for future undetermined research, please describe this process in the sections below. This information should not conflict with information provided in section 22 below OR the “HRP-598 – Research Data Plan Review Form” regarding whether or not data and/or specimens will be associated with identifiers (directly or indirectly). If there are no plans to use identifiable data/specimens for future, undetermined research, then this section is NOT applicable.

[Do not type here]

20.1 Data and/or specimens being stored

Identify what data and/or specimens will be stored, and the data associated with each specimen.

[Type protocol text here or indicate as not applicable]

20.2 Location of storage

Identify the location where the data and/or specimens will be stored.

[Type protocol text here or indicate as not applicable]

20.3 Duration of storage

Identify how long the data and/or specimens will be stored. If data and/or specimens will be stored indefinitely, indicate such.

[Type protocol text here or indicate as not applicable]

20.4 Access to data and/or specimens

Identify who will have access to the data and/or specimens.

20.5 Procedures to release data or specimens

Describe the procedures to release the data and/or specimens, including: the process to request a release, approvals required for release, who can obtain data and/or specimens, and the data to be provided with the specimens.

[Type protocol text here or indicate as not applicable]

20.6 Process for returning results

Describe the process for returning results about the use of the data and/or specimens.

[Type protocol text here or indicate as not applicable]

21 References

List relevant references in the literature which highlight methods, controversies, and study outcomes.

[Type protocol text here or indicate as not applicable]

22 Confidentiality, Privacy and Data Management

IMPORTANT: The following section is required for all locations EXCEPT Penn State Health and the College of Medicine. Penn State Health and College of Medicine should skip this section and complete “HRP-598 Research Data Plan Review Form.” In order to avoid redundancy, for this section state “See the Research Data Plan Review Form” if you are conducting Penn State Health research. Delete all other sub-sections of section 22.

For research being conducted at Penn State Health or by Penn State Health researchers only: The research data security and integrity plan is submitted using “HRP-598 – Research Data Plan Review Form.”

In order to avoid redundancy, for this section state “See the Research Data Plan Review Form” if you are conducting Penn State Health research. Delete all sub-sections of section 22.

[For all other research]: Complete the following section. Please refer to PSU Policy AD95 for information regarding information classification and security standards and requirements. It is recommended that you work with local IT staff when planning to store, process, or access data electronically to ensure that your plan can be carried out locally and meets applicable requirements. If you have questions about Penn State’s Policy AD95 or standards or need a consultation regarding data security, please contact Penn State IT – Information Security at .

22.1 Which of the following identifiers will be recorded for the research project? Check all that apply. If none of the following identifiers will be recorded, do not check any of the boxes.

Hard Copy Data Electronic Stored Data
Names and/or initials (including on signed consent documents) [ ] [ ]
All geographic subdivisions smaller than a State, including street address, city, county, precinct, zip code, and their equivalent geocodes [ ] [ ]
All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older [ ] [ ]
Telephone numbers [ ] [ ]
Fax numbers [ ] [ ]
Electronic mail addresses [ ] [ ]
Social security numbers [ ] [ ]
Medical record numbers [ ] [ ]
Health plan beneficiary numbers [ ] [ ]
Account numbers [ ] [ ]
Certificate/license numbers [ ] [ ]
Vehicle identifiers and serial numbers, including [ ] [ ]
license plate numbers
Device identifiers and serial numbers [ ] [ ]
Web Universal Resource Locators (URLs) [ ] [ ]
Internet Protocol (IP) address numbers [ ] [ ]
Biometric identifiers, including finger and voice prints [ ] [ ]
Full face photographic images and any comparable images [ ] [ ]
Any other unique identifying number, characteristic, or code (such as the pathology number) [ ] [ ]
Study code number with linking list [ ] [ ]
Genomic sequence data [ ] [ ]
State ID numbers [ ] [ ]
Passport numbers [ ] [ ]
Driver’s license numbers [ ] [ ]

22.2 If storing paper records of research data, answer the following questions:

22.2.2 How will the paper records be secured?

[Type protocol text here or indicate as not applicable]

22.2.3 How will access to the paper records be restricted to authorized project personnel?

[Type protocol text here or indicate as not applicable]

22.3 If storing electronic records of research data, indicate where the electronic data associated with this research study will be stored. Check all that apply.

[ ] Penn State-provided database application. Check which of the following database applications are being used (check all that apply):
- [ ] Penn State REDCap
- [ ] Other – Specify - provided and approved database application:

[ ] Penn State, College, or Department IT file server

[ ] Penn State OneDrive or SharePoint

[ ] Penn State GoogleDrive

[ ] Web-based system provided by the sponsor or cooperative group - Specify URL and contact information:

[ ] Other – Specify the database application or server:

Please visit datastoragefinder.psu.edu for assistance with identifying appropriate data storage options. If the software to be used does not appear on that site, a software request form must be completed.** If there is a list/key that links indirect identifiers (code numbers, participant IDs, etc.) to direct identifiers, that list must not be comingled (i.e., stored in the same location) as the identifiable data, including copies of signed informed consent forms. Additionally, access to that list/key must be restricted to authorized project personnel.

22.5 Is there a list of people who have access to the list/key?

[ ] Yes – explain how access to that list is restricted and why certain persons require access.

The PI and co-investigators on the IRB protocol will have access to the data.

[ ] No – explain why not:

22.6 Describe the mechanism in place to ensure only approved research personnel have access to the stored research data (electronic and paper).

[ ] Password-protected files [ ] Role-based security

Specify all other mechanisms used to ensure only permitted users have access to the stored research data:

The use of mobile devices or wireless activity trackers to collect identifiable research data may have to be approved by Penn State IT - Information Security.

22.7 Will research data be stored on a mobile device, such as an electronic tablet/cell phone or will research data be collected on a wireless activity tracker?

[ ] No – skip to 22.8

[ ] Yes - answer the following questions:

22.7.1 Specify the provider of the tracker or mobile devices(s)

[ ] Supplied by the sponsor

[ ] Penn State owned device

[ ] A personal device

[ ] Other – Please specify source: [Type protocol text here if box is checked]

22.7.2 Specify the type(s) of tracker or mobile device(s) that will be used to capture data and all identifiers captured on the mobile device(s). Please list all devices, and if more than one, the identifiers to be collected on each.

[Type protocol text here]

22.7.3 Specify the type of data collected on the tracker or mobile devices(s).

[Type protocol text here]

22.7.4 Specify the application or website used to collect the data from the tracker or mobile device, if applicable.

[Type protocol text here]

22.7.5 Describe the measures taken to protect the confidentiality of the data collected on the tracker or mobile device(s). Please address physical security of the device(s), electronic security, and secure transfer of data from device(s) to the previously indicated data/file storage location provided in section 22.3.

The use of online survey tools and email to collect or send research data containing identifiers that represent more than minimal risk to subjects may have to be approved by Penn State IT - Information Security.

22.8 Will any research data be directly entered/sent by subjects over the internet or via email (e.g., data capture using on-line surveys/questionnaires, surveys via email, observation of chat rooms or blogs)?

[ ] No – skip to 22.9

[ ] Yes - answer the following questions:

22.8.1 Specify the identifiers collected over the internet or via email (Including IP addresses if IP addresses will be collected).

22.8.2 Specify the type of data collected over the internet or via email.

22.8.3 Describe the measures taken to protect the confidentiality of the data collected?

22.8.4 Describe how the research team will access the data once data collection is complete.

22.8.5 If the research involves online surveys, list the name(s) of the service provider(s) that will be used for the survey(s) (e.g., REDCap, Penn State licensed Qualtrics, Survey Monkey, Zoomerang)? (Note: The IRB strongly recommends the use of REDCap for online surveys that obtain sensitive identifiable human subjects data.)

[ ] Penn State REDCap

[ ] Penn State Qualtrics

[ ] Penn State Microsoft Forms

[ ] Penn State Google Forms

[ ] Other - Please specify: - Application: - URL (If applicable):

22.8.6 If the answer above is “Other” contact for approval of an alternative data capture method

Depending on the nature of the subject matter involved, certain security requirements must be in place for the audio and/or video recording or photographing of subjects. If the subject matter presents more than minimal risk to the subjects, then, before completing the section below, please contact Penn State IT - Information Security at to confirm whether these requirements are required.

22.9 Will any type of recordings (e.g., audio or video) or photographs of the subjects be made during this study?

[ ] No - skip to section 22.10

[ ] Yes - answer the following questions:

22.9.1 What will be used to capture the audio/video/images? Give a brief description of content.

[ ] Audio – Describe the intended content of the audio recording:

[Type protocol text here]

[ ] Video – Describe the intended content of the video recording:

[Type protocol text here]

[ ] Photographs of the subjects – Describe the intended content of the photographs:

[Type protocol text here]

[ ] 3-D Images – Describe the intended content of the of 3-D images:

[Type protocol text here]

[ ] Other - Specify:

[Type protocol text here]

22.9.2 How will the recordings/photographs/images be stored (electronically or physically)?

[Type protocol text here]

22.9.3 Where will the recordings/photographs/images be stored?

[Type protocol text here]

22.9.4 Who will have access to the recordings/photographs/images?

[Type protocol text here]

22.9.5 Will any of the recordings be transcribed?

[ ] Not applicable

[ ] No

[ ] Yes – indicate who will be doing the transcribing?

[Type protocol text here]

22.9.6 Will the recordings/photographs be used for purposes other than this research study?

[ ] No

[ ] Yes - specify purpose(s) (e.g., publication, presentations, educational training, future undetermined research):

[Type protocol text here]

22.10 Certificate of Confidentiality (COC) - Is the research biomedical, behavioral, clinical or other research that is funded by the National Institutes of Health (NIH)?

[ ] Yes - check one of the following:
- [ ] The research involves human subjects as defined by the DHHS regulations (See Worksheet HRP-310).
- [ ] The research involves collecting or using biospecimens that are identifiable to an individual.
- [ ] If collecting or using biospecimens as part of the research, there is a small risk that some combination of the biospecimen, a request for the biospecimen, and other available data sources could be used to deduce the identity of an individual.
- [ ] The research involves the generation of individual level, human genomic data.

Note: If [any] of the 4 items above are checked, a COC is automatically issued by NIH and applies to the research. Information about the COC must be included in the consent form.

[ ] No - answer the following question.
- [ ] If the research is not funded by NIH, will the investigator apply for a COC for this research study?
- [ ] Yes - [x] No

Note: For research not funded by NIH, the IRB may require a COC if the research is collecting personally identifiable information and the information is sensitive and/or the research is collecting information that if disclosed could significantly harm or damage the subject.

22.11 What steps will be taken to protect subjects’ privacy interests? (Check all that apply.)

[ ] Identification and recruitment of potential subjects follows procedures consistent with privacy standards

[ ] Consent discussion and research interventions will take place in a private setting

[ ] Limiting the information being collected to only the minimum amount of data necessary to accomplish the research purposes

[ ] Limiting the people with access to the identifiable research data to the minimum necessary as specified in the application and consent process

[ ] Other – Specify:

[Type protocol text here]

22.12 What is the process for ensuring correctness of data entry?

[ ] Double data entry to reduce risk of errors

[ ] Electronic edit checks to ensure data being entered are not obviously incorrect

[ ] Random internal quality and assurance checking of research data

[ ] Direct entry by subjects

[ ] Other - Specify:

[Type protocol text here]

22.13 Does this research involve the generation of large-scale human genomic data as defined in NIH Genomic Data Sharing Policy (http://gds.nih.gov)?

[ ] No

[ ] Yes – describe the plan for de-identifying the dataset before sharing it with NIH-designated data repositories.

[Type protocol text here]

Note: Data sharing with an NIH-designated data repository may require execution of an institutional certificate. Please review the ‘Institutional Certification for NIH Genomic Data Sharing’ section of the Investigator’s Manual for information about seeking institutional certification.

22.14 Does this research involve transfer or disclosure of data and/or specimens to and/or from Penn State?

[ ] No - skip the remainder of section 22.14

[ ] Yes - answer the following questions:

Check all that apply:

22.14.1 Data are being transferred or disclosed to Penn State

What is the name of the third party(ies) (the institution, sponsor, etc.) sending or providing the data?

[Type protocol text here]

Is the third party requiring us to sign a contract regarding the data?

22.14.1.1 [ ] Yes - this contract must go through the Office of Sponsored Programs https://www.research.psu.edu/osp/overview-pages/data-use-agreements

22.14.1.2 [ ] No

22.14.2 Data are being transferred or disclosed from Penn State

What is the name(s) of the third party(ies) (the institution, sponsor, etc.) receiving or accessing the data?

[Type protocol text here]

Note: Data transfers or disclosures may require a Data Use Agreement (DUA).

22.14.3 Specimens are being transferred to Penn State

What is the name(s) of the third party(ies) (the institution, sponsor, etc.) sending the specimens?

[Type protocol text here]

22.14.4 Specimens are being transferred from Penn State

What is the name(s) of the third party(ies) (the institution, sponsor, etc.) receiving the specimens?

[Type protocol text here]

Note: All material transfers, either sending or receiving, require a Material Transfer Agreement (MTA). Please contact the Office of Technology Management for more information.

22.14.5 Describe how the data/specimens will be securely transferred or disclosed to/from the third party(ies).

[Type protocol text here]

22.14.6 22.14.6 How are the research data/specimens being transferred from and/or sent to the third party(ies)? Complete the appropriate section(s) and check all that apply within each completed section.

22.14.6.1 22.14.6.1 Data being transferred or disclosed to Penn State:

[ ] Data are being received in aggregate/metrics (just counts, no individual data)

[ ] De-identified individual data are being received and there is no linking list at either institution (no identifiers, or links to identifiers, such as code numbers)

[ ] Coded research data without any identifiers are being received and the linking list remains with the entity sending the data; the recipient of the data will not have access to the linking list

[ ] Coded research data with identifiers (such as dates and/or any of the identifiers listed in section 22.14.7 aside from Study Code) are being received and the linking list remains with the entity sending the data; the recipient of the data will not have access to the linking list

[ ] Data with identifiers (such as dates and/or any of the identifiers listed in section 22.14.7) are being received and the linking list remains with the entity sending the data; the recipient of the data will have access to the linking list

[ ] Data with identifiers along with the linking list are being received

[ ] Other – Specify:

[Type protocol text here if box is checked]

22.14.6.2 22.14.6.2 Data being transferred or disclosed from Penn State:

[ ] Data are being sent in aggregate/metrics (just counts, no individual data)

[ ] De-identified individual data are being sent and there is no linking list at either institution (no identifiers, or links to identifiers, such as code numbers)

[ ] Coded research data without any identifiers are being sent and the linking list remains with the entity sending the data; the recipient of the data will not have access to the linking list

[ ] Coded research data with identifiers (such as dates and/or any of the identifiers listed in section 22.14.7 aside from Study Code) are being sent and the linking list remains with the entity sending the data; the recipient of the data will not have access to the linking list

[ ] Data with identifiers (such as dates and/or any of the identifiers listed in section 22.14.7) are being sent and the linking list remains with the entity sending the data; the recipient of the data will have access to the linking list

[ ] Data with identifiers along with the linking list are being sent

[ ] Other – Specify:

[Type protocol text here if box is checked]

22.14.6.3 22.14.6.3 Specimens being transferred or disclosed to Penn State:

[ ] De-identified specimens are being received and there is no linking list at either institution (no identifiers, or links to identifiers, such as code numbers)

[ ] Coded specimens without any identifiers are being received and the linking list remains with the entity sending the specimens; the recipient of the specimens will not have access to the linking list

[ ] Coded specimens with identifiers (such as dates and/or any of the identifiers listed in section 22.14.7 aside from Study Code) are being received and the linking list remains with the entity sending the specimens; the recipient of the specimens will not have access to the linking list

[ ] Coded specimens with identifiers (such as dates and/or any of the identifiers listed in section 22.14.7) are being received and the linking list remains with the entity sending the specimens; the recipient of the specimens will have access to the linking list

[ ] Coded specimens with identifiers along with the linking list are being received

Other – Specify:

[Type protocol text here if box is checked]

22.14.6.4 22.14.6.4 Specimens being transferred or disclosed from Penn State:

[ ] De-identified specimens are being sent and there is no linking list at either institution (no identifiers, or links to identifiers, such as code numbers)

[ ] Coded specimens without any identifiers are being sent and the linking list remains with the entity sending the specimens; the recipient of the specimens will not have access to the linking list

[ ] Coded specimens with identifiers (such as dates and/or any of the identifiers listed in section 22.14.7 aside from Study Code) are being sent and the linking list remains with the entity sending the specimens; the recipient of the specimens will not have access to the linking list

[ ] Coded specimens with identifiers (such as dates and/or any of the identifiers listed in section 22.14.7) are being sent and the linking list remains with the entity sending the specimens; the recipient of the specimens will have access to the linking list

[ ] Coded specimens with identifiers along with the linking list are being sent

[ ] Other – Specify:

[Type protocol text here if box is checked]

22.14.7 22.14.7 If transferring data/specimens with identifiers to or from Penn State, which of the following identifiers will be included with the data/specimens? Check all that apply:

[ ] Names [ ] Medical record numbers
[ ] Initials [ ] Health plan beneficiary numbers
[ ] Street address [ ] Account numbers
[ ] City [ ] Certificate/license numbers
[ ] Driver’s License numbers [ ] Passport numbers
[ ] State [ ] State ID numbers
[ ] Zip Codes [ ] Vehicle identifiers and serialnumbers, including license plate numbers
[ ] County [ ] Device identifiers and serial numbers
[ ] Geocodes [ ] Web Universal Resource Locators (URLs)
[ ] Precincts [ ] Internet Protocol (IP) address numbers
[ ] All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death [ ] Biometric identifiers, including finger and voice prints
[ ] Ages > 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older [ ] Full face photographic images and any comparable images
[ ] Telephone numbers [ ] Any other unique identifying number, characteristic, or code (such as the pathology number) Specify: [Type protocol text here if box is checked]
[ ] Fax numbers [ ] Study code numbers
[ ] Electronic mail addresses [ ] Master list linking study code numbers to subject(s)
[ ] Social security numbers [ ] Genomic sequence data
[ ] Other – specify:[Type protocol text here if box is checked]

  1. This template satisfies AAHRPP elements 1.7.B, I.8.B, I-9, II.2. A, II.2.I, II.3.A, II.3.B, II.3.C-II.3.C.1, II.3.D-F, II.4.A, III.1.C-F, II.2.D↩︎

  2. Unless informed consent is waived by the IRB, screening before consent is only permitted when screening activities are limited to the collection of information through oral or written communication OR when identifiable private information or identifiable biospecimens is obtained by accessing records or stored identifiable biospecimens. Screening before consent is not permitted if data will be used for activities other than eligibility screening/recruitment (e.g., data analysis). In some studies, these procedures may not take place unless HIPAA Authorization is obtained OR a waiver of HIPAA Authorization when applicable for the screening procedures is approved by the IRB.↩︎