USC Reviewer Guidelines for Research Involving Prisoners

USC Reviewer Guidelines for Research Involving Prisoners

<p> Checklist for IRBs to Use in Verifying that Human Subject Protocols Are in Compliance with Department of Energy (DOE) Requirements*</p><p>In accordance with the Privacy Act, the DOE has established requirements for the protection of Personally Identifiable Information (PII) with the DOE Privacy Program (DOE Order 206.1), DOE Manual (M) for Identifying and Protecting Official Use Only Information (DOE M 471.3-1) and DOE Cyber Security Incident Management Manual (DOE M 205.18-8).</p><p>Personally Identifiable Information (PII): Any information collected or maintained about an individual, including but not limited to, education, financial transactions, medical history and criminal or employment history, and information that can be used to distinguish or trace an individual’s identity, such as his/her name, Social Security number, date and place of birth, mother’s maiden name, biometric data, and any other personal information that is linked or linkable to a specific individual.</p><p>Research Protocols Must Include Description of Processes for: ‒ Keeping PII confidential ‒ Releasing PII only under a procedure approved by the responsible IRB(s) and DOE, where required ‒ Using PII only for purposes of the DOE-approved research Handling and marking documents containing PII as “containing PII” or “containing PHI” ‒ ‒ Establishing reasonable administrative, technical, and physical safeguards to prevent unauthorized use or disclosure of PII ‒ Making no further use or disclosure of the PII except when approved by the responsible IRB(s) and DOE, where applicable, and then only: o In an emergency affecting the health or safety of any individual o For use in another research project under these same conditions and with DOE written authorization o For disclosure to a person authorized by the DOE program office for the purpose of an audit related to the project o When required by law Protecting PII data stored on removable media (CD, DVD, USB Flash Drives, etc.) using ‒ encrUsiypntgio FnI PpSr o1d40uc-2ts ctehrattif areied eFendcreyralpti Ionnfo trhmatat mioeen tP trhoece csusirrnegn Stta DnOEdar pdass sw(FIoPrdS) 1re4qu0-2ir ecemertifintsed ‒ cited in DOE Guide 205.3-1 ‒ Shipping removable media containing PII, as required, by express overnight service with signature and tracking capability, and shipping hard copy documents double wrapped via express overnight service ‒ Encrypting data files containing PII that are being sent by e-mail with FIPS 140-2 certified encryption products ‒ Sending passwords that are used to encrypt data files containing PII separately from the encrUsiypntge dF IdPataS 140 file-2, ice.e.rtified separate encr ey-pmtiail,on tmeleetphhoodns ef ocalr wl,e sbesitespara teesta lettbliesrhed for the submission ‒ of information that includes PII ‒ Using two-factor authentication for logon access control for remote access to systems and databases that contain PII. (Two-factor authentication is contained in the National Institute of Standards and Technology (NIST) Special Publication 800-63 found at: h tt p : / / cs r c. n ist. go v/ pub lic a ti o n s / n i s t pub s / 80 0 - 6 3 - 1 / S P - 8 00 - 63 - 1 . pd f )</p><p>Version: 11.7.14 Checklist for IRBs to Use in Verifying that Human Subject Protocols Are in Compliance with Department of Energy (DOE) Requirements* In addition to other reporting requirements, reporting the loss or suspected loss of PII immediately upon discovery to: 1) the DOE Project Officer; and 2) the applicable IRBs. </p><p>(*Adapted from: http://humansubjects.energy.gov/other-resources/09hswg-mtg/associated_files/WhiteExpectationsofDOESiteIRBsPII_ac.ppt) </p><p>Version: 11.7.14</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us