SlideShare a Scribd company logo
Ethics and Integrity
           in Data Use and
             Management
                       John E. Sidle, M.D., M.S.
                            May 10, 2010
This module was recorded at the health informatics-training course – data management series offered by the Regional East African
Centre for Health Informatics (REACH-Informatics) in Eldoret, Kenya. Funding was made possible by NIH’s Fogarty Center and a
                               (REACH-Informatics)
grant from the Rockefeller Center.   The training was held at the Academic Model Providing Access to Healthcare (AMPATH), a
                                                                                                                    (AMPATH),
USAID-funded program, supported by the Regenstrief Institute at Indiana University. The modules were created in collaboration with
                                                                        University.
the School of Informatics at IUPUI.
                             IUPUI.



                        Content licensed under Creative Commons Attribution-Share Alike 3.0 Unported
Objectives
Examine a brief history of ethics in research
and data management
Discuss pertinent principles of ethics in data
management
Discuss the concept of “data integrity” and
ethics in data management
Discuss applications for data management
personnel in ethical use of data
Outline
Definitions
Ethical Principles in Bioethics
Guidelines and Regulations
Data Integrity
Applications for ethics and maintenance of
data integrity
Definitions

   In·teg·ri·ty n. 1. Strict adherence to a standard of value
   or conduct. 2. Personal honesty and independence. 3.
   Completeness: unity 4.Soundness

   Eth·ic n. 1. A principle of right or good conduct. 2. A
   system of moral values. 3. ethics (sing. In number). The
   branch of philosophy dealing with the rules of right
   conduct.

Source: Webster’s II New Riverside Dictionary, Based on the Webster’s II New College
   Dictionary (1996)
Ethical Principles
Beneficence
   Minimize harm
   Maximize Benefits
Respect of Persons (Autonomy)
   Informed voluntary consent
   Vulnerable subjects must be protected
Justice
   Equity in distributing risks and benefits between
    populations
   “fairness” in dealing with research participants
   Equity between institutions and research partners
Clinical Data vs. Research Data:
     Are the Ethics Different?

Privacy and Confidentiality
Informed Consent vs. Implied Consent
Data Integrity / Data Quality
Data Security and Storage
Ethical Guidelines (for Research)
Declaration of Helsinki
   ethical standard used by the International Committee
    of Medical Journal Editors
   guidelines govern all medical research
CIOMS Guidelines
   Council for International Organizations of Medical
    Sciences
   developed guidelines in collaboration with WHO
Belmont Report
National Guidelines (Kenya)
Regulations
US: Code of Federal Regulations Title 45,
Part 46 (45CFR46)
FDA– 21CFR50 and 56
NIH--“he who has the gold makes the rules”
HIPAA—related both to clinical records and
use of subject data in research
45CFR46
US Code of Federal Regulations Title 45, Part
46 (45CFR46)
   Human Subjects Protections
   IRB requirements
   Protection of Vulnerable Subjects

Human subject
   Human subject means a living individual about whom
    an investigator (whether professional or student)
    conducting research obtains:
     (1) data through intervention or interaction with the
    individual, or
    (2) identifiable private information.
Privacy/Confidentiality
Applies to both clinical and research data

Major concern for patients when it comes
to electronic records and data

Must be safeguarded by all members on
the team
HIPAA
Health Insurance Portability and
Accountability Act of 1996 (HIPAA), HHS
issued regulations entitled Standards for
Privacy of Individually Identifiable Health
Information.
For most covered entities, compliance with
these regulations, known as the Privacy
Rule, was required by April14, 2003.
HIPAA and Privacy Rule
The Privacy Rule, at 45 CFR parts 160 and 164,
establishes a category of health information,
defined as protected health information (PHI),
which a covered entity may only use or disclose
to others in certain circumstances and under
certain conditions.
Usually requires an individual to provide signed
permission, known as an Authorization before a
covered entity can use or disclose the
individual's PHI for research purposes.
Need for authorization may be waived in some
instances by an IRB (and a Privacy Board)
Individually Identifiable Information
 and Protected Health Information
 Includes any subset of health information, including
 demographic information, that identifies the individual (or
 there is a reasonable basis to believe that the information
 can be used to identify the individual).
      1. Name
      2. All elements of dates except Year.
      3. SSN
      4. Driver's License Number
      5. Geographic subdivisions smaller than a State.
      6. URL's and IP's
      7. Vehicle Identifiers including VIN and License #
      8. Phone numbers
PHI
Individually identifiable information becomes PHI when it
is created or received by a covered entity:
   US health plans
   US health care clearinghouses
   US health providers that transmit electronic health information
A researcher is not a covered entity unless he/she is
also a provider within a covered entity.
Research is also governed by HIPAA if data is obtained
from a covered entity.
IRB may on occasion waive the HIPAA restrictions on
use of PHI
How does all this translate to
            practice?
Electronic health information (clinical or research)
   Can improve quality and safety of medical care
    (beneficence)
   Is key to showing outcomes in research on health and
    health practices (beneficence)
   Confidentiality and Privacy can be lost (breach of
    autonomy and beneficence)
   Can be used without a patient’s knowledge or consent
    (breach of autonomy)
   Might exclude some populations (breach of justice)
Data Integrity
The assurance that data is accurate, correct and
valid.
Accuracy and consistency of stored data,
indicated by an absence of any alteration in data
between two updates of a data record. Data
integrity is imposed within a database at its
design stage through the use of standard rules
and procedures, and is maintained through the
use of error checking and validation routines.
Exact duplication of the sent data at the
receiving end, achieved through the use of error
checking and correcting protocols.
Assurance that the data are unchanged from
creation to reception.
Data Integrity (2)
Process to maintain data integrity depends
on:
   Collection (accurate representation)
   Data transfer (accurate recording and transfer
    of data)
   Storage and Security (preventing loss of data)
   Sharing of Data
   Use of data (analysis)
Data Integrity (3)
Fabrication and Falsification of data are one of
the most serious challenges to data integrity
Human error also contributes to loss of data
integrity
Concern about research misconduct was a
primary motivation for a 1990 conference on
data management sponsored by the US
Department of Health and Human Services.
Conference summarized the many ways in
which the conduct of research depends on
responsible data management.
Data Integrity (4)
Responsible research begins with
experimental design and protocol approval
It involves recordkeeping in a way that
ensures accuracy and avoids bias
It guides criteria for including and
excluding data from statistical analyses
It entails responsibility for collection, use,
and sharing of data.
Data Integrity (5)
Everyone with a role in research has a
responsibility to ensure the integrity of the data.
The ultimate responsibility belongs to the
principal investigator, but the central importance
of data to all research means that this
responsibility extends to anyone who:
   helps in planning the study
    collecting the data
    analyzing or interpreting the research findings
    publishing the results of the study
    maintaining the research records.
Data Collection and Integrity
Because data collection can be repetitious, time-
consuming, and tedious there is a temptation to
underestimate its importance.
Those responsible for collecting data must be
adequately trained and motivated
They should employ methods that limit or
eliminate the effect of bias
They should keep records of what was done by
whom and when
Analysis and Selection of Data
The use of statistical methods varies widely
among research disciplines and also clinical
programs (reporting)
It is a laudable ideal to analyze and report all
data
Because it is not possible to report everything
that has been done, researchers must make
decisions about which studies, data points, and
methods of analysis to present.
Analysis and Selection of Data (2)
Must critically evaluate the reasons for
inclusion or exclusion of data, the
measures taken to avoid bias, and
possible ways in which bias may
nonetheless influence data selection
Must clearly document how the data were
obtained, selected, and analyzed--
especially if the methods are unusual or
potentially controversial
Retention of Data
What should be retained?
It may be impractical to store
extraordinarily large volumes of primary
data.
At minimum, enough data should be
retained to reconstruct what was done.
How long should clinical records be
retained?
Sharing of Data
This is considered an important part of
responsible research.
De-identified data should be shared so
that others can verify your conclusions or
analysis
Sharing of personal patient information is
NOT a good practice as noted in Privacy
sections earlier.
Data Security
Limiting Access
   Locked Paper Records Offices
   Limiting access to Paper or Electronic records
    to appropriate personnel
   Password Protection of electronic records
   Defined privileges for electronic data users
   Firewalls to prevent outside access
Regular Backups and proper archiving
Ownership of Data
Who owns the data that is generated?
   Patient?
   Institution?
   Funder?
   Investigator?
   Publisher?
Ethics in Publication—General
  guidelines pertinent to data
Research should strive to answer specific
questions—not just collect or mine data
Statistical issues (sample size) are an
important part of design to ensure that the
research data is likely to answer the
question
IRB approval is required when using
human subjects, human tissues, or
medical records
Publication Ethics and Data
   Management/Data Analysis

Data should be appropriately analyzed

Inappropriate analysis is not necessarily
ethical misconduct

Fabrication or falsification of data is
always ethical misconduct
Publication Ethics and Data
     Management/Analysis
Sources and methods of obtaining and
processing data should be disclosed
Data exclusions should be explained in full
Methods used to analyze data should be
explained in detail
Post hoc analysis of subgroups is
acceptable as long as this is disclosed
Data Bias should be discussed in all
publications of data or analysis
Questions??
THE WORK IS PROVIDED UNDER THE TERMS OF THIS
CREATIVE COMMONS PUBLIC LICENSE ("CCPL" OR "LICENSE"). THE
WORK IS PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE
LAW. ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER
       THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED.

More Related Content

PPTX
Imputation techniques for missing data in clinical trials
PPT
Descriptive Statistics
PPTX
Electronic Medical Records: From Clinical Decision Support to Precision Medicine
PPTX
Missing Data and Causes
PPTX
An Introduction to Health Informatics
PPT
Data Management
PPTX
Powerpoint presentation on EHR
PPTX
Healthcare information technology
Imputation techniques for missing data in clinical trials
Descriptive Statistics
Electronic Medical Records: From Clinical Decision Support to Precision Medicine
Missing Data and Causes
An Introduction to Health Informatics
Data Management
Powerpoint presentation on EHR
Healthcare information technology

What's hot (20)

PPT
Clinical Decision Support Systems
PPTX
Medical Records Privacy Confidentiality And Security
PPTX
Week 9 emr implementation final project
PPT
Data Quality Presentation.ppt
PPTX
New Age Technology in Healthcare
PPTX
Telemedicine shalaka patil
PPT
Health Information Exchange (HIE)
PPTX
Telemedicine presentation feb. 2014
PPTX
Medical Informatics
PPTX
Deploying Predictive Analytics in Healthcare
PDF
Toward Trustworthy AI
PPT
Hitech Act
PDF
Health Informatics & eHealth: Application of ICT for Health
PPT
PPTX
The Basics of Statistics for Data Science By Statisticians
PDF
ICT in Healthcare
PPT
Descriptive statistics
PPTX
Telemedicine Benefits and drawbacks 25.04.2021
PDF
[MPKD1] Introduction to business analytics and simulation
PPT
Survival Analysis Lecture.ppt
Clinical Decision Support Systems
Medical Records Privacy Confidentiality And Security
Week 9 emr implementation final project
Data Quality Presentation.ppt
New Age Technology in Healthcare
Telemedicine shalaka patil
Health Information Exchange (HIE)
Telemedicine presentation feb. 2014
Medical Informatics
Deploying Predictive Analytics in Healthcare
Toward Trustworthy AI
Hitech Act
Health Informatics & eHealth: Application of ICT for Health
The Basics of Statistics for Data Science By Statisticians
ICT in Healthcare
Descriptive statistics
Telemedicine Benefits and drawbacks 25.04.2021
[MPKD1] Introduction to business analytics and simulation
Survival Analysis Lecture.ppt
Ad

Viewers also liked (20)

PPTX
Data colonization
PPTX
Cris consent public
PDF
Social Media, Healthcare and the Law
PPTX
Ethics, Informatics and Obamacare
PDF
Mdh ethics in social media pdf
PPTX
The Ethics of Digital Health
PDF
Information Ethics and Clinical Decision Making
PDF
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
PDF
Ethical & Legal Issues for Health IT in Thailand's Context
PDF
Information Ethics and Clinical Decision Making
PDF
Digital Ethics : Helping your brain to make decisions online
PPT
Legal and ethical considerations in nursing informatics
PDF
Hi271 lacking in ethics pdf v3
PPT
Eysenbach: Consumer health informatics
PPT
Legal and Ethical Considerations in Nursing Informatics
PPT
Chapter 5
PPT
Ethics in Social Media
PPT
Health Informatics
PPT
Social media and ethics
Data colonization
Cris consent public
Social Media, Healthcare and the Law
Ethics, Informatics and Obamacare
Mdh ethics in social media pdf
The Ethics of Digital Health
Information Ethics and Clinical Decision Making
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethical & Legal Issues for Health IT in Thailand's Context
Information Ethics and Clinical Decision Making
Digital Ethics : Helping your brain to make decisions online
Legal and ethical considerations in nursing informatics
Hi271 lacking in ethics pdf v3
Eysenbach: Consumer health informatics
Legal and Ethical Considerations in Nursing Informatics
Chapter 5
Ethics in Social Media
Health Informatics
Social media and ethics
Ad

Similar to Data Quality: Missing Data (PPT slides) (20)

PDF
Brisbane Health-y Data: What are health and sensitive data and why are they t...
DOCX
International Journal of Telerehabilitation • telere.docx
PPTX
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
PPTX
Standards and Best Practices for Confidentiality of Electronic Health Records
PPTX
The Learning Health System: Thinking and Acting Across Scales
PPTX
Confidentiality manager training mha 690
DOCX
Discussion #1 for Week 5RubricsWeekly Participation.docx
PPT
HIPAA&predictiveanalytics
PPTX
Confidentiality and information security33.pptx
PDF
Research data management and sharing of medical data
DOCX
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
DOCX
Security of Health Care Records.docx
PDF
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
PPTX
Challenges and Opportunities Around Integration of Clinical Trials Data
DOCX
1)Health data is sensitive and confidential; hence, it should .docx
PDF
Data management (1)
PPTX
Research Data Management Services at UWA (November 2015)
PDF
Publishing and sharing sensitive data 28 June
DOCX
1Running Head Research Paper Final Draft6Research Paper.docx
PPTX
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...
Brisbane Health-y Data: What are health and sensitive data and why are they t...
International Journal of Telerehabilitation • telere.docx
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
Standards and Best Practices for Confidentiality of Electronic Health Records
The Learning Health System: Thinking and Acting Across Scales
Confidentiality manager training mha 690
Discussion #1 for Week 5RubricsWeekly Participation.docx
HIPAA&predictiveanalytics
Confidentiality and information security33.pptx
Research data management and sharing of medical data
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
Security of Health Care Records.docx
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
Challenges and Opportunities Around Integration of Clinical Trials Data
1)Health data is sensitive and confidential; hence, it should .docx
Data management (1)
Research Data Management Services at UWA (November 2015)
Publishing and sharing sensitive data 28 June
1Running Head Research Paper Final Draft6Research Paper.docx
iHT2 Health IT Summit in Austin 2012 – Deborah C. Peel, MD, Founder and Chai...

More from Saide OER Africa (20)

PPTX
Asp openly licensed stories for early reading in africa mar 2015 slideshare
PPTX
Quality Considerations in eLearning
PPTX
African Storybook: The First 18 Months of the Project
PPTX
Digital Storytelling for Multilingual Literacy Development: Implications for ...
PPTX
Integrating ICT in TVET for Effective Technology Enabled Learning
PPTX
Higher Education Technology Outlook in Africa
PPTX
eLearning or eKnowledge - What are we offering students?
PPTX
The Rise of MOOCs
PDF
Understand school leadership and governance in the South African context (PDF)
PDF
Toolkit: Unit 8 - Developing a school-based care and support plan.
PDF
Toolkit: Unit 7 - Counselling support for vulnerable learners.
PDF
Toolkit: Unit 6 - School-based aftercare.
PDF
Toolkit: Unit 5 - Good nutrition for learning.
PDF
Toolkit: Unit 3 - Care for vulnerable learners
PDF
Toolkit: Unit 2 - Schools as centres of care.
PDF
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...
DOC
Reading: Understanding Intrapersonal Characteristics (Word)
PDF
Reading: Understanding Intrapersonal Characteristics (pdf)
DOC
Reading: Guidelines for Inclusive Learning Programmes (word)
PDF
Reading: Guidelines for Inclusive Learning Programmes (pdf)
Asp openly licensed stories for early reading in africa mar 2015 slideshare
Quality Considerations in eLearning
African Storybook: The First 18 Months of the Project
Digital Storytelling for Multilingual Literacy Development: Implications for ...
Integrating ICT in TVET for Effective Technology Enabled Learning
Higher Education Technology Outlook in Africa
eLearning or eKnowledge - What are we offering students?
The Rise of MOOCs
Understand school leadership and governance in the South African context (PDF)
Toolkit: Unit 8 - Developing a school-based care and support plan.
Toolkit: Unit 7 - Counselling support for vulnerable learners.
Toolkit: Unit 6 - School-based aftercare.
Toolkit: Unit 5 - Good nutrition for learning.
Toolkit: Unit 3 - Care for vulnerable learners
Toolkit: Unit 2 - Schools as centres of care.
Toolkit: Unit 1 - How responsive are schools to the socio-economic challenges...
Reading: Understanding Intrapersonal Characteristics (Word)
Reading: Understanding Intrapersonal Characteristics (pdf)
Reading: Guidelines for Inclusive Learning Programmes (word)
Reading: Guidelines for Inclusive Learning Programmes (pdf)

Recently uploaded (20)

PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
master seminar digital applications in india
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Final Presentation General Medicine 03-08-2024.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPH.pptx obstetrics and gynecology in nursing
Supply Chain Operations Speaking Notes -ICLT Program
Anesthesia in Laparoscopic Surgery in India
TR - Agricultural Crops Production NC III.pdf
master seminar digital applications in india
2.FourierTransform-ShortQuestionswithAnswers.pdf
human mycosis Human fungal infections are called human mycosis..pptx
VCE English Exam - Section C Student Revision Booklet
O5-L3 Freight Transport Ops (International) V1.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Cell Structure & Organelles in detailed.
Pharma ospi slides which help in ospi learning
Final Presentation General Medicine 03-08-2024.pptx

Data Quality: Missing Data (PPT slides)

  • 1. Ethics and Integrity in Data Use and Management John E. Sidle, M.D., M.S. May 10, 2010 This module was recorded at the health informatics-training course – data management series offered by the Regional East African Centre for Health Informatics (REACH-Informatics) in Eldoret, Kenya. Funding was made possible by NIH’s Fogarty Center and a (REACH-Informatics) grant from the Rockefeller Center. The training was held at the Academic Model Providing Access to Healthcare (AMPATH), a (AMPATH), USAID-funded program, supported by the Regenstrief Institute at Indiana University. The modules were created in collaboration with University. the School of Informatics at IUPUI. IUPUI. Content licensed under Creative Commons Attribution-Share Alike 3.0 Unported
  • 2. Objectives Examine a brief history of ethics in research and data management Discuss pertinent principles of ethics in data management Discuss the concept of “data integrity” and ethics in data management Discuss applications for data management personnel in ethical use of data
  • 3. Outline Definitions Ethical Principles in Bioethics Guidelines and Regulations Data Integrity Applications for ethics and maintenance of data integrity
  • 4. Definitions In·teg·ri·ty n. 1. Strict adherence to a standard of value or conduct. 2. Personal honesty and independence. 3. Completeness: unity 4.Soundness Eth·ic n. 1. A principle of right or good conduct. 2. A system of moral values. 3. ethics (sing. In number). The branch of philosophy dealing with the rules of right conduct. Source: Webster’s II New Riverside Dictionary, Based on the Webster’s II New College Dictionary (1996)
  • 5. Ethical Principles Beneficence  Minimize harm  Maximize Benefits Respect of Persons (Autonomy)  Informed voluntary consent  Vulnerable subjects must be protected Justice  Equity in distributing risks and benefits between populations  “fairness” in dealing with research participants  Equity between institutions and research partners
  • 6. Clinical Data vs. Research Data: Are the Ethics Different? Privacy and Confidentiality Informed Consent vs. Implied Consent Data Integrity / Data Quality Data Security and Storage
  • 7. Ethical Guidelines (for Research) Declaration of Helsinki  ethical standard used by the International Committee of Medical Journal Editors  guidelines govern all medical research CIOMS Guidelines  Council for International Organizations of Medical Sciences  developed guidelines in collaboration with WHO Belmont Report National Guidelines (Kenya)
  • 8. Regulations US: Code of Federal Regulations Title 45, Part 46 (45CFR46) FDA– 21CFR50 and 56 NIH--“he who has the gold makes the rules” HIPAA—related both to clinical records and use of subject data in research
  • 9. 45CFR46 US Code of Federal Regulations Title 45, Part 46 (45CFR46)  Human Subjects Protections  IRB requirements  Protection of Vulnerable Subjects Human subject  Human subject means a living individual about whom an investigator (whether professional or student) conducting research obtains: (1) data through intervention or interaction with the individual, or (2) identifiable private information.
  • 10. Privacy/Confidentiality Applies to both clinical and research data Major concern for patients when it comes to electronic records and data Must be safeguarded by all members on the team
  • 11. HIPAA Health Insurance Portability and Accountability Act of 1996 (HIPAA), HHS issued regulations entitled Standards for Privacy of Individually Identifiable Health Information. For most covered entities, compliance with these regulations, known as the Privacy Rule, was required by April14, 2003.
  • 12. HIPAA and Privacy Rule The Privacy Rule, at 45 CFR parts 160 and 164, establishes a category of health information, defined as protected health information (PHI), which a covered entity may only use or disclose to others in certain circumstances and under certain conditions. Usually requires an individual to provide signed permission, known as an Authorization before a covered entity can use or disclose the individual's PHI for research purposes. Need for authorization may be waived in some instances by an IRB (and a Privacy Board)
  • 13. Individually Identifiable Information and Protected Health Information Includes any subset of health information, including demographic information, that identifies the individual (or there is a reasonable basis to believe that the information can be used to identify the individual). 1. Name 2. All elements of dates except Year. 3. SSN 4. Driver's License Number 5. Geographic subdivisions smaller than a State. 6. URL's and IP's 7. Vehicle Identifiers including VIN and License # 8. Phone numbers
  • 14. PHI Individually identifiable information becomes PHI when it is created or received by a covered entity:  US health plans  US health care clearinghouses  US health providers that transmit electronic health information A researcher is not a covered entity unless he/she is also a provider within a covered entity. Research is also governed by HIPAA if data is obtained from a covered entity. IRB may on occasion waive the HIPAA restrictions on use of PHI
  • 15. How does all this translate to practice? Electronic health information (clinical or research)  Can improve quality and safety of medical care (beneficence)  Is key to showing outcomes in research on health and health practices (beneficence)  Confidentiality and Privacy can be lost (breach of autonomy and beneficence)  Can be used without a patient’s knowledge or consent (breach of autonomy)  Might exclude some populations (breach of justice)
  • 16. Data Integrity The assurance that data is accurate, correct and valid. Accuracy and consistency of stored data, indicated by an absence of any alteration in data between two updates of a data record. Data integrity is imposed within a database at its design stage through the use of standard rules and procedures, and is maintained through the use of error checking and validation routines. Exact duplication of the sent data at the receiving end, achieved through the use of error checking and correcting protocols. Assurance that the data are unchanged from creation to reception.
  • 17. Data Integrity (2) Process to maintain data integrity depends on:  Collection (accurate representation)  Data transfer (accurate recording and transfer of data)  Storage and Security (preventing loss of data)  Sharing of Data  Use of data (analysis)
  • 18. Data Integrity (3) Fabrication and Falsification of data are one of the most serious challenges to data integrity Human error also contributes to loss of data integrity Concern about research misconduct was a primary motivation for a 1990 conference on data management sponsored by the US Department of Health and Human Services. Conference summarized the many ways in which the conduct of research depends on responsible data management.
  • 19. Data Integrity (4) Responsible research begins with experimental design and protocol approval It involves recordkeeping in a way that ensures accuracy and avoids bias It guides criteria for including and excluding data from statistical analyses It entails responsibility for collection, use, and sharing of data.
  • 20. Data Integrity (5) Everyone with a role in research has a responsibility to ensure the integrity of the data. The ultimate responsibility belongs to the principal investigator, but the central importance of data to all research means that this responsibility extends to anyone who:  helps in planning the study  collecting the data  analyzing or interpreting the research findings  publishing the results of the study  maintaining the research records.
  • 21. Data Collection and Integrity Because data collection can be repetitious, time- consuming, and tedious there is a temptation to underestimate its importance. Those responsible for collecting data must be adequately trained and motivated They should employ methods that limit or eliminate the effect of bias They should keep records of what was done by whom and when
  • 22. Analysis and Selection of Data The use of statistical methods varies widely among research disciplines and also clinical programs (reporting) It is a laudable ideal to analyze and report all data Because it is not possible to report everything that has been done, researchers must make decisions about which studies, data points, and methods of analysis to present.
  • 23. Analysis and Selection of Data (2) Must critically evaluate the reasons for inclusion or exclusion of data, the measures taken to avoid bias, and possible ways in which bias may nonetheless influence data selection Must clearly document how the data were obtained, selected, and analyzed-- especially if the methods are unusual or potentially controversial
  • 24. Retention of Data What should be retained? It may be impractical to store extraordinarily large volumes of primary data. At minimum, enough data should be retained to reconstruct what was done. How long should clinical records be retained?
  • 25. Sharing of Data This is considered an important part of responsible research. De-identified data should be shared so that others can verify your conclusions or analysis Sharing of personal patient information is NOT a good practice as noted in Privacy sections earlier.
  • 26. Data Security Limiting Access  Locked Paper Records Offices  Limiting access to Paper or Electronic records to appropriate personnel  Password Protection of electronic records  Defined privileges for electronic data users  Firewalls to prevent outside access Regular Backups and proper archiving
  • 27. Ownership of Data Who owns the data that is generated?  Patient?  Institution?  Funder?  Investigator?  Publisher?
  • 28. Ethics in Publication—General guidelines pertinent to data Research should strive to answer specific questions—not just collect or mine data Statistical issues (sample size) are an important part of design to ensure that the research data is likely to answer the question IRB approval is required when using human subjects, human tissues, or medical records
  • 29. Publication Ethics and Data Management/Data Analysis Data should be appropriately analyzed Inappropriate analysis is not necessarily ethical misconduct Fabrication or falsification of data is always ethical misconduct
  • 30. Publication Ethics and Data Management/Analysis Sources and methods of obtaining and processing data should be disclosed Data exclusions should be explained in full Methods used to analyze data should be explained in detail Post hoc analysis of subgroups is acceptable as long as this is disclosed Data Bias should be discussed in all publications of data or analysis
  • 32. THE WORK IS PROVIDED UNDER THE TERMS OF THIS CREATIVE COMMONS PUBLIC LICENSE ("CCPL" OR "LICENSE"). THE WORK IS PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE LAW. ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED.