Flashcards on CITI Training

Unlock all answers in this set

Unlock answers
question
Three principles of Belmont Report
answer
Respect for Persons Beneficence Justice
question
The Belmont Report Principle of Beneficence
answer
MAXIMIZATION of benefits and MINIMIZATION of risks
question
T/F Belmont Report indicates it is necessary to rigorously avoid conflicts of interest
answer
TRUE
question
The Belmont Report Respect for Person
answer
Requires that subjects freely choose to participate in research (voluntariness) and that they are adequately informed about a study (informed consent)
question
The Belmont Report defines and delineates...
answer
"Practice" and "Research"
question
The Belmont Report The Principle of Justice
answer
Research benefit and burden distribution and that selection of subjects is fair.
question
T/F The Belmont report describes the necessity to effectively manage conflicts of interest
answer
FALSE
question
Students in Research The history of ethical regulations in human subjects research began with the
answer
Nuremberg Code
question
Nuremberg Code
answer
Human subjects research guidelines and regulations
question
Year of the Nuremberg Code
answer
1949
question
Additional resources regarding IRB approval process
answer
Faculty advisor/Research Mentor IRB office Human subjects research websites
question
What element must be included in an informed consent?
answer
All foreseeable risks and discomforts
question
Which type of IRB review does not require and IRB approval but DOES require a Determination by the IRB?
answer
If the study qualifies for EXEMPTION
question
Another name for the "Exempt" status
answer
the Common Rule stated in Title 45 Part 46 Subpart A
question
How can faculty researchers avoid coercion of student subjects?
answer
Avoid using their own students in their research
question
Name the type of Review: Research study that involves use of educational tests, survey, interviews, or observations of public behavior without identifiable information.
answer
Exempt Review category 2
question
Name the type of review: A study involving data collected that could have an impact on human subject's careers and it contains identifiers of the subjects.
answer
Full Board Review
question
Type of review that qualifies if no identification of subjects and/or their responses would reasonably place them at risk of criminal or civil liability or be damaging to the subjects financial standing, employability, insurability, reputation, or be stigmatizing, unless reasonable and appropriate protections will be implemented so that risks related to invasion of privacy and breach of confidentiality are no greater than minimal
answer
Expedited review
question
Type of review: data that is collected does not meet definition of human subjects research as stated by federal regulations. No info ABOUT human ie. info about a business
answer
Not Human Subjects
question
Federal regulations define human subjects as "living individual about whom an investigator conducting research obtains"...? (2 components)
answer
"1.data through intervention or interaction with the individual 2. identifiable private information"
question
Name the 3 responsibilities the IRB is charged with
answer
1. Protecting the rights and welfare of human subjects 2. Assuring that all applicable institutional policies and federal regulations related to research with human subjects are followed 3. Reviewing subject recruitment materials and strategies
question
T/F IRB's investigate scientific misconduct
answer
False
question
T/F IRB's do not review manuscripts prior to submission for publication
answer
True
question
DHHS FDA
answer
Depts. IRB's review for current policies -Department of Health and Human Services -Food and Drug Administration
question
Name the study that links most directly to the establishment of the National Research Act in 1974 and ultimately the Belmont Report and Federal regulations for human subject protection
answer
The Public Health Service Tuskegee Study of Untreated Syphilis in the Negro Male
question
The Tuskegee Study relates to which Belmont principle?
answer
The principle of beneficence: Potential benefits justify the risks of harm
question
Humphreys collecting data for the Tearoom Trade study under the pretense that he was a lookout is an example of a violation of the principle of:
answer
Respect for persons Belmont Report
question
According to the Belmont Report, the moral requirement that there be fair outcomes in the selection of research subjects, expresses the principle of:
answer
Justice
question
How is the principle of beneficence applied to a study involving human subjects?
answer
Ensuring that risks are reasonable in relationship to anticipated benefits.
question
Human subject study or not? Developmental psychologist videotapes interactions between groups of toddlers and their care givers to determine which intervention methods most effectively manage aggression
answer
Yes
question
Human subject study or not? The study of a list with deceased passengers
answer
No:Human subject is a living individual
question
Human subject study or not?Questioning individuals to acquire data about the number of newly diagnosed HIV cases?
answer
No: 'what' question rather than 'who' question
question
Human subject study or not? Conducting linguistic analysis of comments posted on a public blog
answer
Not: involves neither interaction with individuals nor collecting private identified info
question
Human subject study or not? A study proposed by developmental psychologist involving interactions with living individuals and designed to contribute to field of knowledge
answer
Yes: humans
question
Human subject study? A cognitive psychologist enrolls undergraduate students for a computer-based study about the effect of mood on problem solving behaviors
answer
Yes: Interacting w/ living individuals.
question
Human subject study or not? Questioning a superintendent of schools to acquire data about the ethnic composition of a school
answer
No: it is an "about what" question rather than "about whom" question
question
Human subject study or not? Study of 20 4th grade classrooms in which researchers ask the schools to systematically vary the time of day reading is taught, and collect weekly assessments of reading comprehension for each child over 3-month period
answer
Yes: contributes to generalizable knowledge about student performance and research question can only be answered using systematic investigation
question
Human subject study or not? Info collected by play ground designer
answer
No: does not involve info about human subjects even though there is interactions between designer and school staff.
question
Human subject study or not? An analysis of aggregate data
answer
No: doesn't involve interactions w/ living individuals nor collection of private identifiable data
question
Human subject study or not? An economic feasibility study
answer
No: does gather info from people with relevant info and expertise but does not meet the definition of research w/ human subjects, because the intention of the study is to answer "about what" ? rather than "about whom" ?
question
According to fed. regulations, human subjects are living human beings about whom an investigator obtains data through interactions or intervention with the individual or:
answer
identifiable PRIVATE information (Public info does not meet criteria)
question
Subpart of DHHS regulations provides additional protections for which vulnerable populations?
answer
1. Pregnant women 2. Fetuses 3. Neonates 4. Prisoners
question
Subpart of DHHS regulations Does NOT provide additional protections for which vulnerable populations?
answer
1. elderly 2. students 3. for persons whose decision-making capabilities are impaired
question
The expedited review process may be used when the study procedures pose:
answer
No more than minimal risk and the research activities fall within regulatory categories identified as eligible
question
The expedited review process may NOT be used when the study procedures pose:
answer
-more than minimal risk, even if the subjects are adults, -the sponsor is in a hurry -the study replicates previously approved research
question
Continuing review of an approved and ongoing protocol...?
answer
Must occur within 12 months of the approval date (even if no additional risks have been identified)
question
Continuing review process must include:
answer
-unanticipated problems -number of subjects accrued -recent relevant literature -copy of current consent form
question
T/F Officials of the institution may overrule an IRB approval
answer
True, however no one may overrule if an IRB disapproved a protocol
question
An investigator wishes to study generational differences in coping mechanisms among adults who experiences abuse as children. Adequate meausre will be instituted to obtain consent and ensure that there is no breach of confidentiality. The most likely additional risk is that some subjects may:
answer
Experience emotional or psychological distress
question
If disclosure of a subject's involvement in a specific research study can be potentially harmful to the subject, and the consent form is the only record linking the subject to the research, which would be the most helpful?
answer
Obtain a waiver of documentation of informed consent
question
The primary purpose of a Certificate of Confidentiality is to:
answer
Protect identifiable research info from compelled disclosure
question
Certificates of Confidentiality protect sensitive info provided by research subjects from:
answer
civil, criminal, or administrative subpoena
question
T/F Risk should be evaluated solely by the magnitude or severity of expected harm, not probability
answer
False: Risk must be determined by assessing magnitude (or severity) and probability (or likelihood) of harm. Both elements must be considered.
question
Risks are specific to:
answer
Time, situation, and culture
question
A researcher who is also a care provider needs to be very clear that a decision to participate or not in a study will:
answer
Not affect future care
question
T/F The fact that a therapist has access to her clients' records as a clinician entitles her to use info in the records for research purposes w/out parental permission nor child assent
answer
False: S/he needs both parental permission & child assent
question
T/F School authority's permission to conduct research replaces the need for permission and assent
answer
False
question
T/F Children's right to choose cannot be overridden in the pursuit of an indeterminate community interest
answer
True, it cannot be overridden
question
Appropriate criterion for waiving informed consent when subjects are provided additional pertinent information after the study
answer
informing participants they were assigned to a study based on undesirable or unflattering physical characteristics for example, or anything that may be judged negative or distressing would be considered appropriate criterion
question
A waiver of the requirement for documentation of informed consent may be granted when:
answer
The only record linking the subject and the research is the consent document and the principal risk is a breach of confidentiality
question
As part of the consent process, the federal regulations require researchers to:
answer
Provide potential subjects with information at the appropriate reading comprehension level.
question
Data are made anonymous by
answer
Destroying all identifiers connected to the data.
question
In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which confidentiality procedure would protect against compelled disclosure of individually identifiable information?
answer
Securing a Certificate of Confidentiality.
question
When a focus group deals with a potentially sensitive topic, which statement about providing confidentiality to focus group participants is correct?
answer
The researcher cannot control what participants repeat about others outside the group.
question
A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identifying information would be retained, and the researcher adhered to that component. Which of the following statements best characterizes what occurred?
answer
There was neither a violation of privacy nor a breach of confidentiality
question
Which of the following constitutes both a breach of a confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects' privacy (the right of the individuals to be protected against intrusion into their personal lives or affairs)?
answer
A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified.
question
An investigator is examining the quality of life for prisoners who are HIV positive using surveys followed by interview. The IRB must ensure that:
answer
Confidentiality of the prisoners' health status is maintained
question
Which of the following statements about prison research is true?
answer
Researchers may study the effects of privilege upgrades awarded by the prison.
question
An investigator is studying women recently admitted to a state prison. All potential subjects must have children under the age of five. Research subjects will be given a basket of toys to use at their children's first visit that the children can then take home. In assessing this proposal, the IRB needs to determine that the toys are:
answer
Not an excessive incentive.
question
A graduate student wants to examine the effect of print media versus televised media on individuals' position on several social issues. The superintendent of a local work release facility, a family friend, will allow the graduate student access to the prison population to help her quickly accrue subjects. The student's IRB should:
answer
Not approve this project because the prisoners are merely a population of convenience for the student.
question
Which of the following statements most accurately describes the requirement for the documentation of minors' assent to participate in research
answer
Federal regulations do not require the documentation of minors' assent.
question
According to Subpart D, research with children may be eligible for exemption when:
answer
The research involves the use of educational tests
question
A researcher asks an IRB to waive the requirement for parental permission for a study conducted in schools because the nature of the research requires participation of all the children present in classrooms on the day the research will take place. Assuming that the basic research design could be approved by the IRB and the school, which of the following requirements must be met before an IRB could waive parental permission?
answer
The research must pose no more than minimal risk.
question
A study that involves interviews of adults is eligible for expedited review. The researcher wants to add an adolescent population (aged 12 to 17) to the study and has designed a parental permission and assent process. No additional changes are planned. Which of the following statements about review of the revised protocol is accurate?
answer
Unless the nature of the questions would raise the level of risk to more than minimal for adolescents, the research would still qualify for expedited review.
question
Parental notification, in lieu of active parental permission, is allowed when:
answer
An IRB has approved a waiver of the requirement for parental permission.
question
According to Subpart D, which of the following research activities with children would qualify for an exemption?
answer
Research about educational testing
question
The purpose of the Family Educational Rights and Privacy Act (FERPA) is to:
answer
Provide parents certain rights over their children's educational records.
question
Which federal regulation or law governs how researchers can obtain data about subjects' disciplinary status in school from academic records?
answer
The Family Educational Rights and Privacy Act.
question
Which of the following is the LEAST important activity when protecting human subjects in international research?
answer
Assessing transportation conditions
question
The age of majority in international research is determined by the
answer
Laws, customs, and norms in the area in which the research will be conducted.
question
Which of the following activities constitutes engagement in research?
answer
Obtaining informed consent and conducting research interviews.
question
Researchers endeavoring to conduct an on-line study should consider that there are some potential risks of harm to subjects unique to Internet-based research. One of these risks is:
answer
Individuals may post private identifiable information about themselves on-line without intending it to be public and available to researchers
question
Which of the following on-line research strategies raises the most concerns regarding the ethical principle of respecting the autonomy of research subjects and the corresponding federal regulations requiring informed consent?
answer
A researcher proposes to join a moderated support group for cancer survivors posing as a survivor. She plans to insert comments to see how the members respond.
question
Consent to participate in research is an ongoing process. Which of the following strategies would help ensure that participation in a survey about a sensitive personal topic remains voluntary throughout a study?
answer
Designing the survey so that subjects are not forced to answer one question before going to the next.
question
To minimize potential risks of harm, a researcher conducting an on-line survey can:
answer
Design the survey so that no direct or indirect identifiers are collected.
question
Which of the following examples of using the Internet to conduct research meets the federal definition of research with human subjects?
answer
Conducting an on-line focus group with cancer survivors to determine familial support systems. The researcher also invites subjects' significant others to be a part of the focus group.
question
A HIPAA authorization has which of the following characteristics:
answer
Uses "plain language" that the data subject can understand, similar to the requirement for an informed consent document.
question
When required, the information provided to the data subject in a HIPAA disclosure accounting ...
answer
must be more detailed for disclosures that involve fewer than 50 subject records
question
If you're unsure about the particulars of HIPAA research requirements at your organization or have questions, you can usually consult with:
answer
An organizational IRB or Privacy Board, privacy official ("Privacy Officer"), or security official ("Security Officer"), depending on the issue.
question
Recruiting into research ...
answer
can qualify as an activity "preparatory to research," at least for the initial contact, but data should not leave the covered entity.
question
HIPAA's protections for health information used for research purposes...
answer
supplement those of the Common Rule and FDA.
question
HIPAA
answer
Health Insurance Portability and Accountability Act of 1996
question
HIPAA privacy protections supplement those of
answer
other federal regulations (viz., the Common Rule and FDA), state law, and certification/accreditation requirements.
question
HIPAA protects
answer
protects identifiable health information (PHI) originating or held in covered entities. De-identified data is not protected, and not all identifiable health information is considered PHI either
question
Under HIPAA, research activity using PHI generally requires
answer
authorization. However, there are several alternatives that allow bypassing the authorization requirement.
question
Minimum necessary standards, disclosure accounting requirements, and the characteristics of authorizations (when required) must be
answer
understood by researchers when HIPAA applies
question
If you're unsure about the particulars at your organization or have questions,
answer
consult with your organization's IRB, Privacy Board or Privacy Official. For data security issues, consult with your organization's Security Official.
question
specified identifiers
answer
1.Names 2.All geographic subdivisions smaller than a State, including street address, city, county, precinct, zip code, and their equivalent geocodes, except for the initial three digits of a zip code if, according to the current publicly available data from the Bureau of the Census: a.The geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; and bThe initial three digits of a zip code for all such geographic units containing 20,000 or fewer people is changed to 000. 3.All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older; 4.Telephone numbers; 5.Fax numbers; 6.Electronic mail addresses; 7.Social security numbers; 8.Medical record numbers; 9.Health plan beneficiary numbers; 10.Account numbers; 11.Certificate/license numbers; 12.Vehicle identifiers and serial numbers, including license plate numbers; 13.Device identifiers and serial numbers; 14.Web Universal Resource Locators (URLs); 15.Internet Protocol (IP) address numbers; 16.Biometric identifiers, including finger and voice prints; 17.Full face photographic images and any comparable images; and 18.Any other unique identifying number, characteristic, or code.
question
Vulnerable persons are
answer
those who are less able to protect themselves than other persons in a given situation.
question
The Common Rule (45 CFR 46) has specific requirements for the following vulnerable populations,
answer
Pregnant Women, Human Fetuses and Neonates (Subpart B), Prisoners (Subpart C) and Children (Subpart D).
question
T/F Workers are considered vulnerable populations
answer
False
question
When workers are asked to participate in a research study, vulnerabilities related to the subject's employment may include:
answer
pressure from their co-workers, unions and employers. Pressure can be applied to workers in subtle ways such as an employer who comments that if the research concludes that the organization is spending more on healthcare than other similar organizations, there may be lay-offs, etc.
question
T/F When a research project includes the collection of biological samples, all planned future uses of the samples, identifiers, and the data obtained from the samples, must be fully explained to the research subject.
answer
True
question
A situation in which financial or other personal considerations have the potential to compromise or bias professional judgment and objectivity is an example of:
answer
Conflict of interest
question
Significant financial interest can be defined as:
answer
- Equity/stock interests (regardless of value) in a non-publicly traded company. - Intellectual property rights upon receipt of income related to such rights. - Consulting payments in excess of $5,000.
question
According to the DHHS 2011 updated of the PHS federal regulations, the threshold amount for reporting a significant financial interest (investigator and his/her spouse and dependents) is
answer
Greater than $5,000 of ownership in any single public entity/public company.
question
The 1998 FDA regulations for requiring disclosure of significant financial interest reflect which threshold:
answer
Any equity interest in a publicly held company that exceeds $50,000
question
Current NIH rules require investigators to disclose details regarding financial conflicts of interest to:
answer
Designated institutional officials
question
What constitutes "research" according to HIPAA?
answer
HIPAA defines research as any "systematic investigation, including research development, testing, and evaluation, designed to develop and contribute to generalizable knowledge
question
Who enforces HIPAA's protections?
answer
IRB Privacy Board Privacy Officer
question
Waivers and alterations of authorization requirement
answer
•Use or disclosure of the PHI involves no more than minimal risk to the privacy of the research subjects, based on the following elements: oAn adequate plan to protect any data identifiers from improper use and disclosure. oAn adequate plan to destroy data identifiers at the earliest opportunity consistent with conduct of the research (unless there is a health or research justification for retaining the identifiers, or such retention is otherwise required by law). oAdequate written assurances that the PHI will not be reused or disclosed to any other person or entity, except as required by law, for authorized oversight of the research project, or for other research for which the use or disclosure of PHI would be permitted by HIPAA. oThe research could not practicably be conducted without the PHI. oThe research could not practicably be conducted without the waiver.
question
Activities preparatory to research, decedents' information exceptions
answer
•Where the PHI will be used solely for reviews preparatory to research (e.g., for protocol development) and will not leave the covered entity. •Where the PHI refers solely to deceased persons (the covered entity may ask for documentation of death of all data subjects
question
T/F A researcher may use fully "de-identified" health data without any authorization from data subjects
answer
True
question
Grandfatherd research
answer
if all informed consents and other legal permissions required at the time were in place before HIPAA took effect (April 2003 in most cases), and have not changed since, no new HIPAA authorization is required.
question
minimum necessary standard
answer
the uses/disclosures must be no more than the minimum required for the described research purpose
question
accounting of disclosures
answer
•A list of all protocols for which their PHI may have been disclosed, along with the timeframe for those disclosures. •The purpose of those protocols, and the types of PHI sought. •The researcher's name and contact information for each study
question
Characteristics of authorizations
answer
•In "plain language" so that individuals can understand the information contained in the form, and thus able to make an informed decision. •Executed in writing, and signed by the research subject (or an authorized personal representative).
question
T/F revocations for HIPAA authorizations for research can be revoked at any time
answer
True Provided that the revocation is in writing
question
T/F It is permissible under HIPAA to discuss recruitment into research with patients for whom such involvement might be appropriate
answer
True
question
Retrospective" research
answer
use or disclosure of PHI for retrospective research studies may be done only with patient authorization -- or with a waiver, alteration, or exception determination from an IRB or Privacy Board
question
Risk of harm in social and behavioral sciences generally fall in three categories, which are:
answer
Invasion of privacy, breach of confidentiality, and study procedures
question
A researcher wishes to study generational differences in coping mechanisms among adults who experienced abuse as children. Adequate measures will be instituted to obtain informed consent and ensure that there is no breach of confidentiality. The most likely additional risk is that some subjects may:
answer
Experience emotional or psychological distress.
question
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use. Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by:
answer
Both the magnitude (or severity) and the probability (or likelihood) of harm.
question
Identify the example of when situation and time are key to assessing risk of harm in a research study:
answer
Asking women if they have had an abortion
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New