ࡱ> |{ j=bjbj 4l}c}c=5, 55555III8 4IpPA"   F*FOOOOOOO$R6UP5VVVP55  *P` ` ` V5 5 O` VO` ` IX7M P>2^J(O@P0pPK UUP7M7MU5MVV` VVVVVPPlVVVpPVVVVUVVVVVVVVV : Ƶ Institutional Review Board Guidelines for HIPAA in Research A. Introduction The HIPAA Privacy Rule established national standards to protect individuals medical records and personal health information. The rule requires appropriate safeguards be in place to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. Ƶ is a covered entity subject to HIPAA regulations; as such, Ƶresearchers are expected to conduct research in accordance with HIPAA regulations and related institutional policies. These guidelines are in place to assist researchers with conducting research in compliance with HIPAA. B. Definitions Protected Health Information (PHI) is individually identifiable personal health information that is a subset of health information, including demographic information collected from an individual, and: Is created or received by a health care provider, health plan, public health authority, employer, life insurer, school or university, or health care clearinghouse; and Relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual; and That identifies the individual; or With respect to which there is a reasonable basis to believe the information can be used to identify the individual. Health care means care, services, or supplies related to the health of an individual. Health care includes, but is not limited to, the following: Preventive, diagnostic, therapeutic, rehabilitative, maintenance, or palliative care, and counseling, service, assessment, or procedure with respect to the physical or mental condition, or functional status, of an individual or that affects the structure or function of the body; and Sale or dispensing of a drug, device, equipment, or other item in accordance with a prescription. Personal identifiers HIPAA defines the following as personal identifiers. Limited identifiers are shown in bold text. Names; Social security numbers; Telephone numbers; Linkable code or any other unique identifying number (not including a code/subject ID assigned by the investigators); All geographic subdivision smaller than a state including street address, city, county, precinct, zip code and their equivalent geocodes except for the initial three digits of a zip code*; All elements of dates** (except year) for dates directly related to an individual, including dates of admission, discharge, or service, and date of birth/death; Fax numbers; E-mail addresses; Medical record numbers; Health plan beneficiary numbers; Account numbers; Certificate/License numbers; Vehicle identifiers and serial numbers; Device identifiers and serial numbers; Web universal resource locators (URLs); Internet Protocol (IP) address numbers; Biometric identifiers, including finder and voice prints; Full face photographic images and any comparable images; and Any other unique identifying number, characteristic or code. *Addresses- All geographical subdivisions smaller than a state, including street address, city county, precinct, zip code, their equivalent geocodes, except for the initial three digits of the zip codes, if according to the current publicly available data from the Bureau of the Censes: (1) geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; and (2) The initial three digits of the zip code for all such geographic units containing 20,000 or fewer people is changed to 000. **Dates- All elements of dates (except year) for the dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older. C. Categories of Data Identification There are 3 different categories: De-identified- all personal identifiers listed above have been removed from the dataset and the researcher has no knowledge that a participant could be re-identified based on the remaining information. Limited Data Set- identifiers in the dataset are limited to dates (admission, discharge, service, DOB, DOD); city, state, five digit zip code; and age as shown in bold text in the list of identifiers above. Identifiable Information- data contains PHI/one or more of the personal identifiers listed above. Note: there are additional standards and criteria to protect individuals from re-identification. Any code used to replace the identifiers in datasets cannot be derived from any information related to the individual and the master codes, nor can the method to derive the codes be disclosed. D. Addressing HIPAA in IRB Applications Investigators will be asked whether or not health information and/or PHI will be used, accessed, or collected and recorded in their research study. The following information describes how the different categories of health data relate to IRB review. NOTE: if investigators must access PHI from anyone other than their own patients to determine if a research study is feasible, the HYPERLINK "/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/prep_to_research_form.doc"Preparatory to Research Review Application should be completed and submitted to the ƵPrivacy Officer for approval before accessing PHI. Studies that involve prospective data collection in which health information is received from an interaction (including survey research) or intervention with research participants typically require expedited or fullboard review (depending on the nature of the study). Exempt category #2 research does not allow for collection of health information. HIPAA must be satisfied by obtaining HIPAA Authorization from the participant (or their guardian/LAR) or by requesting a waiver of HIPAA Authorization from the IRB. The ƵHYPERLINK "/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/hipaa_authorization_form.doc"HIPAA authorization form is separate from the Informed Consent form. The HIPAA authorization form should be submitted with your expedited or fullboard IRB application. Studies only involving prospective data collection from patient charts may qualify for a waiver of authorization if the investigators can demonstrate that obtaining authorization is not practicable. These studies typically qualify as expedited category #5 research. Studies that involve retrospective data collection from medical records or other existing health information sources can fall into different categories of IRB review depending on the type of health information that is accessed/obtained and recorded. De-identified Information: Studies in which health data are obtained from an external source (outside of SLU) without identifiers may qualify as not human subjects research. Researchers should complete the HYPERLINK "/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/hsr_determination_form.docx"HSR Determination Form to determine if an IRB Application is required, and any requests for agreements (such as code access agreement) should be followed. Researchers who access PHI from internal (Ƶor SSM sites in which Ƶphysicians practice) medical records or other existing sources and record data in a de-identified fashion as defined above typically qualify for review under exempt category #4. This is unlike scenarios where identifiers or a coded master list is needed which does not qualify for exempt review (typically these are expedited category #5). In the HIPAA page of the IRB application, researchers should indicate that no identifiers will be recorded. Limited Identifiers/Limited Dataset: Studies in which health data are obtained from an external source (outside of SLU) with only limited identifiers as defined above may qualify as not human subjects research. Researchers should complete the HYPERLINK "/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/hsr_determination_form.docx"HSR Determination Form to determine if an IRB Application is required, and obtain an external Data Use Agreement (DUA). The providing entity should initiate the DUA. Researchers who access PHI from internal (Ƶor SSM sites in which Ƶphysicians practice) medical records or other existing sources and record data with only limited identifiers as defined above typically qualify for review under exempt category #4. This is unlike scenarios where identifiers or a coded master list is needed which does not qualify for exempt review (typically these are expedited category #5). In the HIPAA page of the IRB application, researchers should indicate that only limited identifiers are recorded. An internal data use agreement (DUA) should be completed in the IRB Application. Identifiable Protected Health Information (PHI): Studies in which health data are obtained from an external source (outside of SLU) with identifiers as defined above require IRB review, typically under expedited category #5. Study participants must provide authorization for research use of their health information or the researchers must justify a waiver of authorization in their IRB Application. Note: If the only identifier provided to the Ƶteam is a code that the external collaborator can connect to individuals but the Ƶteam cannot, this can be considered de-identified for Ƶ see de-identified scenarios for guidance. Researchers who access PHI from internal (Ƶor SSM sites in which Ƶphysicians practice) medical records or other existing sources and record data with identifiers as defined above (including with codes that can be linked to individuals through a master list) typically qualify for review under expedited category #5. Study participants must provide authorization for research use of their health information or the researchers must justify receiving a waiver of authorization in their IRB Application. E. Other HIPAA Approvals/Forms HIPAA Authorization Form: A statement, signed by the research participant, that gives the researcher permission to use/disclose PHI collected during the research study for defined purposes. The ƵHYPERLINK "/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/hipaa_authorization_form.doc"HIPAA authorization form is separate from the Informed Consent form and should be submitted with the IRB application for review. HIPAA Waiver of Authorization: A request to forgo the authorization requirement because the disclosure of PHI is minimal risk to the subject and the research cannot practically be done without access to/use of PHI. Requests for waiver of authorization should be included in the IRB Application. The IRB can act as a privacy board to grant waivers of HIPAA Authorization. Decedent Research: PHI is used/obtained/recorded is only from deceased (prior to the study) persons records/specimens. Complete the HYPERLINK "/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/notification_of_decedent_research.doc"Notification of Decedent Research form and submit to the IRB office before conducting the research. Business Associates Agreement: If you are disclosing PHI to a third party that performs a service on your behalf,  HYPERLINK "http://www.slu.edu/Documents/research/IRB/BAA_Decision_Tree.pdf" you may need to sign a business associate contract with the recipient. Contact the ƵPrivacy Officer to initiate the agreement. Internal Data Use Agreement: Studies that have been deemed not to qualify as human subjects research but use internal limited datasets require submission of an HYPERLINK "/research/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/dua_internal.doc"Internal DUA as assurance from the Ƶinvestigator that all obligations will be followed. External Data Use Agreement (Ƶproviding data): The HYPERLINK "/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/dua_external_slu_provider.doc"ƵData Use Agreement can be used when Ƶagents will be providing a limited dataset of health information to an external researcher. F. Investigator Responsibilities Submit IRB and HIPAA documents to the IRB or Privacy Officer in accordance with institutional policy and guidelines. Obtain HIPAA Authorization or HIPAA agreements as required by the IRB or Privacy Officer BEFORE research activities begin. Provide the ƵNotice of Privacy Practices to research participants as needed. Keep signed HIPAA Authorizations and/or other HIPAA agreements/records in research records in accordance with IRB approved procedures for a minimum of six years (or longer if other data retention requirements apply). Any violations in obtaining HIPAA Authorization must be reported to the IRB on a Report Form as a protocol violation. Notify participants in writing that requests to revoke HIPAA Authorization have been received and process as a subject withdrawal if needed.     PAGE  PAGE 5 6/2016 2AGRTWdhn{  f l     ȼxxk\h[F5KH$OJQJ\^JhfhkoOJQJ^JhfOJQJ^JhEz2OJQJ^Jh^qOJQJ^Jh.OJQJ^JhfhfOJQJ^JhfhfB*CJaJphh[FB*CJaJphhfh$B*phhB*ph#hbUh2@5CJOJQJ^JaJ#hbUhDG5CJOJQJ^JaJ2Td    u 3 & FgdDG & Fdd[$\$gd]) & Fd[$gd2@ & FgdDG & Fgd) & FgdH & FgdHgd2@gdf$a$gdfgd2@$a$gdbU   7 8 U ^ q o t u ~~p_H_-hHh)56B*OJQJ\]^Jph!hHB*OJQJ\]^Jphh)B*OJQJ^Jph!hfh)B*OJQJ^Jph-h)hH56B*OJQJ\]^Jphh)OJQJh.OJQJhfhOJQJhfh6OJQJhfh56OJQJ\"hHhH5KH$OJQJ\^J"hh2@5KH$OJQJ\^J23f;<=wƸrcrcrcrcWHhXahB*OJQJphhB*OJQJphhhB*OJQJphhsB*OJQJ\phhAB*OJQJ\phhKB*OJQJ\phhB*OJQJ\phhfh++56OJQJhfhA56OJQJ!hfh])B*OJQJ^Jph!hfh2@B*OJQJ^Jph-hfh2@56B*OJQJ\]^Jph3=!Ip7tgd&6Jh^hgd[F & F dd[$\$gdbUhdd[$\$^hgdbU,:KW[\vy GѶѶpbŪŪŪŪŪŪhs5B*OJQJphhbUhBYB*OJQJphhBY5B*OJQJph hbUhBY5B*OJQJphhBYB*OJQJphhB*OJQJphhz>hB*OJQJphhsB*OJQJphhhB*OJQJphhXahB*OJQJph hbUh5B*OJQJph&GHnostu~ít^^tNh[F5B*OJQJ^Jph+h[Fhy56B*CJOJQJaJph%h[Fh8UB*CJOJQJaJph%h[FhyB*CJOJQJaJph%h[Fh&6JB*CJOJQJaJph+h[Fh&6J56B*CJOJQJaJph(h[Fhy5B*CJOJQJaJphhfhB*OJQJphhB*OJQJphhsB*OJQJph-789:GIVbo@zznzbnVnJhyB*OJQJphhEz2B*OJQJphh>VB*OJQJphhsB*OJQJphhPrB*OJQJphhTB*OJQJph hbUhy>*B*OJQJphhfh1'B*OJQJphhfh])B*OJQJphhfhyB*OJQJphhfh8UB*OJQJph!hfhyB*OJQJ^Jphh)5B*OJQJ^Jph:5X'(z!{!""####% & F8^8gdbU^gdbU & F gdbUgd)F~gdm5 dd[$\$gdA & Fgd & Fgdygd&6Jgd8Ugd<45<WXY`zȹziXJ9!hXahCDB*OJQJ^JphhCDB*OJQJ^Jph!hbUhB*OJQJ^Jph!hbUhm5B*OJQJ^Jphh5KH$OJQJ\^J"hXahm55KH$OJQJ\^J"h^qh5KH$OJQJ\^JhTB*OJQJphhfhAB*OJQJphhsB*OJQJphhB*OJQJphhfhB*OJQJph hbUh>*B*OJQJph#&'(=X2* + zgzYzH7!hXahCDB*OJQJ^Jph!hXah^qB*OJQJ^Jphh<B*OJQJ^Jph$hbUh^q>*B*OJQJ^Jphh^qB*OJQJ^Jph!hbUh^qB*OJQJ^Jph!hXahB*OJQJ^JphhKOJQJ^JhbUhCDOJQJ^JhbUhCD0JOJQJ^J'jhbUhE*OJQJU^JhE*OJQJ^J!jhbUhCDOJQJU^J+ 3 4 y!z!{!!!B"""""""##󤖈zzlYH!hXah^qB*OJQJ^Jph$hbUhCD>**ϴ*ϴO*ϴ*ϴ<B*OJQJ^Jph!hXah<B*OJQJ^JphhbUh<0JOJQJ^J'jhbUhE*OJQJU^JhE*OJQJ^J!jhbUh<OJQJU^JhbUh<OJQJ^J#####R$S$$$$%%.%>%%%%%(''''''''{ϱձݴAc>*b󸿱<B*OJQJ^Jphh!WhCD0JOJQJ^J*jLhE*B*OJQJU^JphhE*B*OJQJ^Jph$jh!WB*OJQJU^JphhCDB*OJQJ^JphhCD^JaJhbUh^JaJhbUh>*^JaJ!hbUhCDB*OJQJ^Jph%%''''))2,3,e,f,..0000 0^`0gd & FgdP 8^8gdP  & FgdP  gdbU  & F8^8gdbU & F8^8gdbU & F gdbU^gdbU  & F8^8gdbU8^8gdbU''((&)')()>)?))))))))-*g*++1,2,3,c,d,ɳפꎃ{pe]WK@hbUh^JaJhbUh>*^JaJ hP ^JhP ^JaJhbUhP ^JaJhbUh<^JaJhc^JaJhXah<^JaJh<^JaJhcB*OJQJ^Jphhch<0JOJQJ^J*jhE*B*OJQJU^JphhE*B*OJQJ^Jph$jhcB*OJQJU^Jphh<B*OJQJ^JphhCD^JaJd,f,-'-(-r---. ........../l////0000000000011ûóó|sh`h`hhia3^JaJh7hOF^JaJhia3>*^JaJh7hOF>*^JaJhbUh5^JaJhbUh^JaJh`IB*^JphhOFB*^JphhOF^JaJh`I^JaJh7hP ^JaJh`IB*OJQJ^JphhOFB*OJQJ^JphhP B*OJQJ^JphhP ^JaJ$0022+4,455778899: ::;`;:<<==?= & FgdbU 0^`0gdbUgdgd 0^`0gdOFgdbU 0^`0gd11223242G2H2x2~222222222333333333*4+4,4=4D4f4444444W5𾶾sjhbUhU^JaJhbUh^JaJhbUh>*^JaJhOF>*^JaJhOF^JaJh7hOF>*^JaJhia3^JaJh7hOF^JaJh7hOF0J^JaJ#jh7hE*U^JaJhE*^JaJjh7hOFU^JaJ&W5X5Y55555263666666666777"77777?8ƺƨޕƍƍ}t}iZRhE*^JaJjhbUhXaU^JaJhbUhia3^JaJhc>*^JaJhc^JaJh^JaJhia3^JaJ$hbUh0J>*B*^JaJph#j hbUhU^JaJhbUh>*^JaJhbUh^JaJhbUh0J^JaJjhbUhU^JaJ#jChbUhE*U^JaJ?8@8A8M8N8R8{8888888q9r9s9999999:: :':/::ƻƳrh^T^NFFh^JaJ h^JhbUh5^JhbUhOF5^JhoTOJQJ^Jhchc0J^JaJj hE*U^JaJhE*^JaJjhcU^JaJhc^JaJhc>*^JaJhia3^JaJhbUhc^JaJhbUhia3^JaJhbUhia30J^JaJjhbUhXaU^JaJ#j hbUhE*U^JaJ::::::;@;^;:<<<<===>=@=A=C=D=F=G=I=J=P=Q=R=T=U=[=\=]=^=_=`=e=f=h=i=ƻ{o`hfh\CJOJQJaJhoTCJOJQJaJhCJOJQJaJhE*0JmHnHuh\ h\0Jjh\0JUhJ jhJ UhbUh^JhbUh^JaJhbUhia3^JhXah^JaJh7hia3^JaJhia3hia3^JaJh^JaJhia3^JaJ%?=@=B=C=E=F=H=I=R=S=T=_=f=g=h=i=j= & FgdbUgd!Sth]hgd!St &`#$gdRi=j=hbUh^J21h:p~n/ =!"#$% DyK yK 2https://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/prep_to_research_form.docyX;H,]ą'cDyK yK 8https://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/hipaa_authorization_form.docyX;H,]ą'cDyK yK 6https://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/hsr_determination_form.docxyX;H,]ą'cDyK yK 6https://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/hsr_determination_form.docxyX;H,]ą'cDyK yK 8https://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/hipaa_authorization_form.docyX;H,]ą'cDyK yK Jhttps://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/notification_of_decedent_research.docyX;H,]ą'c DyK yK http://www.slu.edu/Documents/research/IRB/BAA_Decision_Tree.pdfyX;H,]ą'cDyK yK 2https://www.slu.edu/research/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/dua_internal.docyX;H,]ą'cDyK yK :https://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/dua_external_slu_provider.docyX;H,]ą'c !v2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@666_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH n@n 2@ Heading 1$dd@&[$\$a$'5B* CJKH$OJQJ\^JaJphfDA`D Default Paragraph FontRiR  Table Normal4 l4a (k (No List B^@B 2@ Normal (Web)dd[$\$4@4 2@Header  !4 @4 2@Footer  !>"> ~n Footnote TextCJaJ@& 1@ ~nFootnote ReferenceH*.)@A. !St Page NumberHRH ( Balloon TextCJOJQJ^JaJ.X a. fEmphasis6]4U`q4  Hyperlink >*</< YJhrichCJOJQJ^JaJphB' B .Comment ReferenceCJaJ<< . Comment TextCJaJ:: .Comment Text Char@j@ .Comment Subject5\F/F .Comment Subject Char5\:B@:  Body Text OJQJaJ@/@ Body Text Char CJOJQJ@@@ < List Paragraph ^PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭VGRU1a$N% ʣꂣKЛjVkUDRKQj/dR*SxMPsʧJ5$4vq^WCʽ D{>̳`3REB=꽻Ut Qy@֐\.X7<:+& 0h @>nƭBVq1u`X=:tڣf{Xx {dV=|kPo۵(h[x )IеnW[@;0PDbRy( "IROnVxCD' bJZ65I[adH+^D )>s=h ۟~7zWo^=[Qr||[?|̦ o{O=4?}}L$Xx%@|Ư'11%i$P,c[GD7sH5. 4kIƉZKTPBM HN7|nB#L7^`!\29pCH3nMb#$.'19b%+vJ~.!DI;DPz l 2I ͚;|y3+~Dؕjw0e1vdǪzO^I57y+d8bnv 4?6CK\M#= ċ(0'1 zxpWc/_X4/A_[)^&(fp[_NiK7@wd5= I?>q샏ꚝΡ5Ӵ>3m=͡|7;:۱&?8ټ<}9H}]Ru Vx~p{3AsP~\v!cZ 6JOw׃SB HfЖ gpj*4nR2BM} rfw[BfV= vͅh7/sɳ ̲B3뤓eH=J_:hn$O\ʧFn;/x.M#+d,W87+IwOťwF) uepwPϬ pV$2v Sv(C8L\~+l`k& Y iTU#p~XHYHeʹ,fͰ-;Y7XmM 9ͬYMm*/稺W(r2bUGڱ]]HYUcF8U~ۍZZnJmi}kn^l j5l +++. G+ #'d,1W5?8:i=j=!"$%&()*+-.012353%0?=j= #',/43R '!>!)3*G*,X--2.../@0M00r11j5XXXXXXXXX  .!!8@0(  B S  ?phi _Hlt439232900 _Hlt439232901B*B*k5@@7C*C*k5f4_hS '!)3*,X-/@00r1=5?5@5B5C5E5F5H5I5Q5T5^5h5k5~=5?5@5B5C5E5F5H5I5h5k53322XX4R ?!)3*,X-/@001<5=5=5@5@5I5Q5T5^5_5f5k522XX4R ?!)3*,X-/@001<5=5=5?5@5@5B5C5E5F5H5I5_5e5h5k5? 唂(^"XA3j$7B-4Nu3/7[oںUt2w2x\R>Iy7^`.^`o(.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.hh^h`OJQJo(hH^`56o(hH.pp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH8^8`o(. ^`hH.  L^ `LhH.  ^ `hH. x^x`hH. HL^H`LhH. ^`hH. ^`hH. L^`LhH.^`5OJPJQJ^J. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.hhh^h`OJQJo(hHhP^`POJQJo(hHh^`OJQJo(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJQJo(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hH^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.hh^h`OJQJo(hH^`56o(hH.pp^p`56o(hH.@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHP^`POJQJo(hH^`OJQJ^Jo(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hH^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.P^`POJQJo(hH^`OJQJ^Jo(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHW^W`o(. '^'`hH. L^`LhH.  ^ `hH. ^`hH. gL^g`LhH. 7^7`hH. ^`hH. L^`LhH.^`>*o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.? pNIIqo|d/V+WFF,]gw2xi>[<B-UtNu3/y 3j$ ^"6(                  *\T                           @0        b2m(               @0        T         ڈ                          s6 J&s6 dd.FzKn'JddzK X|{y* .j8NGv&u { T1'RP \0Nb++J >V>` #([%1!&(qq* '?>"fOiٳ&6$Kq8b(?,$ʰ!۲ѵմ)մf\5!‡<$H/Xa])fzE*s?fA^qw~nkoYJ@0^r-<2O&tc;Ft`IK2jRa B2@CDy~-)/:LhR'xZ [FBYK=5?5@1111j5@UnknownG.[x Times New Roman5Symbol3. .Cx Arialez Times New (W1)Times New Roman5..[`)Tahoma;Wingdings?= .Cx Courier NewA$BCambria Math"1hZGgm[FK-`K-`!24"5"5 3qHP ?K22!xx Part II: HIPAA AdministrativegibbonsmMaureen BresnahanP            Oh+'0 $ D P \ ht| Part II: HIPAA Administrative gibbonsmNormalMaureen Bresnahan3Microsoft Office Word@F#@^[@ jL@JK- ՜.+,D՜.+,\ hp  Ƶ`"5 Part II: HIPAA Administrative Title  8@ _PID_HLINKSAh 66&https://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/dua_external_slu_provider.doc)~https://www.slu.edu/research/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/dua_internal.docLU@http://www.slu.edu/Documents/research/IRB/BAA_Decision_Tree.pdf=*https://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/notification_of_decedent_research.doc7 https://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/hipaa_authorization_form.doc9 https://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/hsr_determination_form.docx9https://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/hsr_determination_form.docx7https://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/hipaa_authorization_form.doc1$https://www.slu.edu/research/faculty-resources/research-integrity-safety/institutional-review-board-irb/irb_assets/prep_to_research_form.doc  !"#$%&'()*+,-./012345689:;<=>@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijlmnopqrtuvwxyz}~Root Entry F@)>@Data 71Table?VWordDocument 4lSummaryInformation(kDocumentSummaryInformation8sMsoDataStore,>P>LIZQOCI05==2,>P>Item  PropertiesUCompObj r   F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q