Privacy and Confidentiality

Standard Operating Procedure

Human Research Ethics Committee, Faculty of Health Sciences, University of Cape Town

Privacy and Confidentiality

Policy

Protocols must describe provisions to protect participants’ privacy and to respect their right to be free from unauthorised intrusion. Investigators must be particularly vigilant when accessing personal or sensitive information without participants’ knowledge or consent, for instance when reviewing medical records or databases solely for research purposes.

All information relating to human participants in research studies must be kept secure and confidential to the extent permitted by law. This is to protect participants from potential harms, including stigmatisation, embarrassment and loss of insurance or employment. Researchers must provide a detailed plan of how participants’ private and personal information will be collected, stored and shared with others.

Purpose

The purpose of this policy is to outline minimum requirements to protect participants’ privacy and confidentiality when taking part in research.

Definitions

Privacy

Privacy in research is defined as having control over the extent, timing and circumstances of sharing oneself – physically, behaviourally or intellectually – with others. This means respecting an individuals’ right to be free from unauthorised or unreasonable intrusion relating to the individual’s private information, including control over the extent, timing and circumstances of obtaining such information. Privacy is concerned with participants or potential participants as ‘people’ in terms of access to personal information from or about them.

Confidentiality

Confidentiality relates to the use of information that an individual has disclosed in a relationship of trust and with the expectation that it will not be divulged to others in ways inconsistent with the original intent of the disclosure, without that individual’s permission.

Sensitive Information

Sensitive information is a sub-set of personal or private information and includes:

  • Sexual attitudes, preferences and practices.
  • Use of or treatment for alcohol, drugs or other addictive substances.
  • Illegal conduct.
  • Private information such as genetic information, financial affairs, such as earnings, sources of income.
  • Psychological well-being and mental health.
  • Stigmatising medical diagnoses such as HIV positivity, psychiatric illness.

Investigators must provide a detailed plan in the protocol and the informed consent documents of how they will protect privacy and confidentiality:

  • How will researchers identify and approach potential participants about enrolling in a study? How participants are identified may be an invasion of their privacy and confidentiality; for example, identifying potential participants from medical records to which researchers would not normally have clinical access, or searching databases such as disease registries or pharmacy records which contain personal information about patients.
  • How will researchers protect participants’ privacy during interaction and data collection in sub-optimal circumstances; for example, recording physical measurements of pre-teens in a school setting, eliciting private medical or financial information in a quasi-public setting?
  • What happens to information collected during screening interviews or telephone calls? Will the names of ineligible participants be maintained in a register in case they are eligible for future studies or will the data be destroyed?
  • Will members of the research team, including fieldworkers, data capturers and transcribers, sign a confidentiality agreement that they will not discuss or share research information with anyone other than the principal or other named researchers?
  • How will data be stored: in locked offices, in locked filing cabinets, on password-protected computers, or on computers that are not linked to a network?
  • Will data be coded to remove identifying details? Who will be able to link the code back to the participant’s identifying details? Will the key to the code be kept in a separate location or on a separate computer?
  • How long will data be stored for?
  • How will electronic or paper records of personal/sensitive information be disposed? Will audio or video recordings be destroyed and after what time span?
  • Is there an option and is it scientifically acceptable to collect data anonymously without any identifying details?
  • Under what circumstances may the coding system be broken?
  • Who will have access to participants’ personal information?
  • Researchers
  • Regulatory authorities (e.g. MCC, FDA)
  • Sponsors
  • Research Ethics Committee
  • Health Professions Council of South Africa

Written informed consent must be obtained for any public use of audio or videotapes, video recordings, photographs or other images (such as MRIs or CT scans) or verbatim quotations which show participants’ faces or disclose unique or identifying details.

Data gathering methods, including interviews, inventories, questionnaires, should include only essential personal information and should be administered using procedures and in circumstances that will protect participants’ privacy. Some participants may not want to be seen entering a facility which might lead to stigmatisation (for example, facilities known to treat illnesses such as HIV and tuberculosis or known to provide termination of pregnancies).

If a study involves a focus group:

In the case of focus groups, the informed consent document must state that the researcher cannot guarantee confidentiality as participants may disclose information shared during the focus group session outside the research setting. The researcher can ask participants to respect each others’ confidentiality. Participants may also prefer to use pseudonyms in place of their own names.

Suggested wording in an informed consent form:

Taking part in the focus group may involve some loss of privacy; however, we will keep your records as confidential as possible. We will ask you and the other people in the focus group to use only first names during the group sessions. We will also ask group members not to tell anyone outside the group what any particular person said in the group. However, we cannot guarantee that everyone will keep the discussions private. Only the researcher and assistant will have access to your study records and the tape-recordings. After the group discussions have been copied from the tapes, the tapes will be destroyed. Your individual identities will not be used in any reports or publications that may result from this study.

Legally-required Release of Personal Information

If observed or disclosed during a research study, researchers have a legal obligation to report the following:

  • Child physical or sexual abuse or neglect.
  • Family violence.
  • Notifiable diseases, e.g. tuberculosis.
  • Information sought under a warrant or subpoena, e.g. criminal or civil litigation.
  • In FDA-related research, incidents involving medical devices [21 CFR 803].

When protocols are able to identify in advance that there is a possibility researchers might need to disclose legally-mandated information, this needs to be stated in the informed consent form so participants can factor any risks to their privacy into their decision to take part in a study. See the policy ‘Research Involving Children’ for further guidance on mandatory reporting requirements.

Protocols may require researchers and other parties such as transcribers and observers to sign a confidentiality agreement. Examples of clauses in confidentiality agreements might include the following:

For the researcher(s):

  • I/we will maintain patients’ confidentiality and wherever possible data will be recorded anonymously.
  • I/we will not disclose individually-identifiable information except to researchers who sign this agreement, and members of the Human Research Ethics Committee which is responsible for monitoring, auditing and reviewing the activities of researchers engaged in human research.
  • I/we will store the information in a secure place (e.g. locked cupboard or password-protected computer).
  • I/we will destroy any identifiable information as soon as the purpose of data collection has been achieved.
  • I/we will report and publish research findings in a way that protects participants’ identities.
  • I/we the undersigned acknowledge and accept these commitments.

For fieldwork assistants/transcribers:

  • I/we will keep all the research information shared with me/us confidential by not discussing or sharing the information in any form or format (e.g. tape or audio recordings, transcripts, field notes).
  • I/we will keep all the research information in any form or format (e.g. tape or audio recordings, transcripts, field notes) securely in a locked cupboard while it is in my/our possession.
  • After I/we have reported to and discussed my/our findings with the researcher(s), I/we will destroy all research information in any form or format (e.g. tape or audio recordings, transcripts, field notes, information stored on a hard drive) that I/we do not return to the researcher(s).
  • I/we the undersigned acknowledge and accept these commitments.

Databases, Registries and Repositories

Databases and tissue banks are exclusively concerned with obtaining, maintaining and accessing participant health information, often including personal health information, for research, over long periods of time. This may pose particular risks to participants’ privacy and confidentiality. The Human Research Ethics Committee requires researchers to explain in the initial repository protocol and informed consent form:

  • What information will be collected.
  • How it will be stored.
  • Who will have access for research purposes.

The Committee also requires that new protocols be submitted for each future use of stored data or specimens which include personal identifying details. See the related policy on ‘Databases, Registries and Repositories’ for more detailed guidance on maintaining confidentiality when collecting, storing and sharing information in studies which use databases, registries and repositories.

Last Revised January 20131