Category 1: Educational Practices
Research, conducted in established or commonly accepted educational settings, that specifically involves normal educational practices that are not likely to adversely impact students鈥 opportunity to learn required educational content or the assessment of educators who provide instruction. This includes most research on regular and special education instructional strategies, and research on the effectiveness of or the comparison among instructional techniques, curricula听or classroom management methods. [45 CFR 46.104(d)(1)]
Established or commonly accepted educational settings
Defined as: Settings where one would go to have an educational experience that is regularly offered in the location where the research will be conducted or that is commonly accepted in a specific culture or population.
These settings could include but are not limited to:
- Schools and universities
- Workplace educational programs and sites
- Libraries (e.g., adult learning classes)
- Boy or Girl Scout meetings
- Education in applied settings such as grocery stores that offer cooking or nutrition classes; a bicycle shop that offers repair and maintenance classes; woodworking instruction in a 鈥渕aker space鈥; craft classes in a craft store, etc.
- Professional development seminars or programs (e.g.听Toastmasters)
Normal educational practices
Defined as: Activities that could occur in the specific educational setting regardless of whether the research is conducted. This includes a variety of activities that normally occur in the classroom or that are considered "best practice." Examples include established teaching methods (not considered to be experimental) or curriculum, and commonly accepted classroom management techniques that are planned and implemented by the classroom teacher.
NOTE: Family Education Rights and Privacy Act (FERPA) and Protection of Pupil Rights Amendment (PPRA) regulations may apply to some research in educational settings. See the K-12 Education Research Guidance Document听for more information.
Special populations
Pregnant women can participate.
Prisoners cannot participate as the target population.
Children can participate.
- A study evaluating the effectiveness of a commonly accepted science curriculum. For the study, researchers will observe classroom instruction and collect quizzes and class evaluations that are part of the curriculum and classroom practices.
- A study comparing two curricula that are currently being implemented (or one that is current but recently replaced an older version). Researchers will observe classrooms as well as interview instructors about their experiences implementing the instructional materials and collect class evaluations.
- A study comparing driver's education curricula offered by area driving schools. The researcher will observe classes and compare driving test scores at the end of the courses.
- A study involving interviews of third grade teachers regarding their experiences and techniques with implementing new math standards. Researchers will obtain lesson plans and ask the teachers to provide reflective journals for one week.
- A study evaluating homework stress by interviewing 8th grade students on the amount of homework they receive and surveying their parents about their perceived stress level and sleep habits of their children.听No questions of sensitive nature.
- A study evaluating pharmacy continuing education.
Category 2: Educational Tests, Surveys, Interviews or Observation of Public Behavior听
Research that only includes interactions involving educational tests (cognitive, diagnostic, aptitude, achievement), survey procedures, interview procedures or observation of public behavior (including visual or auditory recording) if at least one of the following criteria is met:
- The information obtained is recorded by the investigator in such a manner that the identity of the human subjects cannot readily be ascertained, directly or through identifiers linked to the subjects.
- Any disclosure of the human subjects鈥 responses outside the research would not reasonably place the subjects at risk of criminal or civil liability or be damaging to the subjects鈥 financial standing, employability, educational advancement, or reputation; or
- The information obtained is recorded by the investigator in such a manner that the identity of the human subjects can readily be ascertained, directly or through identifiers linked to the subjects, and an IRB conducts a limited IRB review to make the determination required by 搂46.111(a)(7).
[45 CFR 46.104(d)(2)]
Limited review
Limited review requires the IRB to determine that there are adequate provisions for protecting confidentiality and privacy. This information is discussed in the Data Management and Provisions to Protect the Privacy Interests of Participants sections in the Exempt Protocol Template. The template provides information about what is听needed to satisfy this requirement.
Key points about identifiability
- Anonymous: No one (PI, research staff, other participants) can know if someone even participated in the research. For example, leaving a survey with an unmonitored collection box in a public place that the PI will collect after a certain amount of time has passed.
- Recorded in such a manner that the identity of the participant cannot readily be ascertained: There is an interaction with an individual for research purposes, but no identifiable data is connected to the research directly or through a coding system.
- Online surveys cannot collect URLs, IP addresses, email addresses.
- In-person surveys cannot be returned in a manner where researchers can see who participated
- Video/audio recordings and photographs are identifiable. They can be deidentified by removing names during transcription or using software to blur faces and identifiable characteristics.
- Interviews/focus groups are identifiable. They can be deidentified by not recording names or removing names during transcription.
- Recorded in such a manner that the identity of the participant can readily be ascertained:听Parts (ii) and (iii) allow data to be collected with identifiers. The PI should code the data to protect participants.
Definitions
- Risk of disclosure听(Part ii) means that the research can be exempt only when there are no significant detrimental consequences to the participant if identifiable information were disclosed outside of the research. Whether consequences would be significant and detrimental depends in part on context. For example, including a question about sexual identity in an interview study that investigates adults鈥 plans to change careers could be non-controversial (and exempt) in some locales but highly sensitive (and therefore non-exempt) in other places.
- Sensitive听topics include, but are not limited to, questions about sexual activity, drug use, political/ religious affiliations or opinions, medical diagnosis, illegal activity, or other questions whose answers could reasonably place the participants at risk of criminal or civil liability or be damaging to the participants鈥 financial standing, employability, educational advancement, or reputation.
- Sensitive topics may be included in Exempt Category 2 research if exposure to the questions themselves does not cause harm. For example, an anonymous questionnaire about sexually transmitted disease history may be acceptable under Exempt review, but questions regarding sexual abuse will require Expedited or Convened review. In the latter, a participant鈥檚 mere exposure to the question may elicit stress recounting emotional or disturbing events in their lives. In this case, you will need to submit a Non-Exempt Initial Application.
- Public听behavior refers to behavior taking place in a publicly accessible location in which the subject does not have an expectation of privacy (e.g., a public plaza or park, a street, a building lobby, a government building). If participants have a reasonable expectation of privacy (e.g.听medical exam room, private office) at the location where the researcher is conducting the observation, the project is not exempt.
Special populations
Pregnant women can participate.
Prisoners cannot participate as the target population.
Children can participate in Parts (i) and (ii) if the research only involves educational tests or the observation of public behavior when the investigator does not participate in the activities being observed.
- A study involving an online survey regarding workplace satisfaction at area firms.
- An observational study of children playing in a public park; the researcher takes notes of what occurs, recording children鈥檚 gender, race, and length of activity, but the researcher does not participate in the activities or interact with participants.
- Surveying teachers, nurses, or doctors about a technique or an outcome.
- Interviewing managers about a management style or best practice.
- Conducting a focus group about an experience or an opinion of a community program.
- A reading comprehension test that asks the participant to read a passage and then answer questions about it.
- A focus group involving college students and their STEM experiences.
- A study involving focus groups with expectant mothers regarding their understanding of post-partum depression.听
- A study involving an identifiable survey of college seniors regarding recreational drug use. (This is a study that would require limited IRB review.)听
Category 3: Benign Behavioral Interventions听
Research involving benign behavioral interventions in conjunction with the collection of information from an adult subject through verbal or written responses (including data entry) or audiovisual recording if the subject prospectively agrees to the intervention and information collection and at least one of the following criteria is met:
- The information obtained is recorded by the investigator in such a manner that the identity of the human subjects cannot readily be ascertained, directly or through identifiers linked to the subjects;
- Any disclosure of the human subjects鈥 responses outside the research would not reasonably place the subjects at risk of criminal or civil liability or be damaging to the subjects鈥 financial standing, employability, educational advancement, or reputation; or
- The information obtained is recorded by the investigator in such a manner that the identity of the human subjects can readily be ascertained, directly or through identifiers linked to the subjects, and an IRB conducts a limited IRB review to make the determination required by 搂46.111(a)(7).
[45 CFR 46.104(d)(3)]
Benign behavioral interventions
Benign behavioral interventions are brief in duration, harmless, painless, not physically invasive, not likely to have a significant adverse lasting impact on participants, and the investigator has no reason to think the participants will find the interventions offensive or embarrassing. They can involve the performance of a cognitive, intellectual, educational听or behavioral task or the manipulation of the participant鈥檚 physical, sensory, social听or emotional environment. Brief in duration means no more than a few hours in a single day or visit.
听Note: Category 3 only allows for certain types of data collection methods. The only data collection methods allowed under this exemption category are verbal or written responses (e.g. surveys or interviews, test responses, data entry), observation听or audiovisual recordings. Data cannot be collected via physical procedures such as blood pressure monitoring, EEG, activity trackers (e.g.听Fitbit), eye trackers听or blood draws.
Limited review
Limited review requires the IRB to determine that there are adequate provisions for protecting confidentiality and privacy. This information is discussed in the Data Management and Provisions to Protect the Privacy Interests of Participants sections in the Exempt Protocol Template. The template provides information about what it needed to satisfy this requirement.
Key points about identifiability
- Recorded in such a manner that the identity of the participant cannot readily be ascertained:听There is an interaction with an individual for research purposes, but no identifiable data is connected to the research directly or through a coding system.
- Recorded in such a manner that the identity of the participant can readily be ascertained: Parts (ii) and (iii) allow data to be collected with identifiers. The PI should code the data to protect participants.
Deception
This exemption does not permit the use of deception unless participants are told prior to their participation that they will be unaware of or misled about the nature or purposes of the research and they agree to participate. Debriefing is encouraged.
Special populations
Pregnant women can participate.
Prisoners cannot participate as the target population.
Children cannot participate.
- Participants are asked to take part in two two-hour-long assessments of memory, attention and information processing speed before and after 1 hour of cognitive enhancement exercise using specially designed computer software. The procedures are conducted during a single visit, and participants are encouraged to take breaks when desired.
- A study asking graduate students to browse a popular social networking site and then time their efforts to solve a complex word puzzle.
- A random assignment of participants to take a test under various noise conditions.
- A study involving interviews with college seniors (age 18 and older) about their career plans after reviewing a documentary on job growth in various sectors.
- A group of expectant mothers are asked to screen educational material regarding post-partum depression and are interviewed regarding their understanding of post-partum depression. (This is a study that would require limited IRB review.)
Category 4:听Secondary Use of Data
Secondary research for which consent is not required: Secondary research uses of identifiable private information or identifiable biospecimens, if at least one of the following criteria is met:
- The identifiable private information or identifiable biospecimens are publicly available;
- Information, which may include information about biospecimens, is recorded by the investigator in such a manner that the identity of the human subjects cannot readily be ascertained directly or through identifiers linked to the subjects, the investigator does not contact the subjects听and the investigator will not re-identify subjects;
- The research involves only information collection and analysis involving the investigator鈥檚 use of identifiable health information when that use is regulated under 45 CFR parts 160 and 164, subparts A and E, for the purposes of "health care operations" or "research" as those terms are defined at 45 CFR 164.501 or for "public health activities and purposes" as described under 45 CFR 164.512(b); or
- The research is conducted by, or on behalf of, a Federal department or agency using government-generated or government-collected information obtained for nonresearch activities, if the research generates identifiable private information that is or will be maintained on information technology that is subject to and in compliance with section 208(b) of the E-Government Act of 2002, 44 U.S.C. 3501 note, if all of the identifiable private information collected, used, or generated as part of the activity will be maintained in systems of records subject to the Privacy Act of 1974, 5 U.S.C. 552a, and, if applicable, the information used in the research was collected subject to the Paperwork Reduction Act of 1995, 44 U.S.C. 3501 et seq.
Research under Parts (iii) and (iv) is very rare at 蜜桃传媒破解版下载. Therefore, the information on this page will focus on Parts (i) and (ii).
听Note: This category is limited to the secondary use of information and biospecimens only. It does not cover any primary collection of information or biospecimens.
Part i
In most cases, publicly available datasets or biospecimens are de-identified and do not require IRB oversight. Part (i) allows that some public datasets do contain private, identifiable data.
Part ii
The data or biospecimens obtained may contain dates (date of birth, date of graduation, date of event, etc.) and geographic locations except street address. However, if these data in combination with other factors in the dataset or when combined with other available datasets allow the identity of the participant to be ascertained, the research will not meet this Category 4 exemption criteria.
Names, email address, phone/fax number, street address, SSN, medical record number, health plan beneficiary number, account numbers, certificate or license numbers, vehicle identifiers and serial numbers, device identifiers and serial numbers, biometric identifiers (e.g., fingerprint), URLs, IP addresses, or full photographic images are not allowed under part ii of this exemption.
Definitions
- Secondary听means the re-use of identifiable information and identifiable biospecimens that are collected from some other 鈥減rimary鈥 or 鈥渋nitial鈥 activity (i.e. data that were not collected for the purpose of the specific proposed study).
- Private information听includes information about behavior that occurs in a context in which an individual can reasonably expect that no observation or recording is taking place, and information that has been provided for specific purposes by an individual and that the individual can reasonably expect will not be made public (e.g., a medical record).
- Publicly available (Part i) describes identifiable information or biospecimens that are available from public entities such as the following:
- Libraries
- Online data repositories if the only requirement for obtaining the information is paying a user fee, registering, or signing in as a visitor.听 If access to the data is 鈥渓imited鈥 or 鈥渞estricted,鈥 then the data set is likely not 鈥減ublicly available.鈥
- Government or other institutional records where public access is provided on request.
- Information/biospecimens from a commercial entity available to anyone on request for a fee.
- A researcher is given two datasets that contain private, identifiable information. The researcher uses the identifiers to merge the two datasets but strips the resulting (merged) data of identifiers immediately after the merge and before conducting data analysis. The resulting data used for the analysis is completely de-identified with no link to identifiers.
- A study involving secondary research of audio archives in a public library.
- A study involving review of national census data that contains zip codes.
- A study involving the analysis of public officials鈥 leaked emails currently available via Wikileaks.
- An analysis of biospecimens from an IRB-approved biorepository.