09-25-0208 SYSTEMS LISTING

SYSTEM NAME:

Drug Abuse Treatment Outcome Study (DATOS), HHS/NIH/NIDA.

SECURITY CLASSIFICATION:

None.

SYSTEM LOCATION:

Research Triangle Institute, Center for Social Research and Policy Analysis, Research Triangle Park, NC 27709

CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:

Voluntary adult clients of Federally-funded treatment programs, including Treatment Alternative Street Crime (TASC) Programs of the Department of Justice, who requested to be included in TOPS from 1979 through 1986. New data collected from voluntary adults/adolescent clients of public and private funded-treatment programs beginning in 1991 and will continue through1997.

CATEGORIES OF RECORDS IN THE SYSTEM:

The categories are: demographic data, treatment outcome data, treatment process data, client locator information, and personal identifiers (name and assigned numerical identifier).

AUTHORITY FOR MAINTENANCE OF THE SYSTEM:

Public Health Service Act, Sections 301 and 405 (42 U.S.C. 241 and 284.)

PURPOSE(S):

The purpose of the system is to compile information on drug abusers in drug abuse treatment programs in order to derive information on the treatment environments and abusers' behaviors and characteristics subsequent to treatment. Researchers and drug abuse service providers may use the aggregate data to address issues and generate hypotheses to understand better the interactions among the client and community.

ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES OF USERS AND THE PURPOSES OF SUCH USES:

  1. Within the restrictions set forth in HHS regulations concerning the confidentiality of drug abuse patient records (42 CFR 2.56), we may disclose a record for a research purpose, when the Department: (a) has determined that the use or disclosure does not violate legal or policy limitations under which the record was provided, collected, or obtained; ((b) has determined that the research purpose (1) cannot be reasonably accomplished unless the record is provided in individually identifiable form, and (2) warrants the risk to the privacy of the individual that additional exposure of the record might bring; (c) has required the recipient to (1) establish reasonable administrative, technical, and physical safeguards to prevent unauthorized use or disclosure of the record, (2) remove or destroy the information that identifies the individual at the earliest time at which removal or destruction can be accomplished consistent with the purpose of the research project, unless the recipient has presented adequate justification of a research or health nature for retaining such information, and (3) make no further use or disclosure of the record except: (A) in emergency circumstances affecting the health or safety of any individual, (B) for use in another research project, under these same conditions, and with written authorization of the Department, (C) for disclosure to a properly identified person for the purpose of an audit related to the research project, if information that would enable research subjects to be identified is removed or destroyed at the earliest opportunity consistent with the purpose of the audit, or (D) when required by law; (d) has secured a written statement attesting to the recipient's understanding of, and willingness to, abide by these provisions.
  2. The Research Triangle Institute, an NIH contractor, uses the records in this system to accomplish the research purpose for which the records are collected. In the event of followup studies or continuation studies because the contract has been terminated for convenience by the Government, we may disclose records in this system to a subsequent NIH contractor. We would require the new contractor to maintain Privacy Act safeguards with respect to such records.

POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, AND DISPOSING OF RECORDS IN THE SYSTEM:

STORAGE:

Interview forms, magnetic tapes, and disks.

RETRIEVABILITY:

Records are indexed and retrieved by unique alpha numerical identifier. In order to relate the data collected to specific individuals, one must use the link file discussed under Safeguards.

SAFEGUARDS:

  1. Authorized Users: Contractor personnel, the agency project officer, and agency employees whose duties require the use of the information in the system.
  2. Physical Safeguards: The data management task leader, the project leader, or the project director provide technical supervision of all data collection and processing activities. Individually identified forms are stored in a secure, vault-like room provided for this purpose. Authorized personnel have access to the room by one locked door with controlled entry, i.e., only on the written authority of the professional staff member in charge. Computerized records are kept in a vault area with limited accession.
  3. Procedural Safeguards: Because some of the data collected in this study, such as data on drug use, are sensitive and confidential, special safeguards have been established. A Certificate of Confidentiality has been issued under 42 CFR Part 2a. This authorization enables persons engaged in research on mental health, including research on the use and effect of psychoactive drugs, to protect the privacy of research subjects by withholding the names or other identifying characteristics from all persons not connected with the conduct of the research. Persons so authorized may not be compelled in any Federal, State, or local civil, criminal, administrative, legislative, or other proceedings to identify such individuals. In addition, these records are subject to 42 CFR Part 2, the Confidentiality of Alcohol and Drug Abuse Patient Records Regulations (42 CFR 2.56), which state: "Where the content of patient records has been disclosed pursuant to (these regulations) for the purpose of conducting scientific research...information contained therein which would directly or indirectly identify any patient may not be disclosed by the recipient thereof either voluntarily or in response to any legal process whether Federal or State."
  4. Another safeguard is that the forms containing subject identification information for client followup and data matching purposes do not include any reference to the purpose of the study.

    Identification and location information is kept separate from any information that would suggest that the respondent has been in a drug treatment program.

    Information on completed forms is entered immediately on the computer. Completed forms and computerized data are released only to authorized persons. Only aggregate data are provided and used in the preparation of necessary and appropriate reports.

    A link file system is used. This system has three components: (1) personal information, (2) data base information, and (3) the link file, which contains identifying number pairs which can be used to match data with individuals. The advantage of this system is that the data base can be used directly for report generation, etc., without the use of decrypting subroutines or access to the personal information or matching link files.

    In addition, the computer center being utilized has developed an extensive security system to protect computer account codes and data. This system is described in a publication that is available from the System manager upon request.

    We do not anticipate any disclosure of individually identifiable information to other persons or organizations within the Department of Health and Human Services. Nor does the contractor provide individually identification information to the Department of Justice, with which NIDA has a cooperative agreement for this study.

    Implementation Guidelines: These practices are in compliance with the standards of Chapter 45-13 of the HHS General Administration Manual, "Safeguarding Records Contained in Systems of Records," supplementary Chapter PHS hf: 45-13, and the HHS Automated Information Systems Security Program Handbook. In addition, project staff complies with the contractor's (Research Triangle Institute) standard procedures for safeguarding data.

    The contractor provides only aggregate information to NIDA.

RETENTION AND DISPOSAL:

The contractor destroys interview forms by shredding or burning immediately after contractor staff have completed and verified direct entry on magnetic tape or disk storage. The contractor will destroy individual identification and location data by shredding or burning, under the explicit written authorization of the System manager, which is anticipated to be no longer than five years after the termination of the study unless the information is needed for research purposes. We will retain aggregate data tapes for research purposes. These tapes will not have any individually identifiable information. In accordance with the NIH Records Control Schedule, these tapes will be retained for five years after completion of the project (approximately 2002). At that time, the tapes will be retired to the Federal Records Center and destroyed when they are ten years old or when they are no longer needed for research purposes.

SYSTEM MANAGER(S) AND ADDRESS(ES):

Drug Abuse Treatment Outcome Study (DATOS), Project Officer, Services Research Branch, Division of Epidemiology, Services, and Prevention Research, National Institute on Drug Abuse (NIDA), Neuroscience Center, Room 4222, 6001 Executive Boulevard, Bethesda, MD 20892.

NOTIFICATION PROCEDURE:

To determine if a record exists, write to the System Manager at the address above. An individual may learn if a record exists about himself/herself upon written request, with notarized signature. The request should include, if known, name of the researcher, location of the research site, approximate date of data collection, any alias used, and subject identification number.

An individual who requests notification of a medical record shall, at the time the request in made, designate in writing a responsible representative who will be willing to review the record and inform the subject individual of its contents at the representative's discretion.

A parent or legal guardian who requests notification of an adolescent's record shall designate a family physician or other health professional (other than a family member) of the Division of Clinical Research staff to whom the record, if any, will be sent. The parent or legal guardian must verify in writing the relationship to the adolescent as well as his/her own identity

RECORD ACCESS PROCEDURE:

Same as Notification Procedures. Requesters should also reasonably specify the record contents being sought. An individual may also request an accounting of disclosures of his/her record, if any.

Persons other than subject individuals, who request individually identifiable data from a record must provide written consent from the subject individual permitting the requested disclosure. The only exception (if not in conflict with confidentiality regulations) would be for disclosure to persons or organizations permitted by the Privacy Act, Section 3(b), to obtain personally identifiable data.

CONTESTING RECORD PROCEDURE:

Contact the official at the address specified under Notification Procedures above and reasonably identify the record, specify the information being contested, the corrective action sought, with supporting information to show how the record is inaccurate, incomplete, untimely, or irrelevant

RECORD SOURCE CATEGORIES:

Research subjects, and staff in participating drug abuse treatment programs, written clinical evaluations, counselors, psychiatrists, psychotherapists, family members, research assistants, hospitals.

SYSTEMS EXEMPTED FROM CERTAIN PROVISIONS OF THE ACT:

None.