{"id":13925,"date":"2024-07-15T10:14:01","date_gmt":"2024-07-15T14:14:01","guid":{"rendered":"https:\/\/research.ncsu.edu\/administration\/?page_id=13925"},"modified":"2025-12-02T19:56:36","modified_gmt":"2025-12-03T00:56:36","slug":"administrators-supporting-research","status":"publish","type":"page","link":"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/irb\/administrators-supporting-research\/","title":{"rendered":"Administrators Supporting Research"},"content":{"rendered":"\n\n\n\n\n
To assist NC State researchers in understanding their responsibilities when completing research with human subjects, the NC State IRB office has detailed Expectations for those listed as Faculty Points of Contact in the eIRB system<\/a> and created a unit standard for all Faculty Points of Contact<\/a>. In the current eIRB system, the person listed as the \u201cFaculty Point of Contact\u201d is either the lead PI or a student PI\u2019s faculty advisor. To assist research administrators and others supporting researchers at NC State University, the IRB office has provided details about scope of role and responsibilities (noted above in the links) and in summary below. <\/p>\n\n\n \n \n\n The lead Principal Investigator (PI) has ultimate responsibility for the research design and implementation for all aspects of the research project. This includes:<\/p>\n\n\n\n \n \n\n The Co-PI is responsible for any of the delegated responsibilities of the Lead PI. <\/p>\n\n\n <\/p>\n <\/details>\n\n\n \n \n\n The student PI’s Advisor\/Chair is responsible for the following: <\/p>\n\n\n\n \n \n\n The IRB\u2019s scope of authority and responsibility includes: <\/p>\n\n\n\n \n \n\n Research Administrators scope of authority and responsibilities may include: <\/p>\n\n\n\n Unless considered a research team member on the IRB protocol, research administrators should not:<\/p>\n\n\n\n \n \n\n IRB approval is needed for all projects completed by NC State University faculty, staff or students where the project meets the definition for \u201cresearch\u201d and \u201chuman subject\u201d as defined by the regulation 45 CFR 46<\/a>. On the homepage for the NC State University IRB website, there is a description of the\u00a0 \u201cLifecycle\u201d of an IRB protocol. You can find details on definitions and scope of IRB authority on our “Step 1: Determining if IRB Approval is Required<\/a>” webpage.\u00a0<\/p>\n\n\n <\/p>\n <\/details>\n\n\n \n \n\n All NC State University faculty, staff, and students who wish to engage in human subjects research must successfully complete human subjects research training<\/a> and provide proof of completion to the IRB before an IRB protocol can be completed. Engagement is defined as anyone who is involved in recruiting and consenting, implementing an intervention with human subjects, interacting with human subjects, manipulating the environment of human subjects, or handling\/analyzing identifiable\/re-identifiable private data about humans.\u00a0Please note: Research administrators should not complete human subjects research training for anyone but themselves. <\/em><\/p>\n\n\n <\/p>\n <\/details>\n\n\n \n \n\n Researchers apply for IRB approval through the electronic system called the eIRB system<\/a>. You can find details on how to apply for IRB approval on the IRB Lifecycle section \u201cStep 2: Preparing and Submitting an Application<\/a>\u201d<\/p>\n\n\n <\/p>\n <\/details>\n\n\n \n \n\n The NC State IRB office will have given the researcher access to clinicaltrials.gov when their study was initially approved. That login information should be used to input information into PRS<\/a>, the clinicaltrials.gov database.\u00a0 login info. The IRB office has no authority or access to assist with entering information into this system. Please review the NC State IRB unit standards on clinical trials<\/a> and refer to Appendix B and E. For details on using the PRS system itself, please refer to the PRS Guided Tutorial<\/a>.\u00a0\u00a0<\/p>\n\n\n <\/p>\n <\/details>\n\n\n \n \n\n All Department of Defense (DoD) affiliated human subjects research requires the researcher to complete additional steps before, during, and after IRB approval with the NC State University\u2019s IRB. Please review the NC State IRB unit standard on DoD Supported Research<\/a>. The main requirements include provision of a scientific merit review<\/a> with the Initial IRB application and a secondary review called \u201cHRPO\u201d review once NC State IRB approval is granted. The HRPO review is facilitated by the researcher with their DoD Agency.<\/p>\n\n\n\n For details regarding the additional obligations that are required for DoD sponsored research, please review the content from the IRB Lifecycle section \u201cStep 4: Responsibilities After Approval<\/a>\u201d<\/p>\n\n\n <\/p>\n <\/details>\n\n\n \n \n\n IRB approval through NC State university is required when an NC State University faculty member, staff member, or student is both acting within the scope of their position and acting on behalf of the University to complete the regulated research with human subjects. When a researcher needs IRB approval for a project and they are not working within the scope of their University position, the NC State IRB office cannot review and approve their project. Please review the \u201cStep 1: Determining if IRB Approval is Required<\/a>\u201d webpage for more information. The NC State University Office of Research Commercialization<\/a> can help researchers identify external IRBs that can review human subjects research beyond the scope of the NC State IRB to review. .\u00a0<\/p>\n\n\n\n If an NC State University researcher will be conducting human subjects research outside the scope of their role but their NC State collaborator(s) work on the project is within their institutional role at NC State, then the NC State IRB may be able to review and approve the project with a formal agreement in place. Please review NC State University IRB’s Cooperative Research<\/a> webpage and review the criteria related to an individual investigator agreement.<\/p>\n\n\n <\/p>\n <\/details>\n\n\n \n \n\n Familiarize yourself with the NC State University IRB’s Cooperative Research<\/a> page of our website and refer the researcher to the site to start there. Additionally, should the research collaboration lead to a research project that will include the research procedures taking place at \u201cmultiple sites,\u201d please refer the researcher to the guidance for Multi-Site Research<\/a>.\u00a0<\/p>\n\n\n <\/p>\n <\/details>\n\n\n \n \n\n \n \n\n A data and access security plan (DASP) is a comprehensive data management approach created with an NC State University OIT Security and Compliance representative and the protocol’s principal investigator for a specific research protocol. A DASP is only required for human subject research protocols that access or generate highly sensitive (red) data or ultra sensitive (purple) data as defined by NC State University\u2019s OIT, the IRB office, and in some cases by contract from entities releasing data to NC State University. It is also required when protocols are required to share their research data, such as with National Institutes of Health (NIH) funded studies, and by some data providers that require data use agreements (DUAs) or material transfer agreements (MTAs). <\/p>\n\n\n\n For ease of reference, the IRB defines \u201cred\u201d and \u201cpurple\u201d data below:<\/p>\n\n\n\n Ultra-sensitive data includes data where unauthorized disclosure or loss poses the highest risk or impact to the human subjects, university, or its affiliates or where specific data categories require special privileged access management. Examples include data where unauthorized disclosure or loss poses the highest risk or impact to the human subjects, university, or its affiliates or where specific data categories require special privileged access management. Examples include social security numbers, passwords, encryption keys, and biometrics (such as fingerprints and iris scans), admitted behavior that could be considered a felony. Other examples of qualitative data that should be treated as \u201cpurple\u201d data include data that will likely lead to arrest, detention, incarceration, deportation, physical injury, or death of both primary and third party participants. Additional access and handling requirements are required for Ultra-sensitive data because it may be impossible to repair damage caused by its unauthorized disclosure. <\/p>\n\n\n\n Highly sensitive data includes data where unauthorized disclosure or loss poses a high risk or impact to the university, or its affiliates. Examples include data where unauthorized disclosure or loss poses a high risk or impact to the university, or its affiliates. Examples include driver\u2019s license, mother\u2019s maiden name, passport, and immigration number, admitted unlawful behavior that is not considered purple. Other examples of qualitative data that should be treated as \u201cred\u201d data include information that could lead to persecution, harassment or retaliation, information that may or likely will irreparably harm relationships, information that will likely lead to stigmatization where physical or psychological harm may occur as a result of both primary and third party participants, or any data where unauthorized disclosure or loss poses a high risk or impact to all human subjects. <\/p>\n\n\n\n Should a researcher need a data and access security plan (DASP), the researcher will be informed of this during the IRB review\/approval process and directed to complete a \u201cData Access and Security\u201d plan request form via the NC State University \u201cService Now<\/a>\u201d portal. Once the request form is submitted, a representative from NC State Security and Compliance will reach out to the researchers to initiate next steps. No \u201cred\u201d or \u201cpurple\u201d data can be generated or accessed until this plan is finalized and a part of the approved IRB protocol. This plan must be congruent with any associated contract or agreement.\u00a0<\/p>\n\n\n <\/p>\n <\/details>\n\n\n \n \n\n The IRB office does not have jurisdiction over records release permission. They are two different and separate permission processes. Just because a study has IRB approval does not mean that a data steward or their delegate must grant a researcher’s records release request. The data steward or their delegate can still say \u201cno\u201d to the researcher. Please review the NC State IRB guidance for data stewards and delegates<\/a>. <\/p>\n\n\n\n A data steward for FERPA records at NC State determines if the records can be released. Things the data steward should consider:<\/p>\n\n\n\n \n \n\n The IRB thinks about incentives and compensation in one of three ways: <\/p>\n\n\n\n \u201cIs the compensation\/incentive unduly influencing or coercive?\u201d<\/p>\n\n\n\n \u201cIs the compensation\/incentive fair across participant groups in a study\u201d <\/p>\n\n\n\n \u201cWhat information is needed from participants in order to disperse compensation and does that information increase risks to participants?\u201d <\/p>\n\n\n\n If the IRB has determined that the information collected from participants to disperse the incentives or compensation increases risk to participants, then the IRB will require a participant protection that limits the information collection and sharing. Should this be the case, and researchers not be able to provide the research office with direct IDs of participants, the IRB will provide the researchers with a letter indicating this limitation. <\/p>\n\n\n\n The IRB expects that in the IRB protocol, the researcher describes the information needed to disperse compensation and to detail the information that their department needs for compensation\/incentive disbursement. This allows the IRB to properly assess privacy and confidentiality risks. <\/p>\n\n\n\n To assist researchers in designing their research with compensation incentives in mind, the NC State IRB office has created the following guidance incentives and compensation for research participants<\/a>.<\/p>\n\n\n <\/p>\n <\/details>\n\n\n \n \n\n Many researchers at NC State University want to access data generated elsewhere (also called \u201csecondary data<\/a>\u201d) to use for their own analysis and research projects. In many cases, these datasets are private and sometimes a data use agreement (DUA) is required before the data can be released to NC State University researchers. A DUA details what the data is composed of and how it can or cannot be access and used, among other topics, and are handled by college research offices, not the IRB office. Please review the NC State University Research Administration and Compliance \u201cData Use Agreements\u201d Guidance<\/a>. <\/p>\n\n\n\n The NC State IRB will need to know the terms of the Data Use Agreement (DUA) so we can review and confirm that the submitted IRB protocol matches what is expected in the DUA. PIs should upload the executed DUA with their IRB application. The DUA process and the IRB process can happen at the same time. However, until the executed DUA is a part of the approved IRB protocol, no access to the data can occur. <\/p>\n\n\n <\/p>\n <\/details>\n\n\n <\/div>\n <\/div>\n","protected":false},"excerpt":{"rendered":" Scope of Roles as Related to the Research with Human Subjects and the IRB To assist NC State researchers in understanding their responsibilities when completing research with human subjects, the…<\/p>\n","protected":false},"author":16,"featured_media":0,"parent":338,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"source":"","ncst_custom_author":"","ncst_show_custom_author":false,"ncst_dynamicHeaderBlockName":"ncst\/default-header","ncst_dynamicHeaderData":"{\"pageIntro\":\"Due to the multiple roles that administrators play at NC State when assisting researchers with their research endeavors, the NC State University IRB office has compiled relevant information and resources applicable to staff in various supporting roles. Below you will find information about topics that commonly intersect with people in administrative roles who support research efforts.\u00a0\"}","ncst_content_audit_freq":"","ncst_content_audit_date":"","ncst_content_audit_display":false,"ncst_backToTopFlag":"","footnotes":""},"tags":[],"class_list":["post-13925","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"\n\n \n <\/span>\n <\/span>\n
Lead PI<\/strong><\/h2>\n <\/summary>\n
\n
\n \n <\/span>\n <\/span>\n
Co-PI<\/strong><\/h2>\n <\/summary>\n
\n \n <\/span>\n <\/span>\n
Student PI\u2019s Advisor\/Chair\u00a0<\/strong><\/h2>\n <\/summary>\n
\n
\n \n <\/span>\n <\/span>\n
The IRB Office and Full Board<\/strong><\/h2>\n <\/summary>\n
\n
\n \n <\/span>\n <\/span>\n
Research Administrators and Support Staff<\/strong><\/h2>\n <\/summary>\n
\n
\n
Commonly Asked Questions from Research Administrators<\/h2>\n\n\n
\n \n <\/span>\n <\/span>\n
When is IRB approval required?<\/strong><\/h2>\n <\/summary>\n
\n \n <\/span>\n <\/span>\n
What are the training requirements to be able to do human subjects research?<\/strong><\/h2>\n <\/summary>\n
\n \n <\/span>\n <\/span>\n
Where is the IRB application and how do researchers apply for approval?<\/strong><\/h2>\n <\/summary>\n
\n \n <\/span>\n <\/span>\n
A researcher asked me to input information into the clinicaltrials.gov website. How do I do that?<\/strong><\/h2>\n <\/summary>\n
\n \n <\/span>\n <\/span>\n
A researcher or study has Department of Defense (DoD) funding. What are the additional obligations that I need to help coordinate?<\/strong><\/h2>\n <\/summary>\n
\n \n <\/span>\n <\/span>\n
Can the NC State IRB review research that will be done by a current University faculty\/staff member or student at a business or startup?\u00a0<\/strong><\/h2>\n <\/summary>\n
\n \n <\/span>\n <\/span>\n
A researcher wants to collaborate on human subjects research with people outside of NC State University. What do we need to know to proceed?\u00a0<\/strong><\/h2>\n <\/summary>\n
\n \n <\/span>\n <\/span>\n
What University level regulations, rules, and guidances often apply to human subjects research?\u00a0<\/strong><\/h2>\n <\/summary>\n
\n
\n \n <\/span>\n <\/span>\n
What is a data and access security plan (DASP) and when is it required by the IRB?<\/strong><\/h2>\n <\/summary>\n
Ultra-sensitive or Purple Data<\/h3>\n\n\n\n
Highly Sensitive or Red Data<\/h3>\n\n\n\n
\n \n <\/span>\n <\/span>\n
I was asked to release data for an IRB approved study. Can I release it? How do I know what to release?<\/strong><\/h2>\n <\/summary>\n
\n
\n \n <\/span>\n <\/span>\n
What are the rules about research incentives and compensation?\u00a0<\/strong><\/h2>\n <\/summary>\n
\n \n <\/span>\n <\/span>\n
A researcher needs a data use\/sharing agreement (DUA) to access data for research. What do I tell them?\u00a0<\/strong><\/h2>\n <\/summary>\n