Topics Map > Electronic Lab Notebooks
LabArchives: Protecting PHI Guidance for Primary Investigators
Requesting Access
Purpose: This document describes how to ensure oversight and security of the protected health information (ePHI) responsibly on the LabArchives system.
In addition to the below guidance, The HIPPA Security Program provides guidance, templates, and other resources. ELN Service team encourages research units to partner with local departmental IT to ensure compliance.
1. HIPPA and Protocol Training
All users planning on using ePHI should complete the following before requesting access to Lab Archives.
- HIPPA training
- Protocol and Data Management Plan (DMP) Training
2. Limiting Access to PHI
The best way to keep ePHI safe is to limit access to only those who need it. Only people who are actively working on the research project involving ePHI should have access.
- UW Madison Collaborators
- Only UW-Madison users who have been added to an authorization Manifest group have access to log into LabArchives with UW Madison NetID credentials.
- Those who request the ability to store ePHI in LabArchives will be divided into two permission groups:
- Notebook Owners (Can create new notebooks)
- Notebook Non-creators (Can edit shared notebooks)
- Only PIs will be allowed to own notebooks and their designees to manage notebooks, thus have control over who has access to ePHI.
- Those who request the ability to store ePHI in LabArchives will be divided into two permission groups:
- Only UW-Madison users who have been added to an authorization Manifest group have access to log into LabArchives with UW Madison NetID credentials.
- Requesting Access
- Requesting a New Restricted Data Lab
- Complete a request form on the UW Madison ELN website.
- Look for an email from Security- RMC to complete a cybersecurity review.
- Only the PI will notebook owners.
- Requesting New Users be Added to Restricted Data Lab
- Interested users complete a request form on the UW Madison ELN website.
- ELN Service team confirms NET ID and UW Madison affiliation via NET ID Look Up tool
- Users will be Non-Creators. Users will have permissions to edit existing notebooks shared with them (owned by PI) but cannot create notebooks themselves.
- Requesting a New Restricted Data Lab
- Access to External Non-UW-Madison Collaborator
- LabArchives allows users to share their research with those who are not part of UW-Madison using the Guest access role. The service team does not have the permissions to disable this feature. Though Lab Archives provides this feature, users are cautioned against sharing notebooks containing ePHI in this way.
-
- If a guest user does not have a Net ID, the University has no way of linking an identity to the email address
- If no action is done to change permissions, guests lose write access after 60 days of sharing due to the licensing agreement with LabArchives. After 60 days, access becomes Read Only
- External collaborators can instead request a NetID .
- If research must be shared with non-UW collaborators, PI must ensure guests are trusted collaborators and may require a Data Transfer Use Agreement (DTUA), as they will have the ability to download data from the notebook and potentially to make changes to the content of the notebook depending on the permissions granted.
- PI’s providing access to a guest, must review access routinely (i.e. monthly)
-
- LabArchives allows users to share their research with those who are not part of UW-Madison using the Guest access role. The service team does not have the permissions to disable this feature. Though Lab Archives provides this feature, users are cautioned against sharing notebooks containing ePHI in this way.
- Access Review
- As mentioned in the PoAM no. 1.15.0 (1622) and in the artifact: User Access and Activity Audit
- Service team, PI, and user access review will occur at the beginning of each semester (Fall, Spring, Summer).
- Guest Access review will occur on a routine basis by PI and semesterly by the service team.
- As mentioned in the Access, Audit, and Integrity Programs and artifact: User Access and Activity Audit
- The Activity Feed provides an audit trail of every action that has occurred within a notebook.
- An icon located on the top menu of Lab Archives notebook displays a red badge with the number of new notifications to view.
- An email can also be set up to provide notification of changes.
- It does not track sign-in or offline content export.
- The Activity feed is only seen by the owner and shared collaborators. The service team does not have access to this detailed feed of changes at an admin level, however it can be obtained upon request to Lab Archives. Therefore, it is the PI’s responsibility to review on a routine basis. It is recommended to review routinely (i.e. weekly)
- The Activity Feed provides an audit trail of every action that has occurred within a notebook.
- As mentioned in the PoAM no. 1.15.0 (1622) and in the artifact: User Access and Activity Audit
- Reporting unauthorized access to ePHI
- If you believe that PHI has been accessed without permission, contact the ELN service team contact form.
- Complete the HIPAA incident report form for the University.
- Usage statistics are used to determine the scale of the breach and facilitate conversation with LabArchives.
- If you believe that PHI has been accessed without permission, contact the ELN service team contact form.
3. Secure Work Environment
Each research unit/department is required to secure workplaces through encryption and asset management.
1. Encryption:
The Secure Endpoint Configuration policy provides guidance for securing endpoints with access to ePHI, as part of the UW–Madison Workstation Security Requirements.
- It is recommended that users connect to their departmental VPN
- Each research unit/department are encouraged to partner with the local departmental IT to ensure compliance for the following areas:
- Encryption mechanisms are in place to protect ePHI in transit
- Encryption mechanism in place to protect ePHI at rest
- Encryption mechanisms are in place to safeguard ePHI from being compromised when transmitted from one point to another
- Encryption of ePHI data, systems, and networking devices
- Protection of the integrity of ePHI data, systems, and networking devices
- There are several resources available to secure workstations, some of which are referenced in the configuration matrix above:
- The DDS - HIPAA Group Policy Objects in Campus Active Directory can be used to apply to Windows machines to join to the Campus Active Directory
- Windows machines connected to any Active Directory can be configured to encrypt their storage drives via Bitlocker with the recovery keys stored in Active Directory. Documentation is available from Microsoft for configuring GPOs.
- Qualys Cloud Agent for vulnerability scanning is available in the Office of Cybersecurity
- Cisco Anti-Malware Protection is also available in the Office of Cybersecurity
2. Securing of MacOS machines will require further consultation with your HIPAA Security Officer and local deparmental IT support. MacOS does not inherit Group Policies from Active Directory.
4. Asset Management:
The IT Asset Reporting provides guidance for setting up and maintaining an inventory of equipment and media used. Additionally, the Office of Cybersecurity HIPPA Security Program provides a primary guidance workbook.
- Each research unit/department is responsible for following departmental policies and procedures related to.
- Within Facility
- Maintain record of movement of hardware and media inside the facility and responsible person(s) of the devices.
- Inventory of physical systems, devices, and media in office space/facility that are used to store or contain ePHI
- Inventory and location record of all devices
- Outside Facility
- Maintain record of movement of hardware and media outside of the facility and responsible person(s) of the devices.
- Set of Standards for workstations allowed to be used outside of facility
- Maintain records of employees removing electronic devices and media from facility that have or can be used to access ePHI
5. Workstation
- Each research unit/department is encouraged to work with local departmental IT to develop and use policies and procedures that align with UW Madison compliance to ensure the security or workstations, such as the following.
- Safeguards for laptop and tablet workstations
- Workstation use policies and procedures
- Remove ePHI before reusing electronic media
6. Data Disposal
Many regulatory bodies require PHI to be destroyed after a certain amount of time.
- The UW-Madison LabArchives site is set to disallow users to delete notebooks, so that, by default, no users are able to delete PHI in a notebook. In order to delete PHI from LabArchives, the notebook owner must request deletion by completing the UW Madison ELN service team contact form. This request will then be passed on to Lab Archives.
- Ensure all backup copies are deleted.
- Follow Destruction/Disposal of Protected Health Information guidance
- Research units/departments are advised to work with departmental IT to develop and follow policies and procedures to the ELN Service team for the following.
- Requirement that all ePHI is removed from equipment and media before removing equipment or media from facilities for off site maintenance or disposal
- Requirement that all ePHI is removed or destroyed from information technology devices and media prior to disposal of device
7. Backing up your PHI-containing data
While LabArchives backs-up data on their servers, these backups will not be accessible during a service outage.
- To keep data accessible during an outage, make periodic copies of notebooks in PDF or HTML formats.
- Backup copies of PHI notebooks must also be stored on an approved platform.
- The ELN service team recommends using Restricted Research Drive. Research drive grants 5 TB of storage to research PIs at no cost.
8. Additional Resources
If questions arise about LabArchives and PHI specifically, contact the ELN team contact form.
If general questions arise about security for PHI data, contact the HIPAA security officer in the unit.
Net ID |
Description of Changes |
Date of Changes |
Date of KB Publish |
tobin |
original |
2020-05-08 |
None |
murphy22 |
Reorganized, added policies and procedures each unit needs to provide to ELN service team to be compliant with UW Madison Cybersecurity |
2022-08-23 |
Pending |
murphy22 |
Updated access and activity review, data disposal, |
2022-10-21 |
2023-04-13 |