Effective Date: 12 October 2017
CTSdatabase (CTSd): A clinical trial subject database/registry that tracks partial identifiers of individuals across sites and sponsors for the purpose of reducing the effect of duplicate or professional subjects on the outcome of clinical trials.
Personally Identifiable Information (PII): Any information which, by itself or in combination, can be used to identify or locate a specific individual.
Partial Identifiers: Unlike full identification, such as complete social security number (SSN) or full name, CTSd uses partial identifiers, such as last four of SSN or initials, to help protect the identity of the potential subject.
Potential subject/ Individual: Refers to the individual who wishes to participate in a clinical trial.
Subject: An individual who signs informed consent and participates in a clinical trial, either as a recipient of an investigational product(s) or as a control.
Duplicate subject: A subject who has been identified as participating in another clinical trial or has very recently participated in another study.
Professional Subject: A subject who goes to multiple sites, possibly falsifying or omitting information, for the purpose of collecting multiple stipends.
Clinical Trial Subject Database Authorization (Authorization): The Clinical Trial Subject Database Authorization is an Institutional Review Board (IRB) approved consent form which provides information to the potential subject about the purpose of CTSd and what information will be collected from them. No information can be entered into CTSd without this signed authorization from a potential subject.
Principal Investigator (PI): A person responsible for the conduct of the clinical trial at an investigative site. If a trial is conducted by a team of individuals at a site, the investigator is the responsible leader of the team.
Investigative Site (Site): A clinic or office where a clinical trial is conducted.
Pharmaceutical Sponsor (Sponsor): An individual, company, institution, or organization that takes responsibility for the initiation, management, and/or financing of a clinical trial.
Third Party: An entity other than the individual or CTSd, which is not directly affiliated with the individual or CTSd . Third parties include principal investigators, pharmaceutical sponsors and sites.
Encryption: The translation of data into a secret code. Encryption is the most effective way to achieve data security.
Firewall: A system designed to prevent unauthorized access to or from a public or private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private portions of public networks.
EU-U.S. and Swiss-U.S. Privacy Shield
CTSdatabase participates in and has certified its compliance with the EU-U.S. Privacy Shield Framework and the Swiss-U.S. Privacy Shield Framework. We are committed to subjecting all personal data received from European Union (EU) member countries and Switzerland, respectively, in reliance on each Privacy Shield Framework, to the Framework's applicable Principles. To learn more about the Privacy Shield Frameworks, and to view our certification, visit the U.S. Department of Commerce's Privacy Shield List
With respect to personal data received or transferred pursuant to the Privacy Shield Frameworks, CTSdatabase is subject to the regulatory enforcement powers of the U.S. Federal Trade Commission.
If you have an unresolved privacy or data use concern that we have not addressed satisfactorily, please contact our U.S.-based third party dispute resolution provider (free of charge) at https://feedback-form.truste.com/watchdog/request
Under certain conditions, more fully described on the Privacy Shield website you may be entitled to invoke binding arbitration when other dispute resolution procedures have been exhausted.
I. What Information is Collected
The information collected is clearly discussed in the Authorization. CTSd uses partial identifiers to maintain the highest anonymity possible. While last four of SSN, for example, are not as specific as the complete SSN, potential subjects can be comfortable that their full identifiers are never collected and therefore cannot be recovered or hacked.
This lack of specificity, however, may create a rare event where an individual may be identified as duplicating another individual with similar partial identifiers.
II. How an Individual Agrees to Participate
An individual who wishes to participate in a clinical trial at a site utilizing CTSd can "Opt-In" by carefully reviewing the Authorization and signing and dating it if (s)he still wishes to participate in the study.
The potential subject has the option to not share their partial identifiers and not participate in a study. If they do not agree to the Authorization, PII will not be entered or stored in the database.
Consent to participate in a study may be withdrawn (i.e. Opt-out") at any time. However, encrypted information will still be stored and may later match with encrypted information of this individual or another potential subject at another site.
III. Third Party Involvement, Potential Disclosure of PII
If there is a government or judicial audit, subpoena or warrant, data may be disclosed by CTSdatabase. If CTSdatabase merges with or is acquired by a Third Party, it is possible that PII may be disclosed, in which case you will be notified of any changes in ownership or uses of your PII, as well as any choices you may have regarding your PII. However, since full identifiers are never entered into the system, there is no foreseeable way for fully identifying information to be disclosed.
Investigative sites will enter the partial identifiers you authorize into CTSd. Once entered, PIs, sites and pharmaceutical companies will have access only to the encrypted information. Unencrypted information will never be released to any outside parties.
IV. Individual access to information
As the partial identifiers are encrypted, an individual (or a sponsor or an investigator or site) cannot have direct access to their information. If they are notified by an investigator that they duplicate another subject at another site, and they believe this is in error, they may contact the investigator or site personnel and request a review of the data entered by the CTSdatabase Director of IT. The Director can then work with the site to assure that an entry error has not been made. In the unusual event where a data entry error has led to a false positive duplicate subject, CTSdatabase will eliminate the error from the database in a timely fashion (usually 48 hours). If an individual still feels that there is a problem with their identifying information, CTSdatabase can be contacted via their website, www.ctsdatabase.com, , under Ask Us. In the unlikely event that the individual still has a problem with CTSdatabase or their PII, TRUSTe will provide third party dispute resolution (see below).
V. Security measures to Protect PII
The database itself is housed on the RackSpace Cloud Platform. The Cloud platform provides 99.999% guaranteed uptime as well as industry standard backup and recovery procedures. Access to the database is provided using a HTTPS encrypted protocol. A 128 bit SSL encryption certificate is maintained with VeriSign to make sure that all data sent between the client's web browser and the database on the Cloud is encrypted. Only the Database Administrator (DBA) has direct access to the backend database. System passwords are changed every 180 days and accessible only by the DBA and the President. Passwords must have a minimum length of 6 characters and none of the previous 3 passwords may be used.
I. What Information is Collected
On our website, we collect contact information such as name and email address. We use this information to respond to requests for a demo of our service, answer miscellaneous inquiries about our service and provide customer support.
II. Information Sharing
We may also disclose your personally identifiable information:
In certain situations, CTSdatabase may be required to disclose personal data in response to lawful requests by public authorities, including to meet national security or law enforcement requirements. • as required by law, such as to comply with a subpoena, or similar legal process • when we believe in good faith that disclosure is necessary to protect our rights, protect your safety or the safety of others, investigate fraud, or respond to a government request
• to any other third party with your prior consent to do so
• if CTSdatabase is involved in a merger, acquisition, or sale of all or a portion of its assets; you will be notified via email and/or a prominent notice on our Web site of any change in ownership or uses of your personally identifiable information, as well as any choices you may have regarding your personally identifiable information to companies that provide services to help is with our business activities. These companies are authorized to use your personally identifiable information only as necessary to provide these services to us.
III. User Access and Choice
Upon request CTSdatabase will provide you with information about whether we hold, or process on behalf of a third party, any of your personal information. If your personally identifiable information changes, or if you want it to be deleted from our system, you can contact us Here or by telephone or postal mail using the contact information listed below. We will respond to your inquiry within 30 days.
We will retain your information for as long as your account is active or as needed to provide you services.
We will retain and use your information as necessary to comply with our legal obligations, resolve disputes, and enforce our agreements.
IV. Tracking Technologies Used
CTSdatabase and our marketing partners, affiliates and customer support providers, use technologies such as cookies, beacons, tags, and scripts, to analyze trends, administer the website, tracking users' movements around the website, and to gather demographic information about our user base as a whole. We may receive reports based on the use of these technologies by these companies on an individual and aggregated basis.
As is true of most websites, we gather certain information automatically and store it in log files. This information may include Internet protocol (IP) addresses, browser type, internet service provider (ISP), referring/exit pages, operating system, date/time stamp, and zip code of entering site. We link this automatically collected data to other information we collect about you.
We partner with a third party to either display advertising on our website or to manage our advertising on other sites. Our third party partner may use technologies such as cookies to gather information about your activities on this website and other sites in order to provide you advertising based upon your browsing activities and interests. If you wish to not have this information used for the purpose of serving you interest-based ads, you may opt-out by clicking here (or if located in the European Union click here). Please note this does not opt you out of being served ads. You will continue to receive generic ads.
V. Security measures to Protect PII
The security of your personally identifiable information is important to us. We follow generally accepted standards to protect the personally identifiable information submitted to us, both during transmission and once we receive it. No method of transmission over the Internet, or method of electronic storage, is 100% secure, however. Therefore, we cannot guarantee its absolute security.
VI. Links to 3rd Party Sites