July 25, 2024
Office of The Director, National Institutes of Health (OD)
The National Institutes of Health (NIH) is updating two practices under the NIH Genomic Data Sharing (GDS) Policy to continue to promote responsible data management and access. These changes are to ensure GDS Policy implementation continues to evolve alongside changing practices for collecting, sharing, and using controlled-access human genomic data and include (1) modernizing security standards provided in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policyand (2) establishing minimum expectations for access to controlled-access data by developers. This implementation update will take effect on January 25, 2025.
Background
The NIH Genomic Data Sharing (GDS) Policy (NOT-OD-14-124) sets forth NIHs expectations for the broad and responsible sharing of large-scale human and non-human genomic data. A core tenet of the GDS Policy is that research participants data will be provided and used only for purposes indicated by the submitting institution and overseen by NIH Data Access Committees (DACs). Importantly, those maintaining controlled-access data repositories, developing tools for sharing controlled access data, etc., –often referred to as developers– may also require access to these data. The GDS Policy is silent about this type of access by developers, and NIH has determined that a consistent minimum standard for developer access is needed as the number of controlled-access data repositories sharing genomic data under the GDS Policy increases. As such, NIH is providing additional clarity for developers to ensure data management and access practices align with the agencys expectations under the GDS Policy.
Security standards are another critical component of upholding participant protections and ensuring the effectiveness of controls. Under the GDS Policy, NIH has relied on the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy to communicate security expectations for Approved Users and their institutions, and for repositories that store and share human genomic data. On November 30, 2021, NIH sought public feedback through a Request for Information, Proposed Updates and Long-Term Considerations for the NIH GDS Policy (NOT-OD-22-029), which requested feedback on whether controlled-access data repositories that store and share genomic data under the GDS Policy should have a FISMA and FedRAMP Moderate Authority to Operate (ATO).
Several respondents strongly supported expecting repositories to adopt FISMA and FedRAMP Moderate ATO controls. While no comments opposed the application of these standards, some respondents expressed concern that disparities in resource availability may limit some repositories and platforms from adopting certain security standards and protections. NIH understands that some burden may be imposed on institutions by expecting that they adopt the updated security standards and will monitor the impact of compliance. Respondents also suggested that FISMA and FedRAMP Moderate ATO protections may become inadequate as risks change, and that stronger protections may be needed in the future. NIH will continue to monitor risks and will update these standards as appropriate. Additionally, although NIH did not specifically request information on minimum standards for developer access, several respondents emphasized the importance of NIH controlled-access data repositories maintaining appropriate minimum standards and protections for data.
To update security expectations to reflect current standards and to standardize oversight approaches for developer access, NIH is implementing the following updates.
Scope and Applicability
This update applies to all NIH funding mechanisms (grants, cooperative agreements, contracts, Other Transactions, and intramural support) regardless of the activity code that support the following activities:
NIH will treat cloud workspaces meeting the above criteria as controlled-access data repositories subject to the relevant expectations under this update. NIH does not intend to include in the definition of controlled-access data repositories activities such as consortia data coordinating centers or similar activities that do not share data outside of a specific program or initiative.
Effective Date
The effective date of this update is January 25, 2025, including for the following mechanisms if they support activities described in the Scope and Applicability:
For competing awards (e.g., grants, contracts, cooperative agreements, and Other Transactions) that support NIH controlled-access data repositories and access systems or developers as described in the Scope and Applicability of this Notice, NIH Institutes, Centers, and Offices (ICOs) are expected to include the applicable implementation update described in this Notice in the Notice of Funding Opportunity (NOFO). When awarded, compliance with the applicable implementation update will be included in the Term and Condition of Award.
For non-competing continuing awards (e.g., grants, contracts, cooperative agreements, and Other Transactions) that support NIH controlled-access data repositories and access systems or developers described in the Scope and Applicability of this Notice, the recipient will work with their funding NIH ICO to update their existing Term and Condition of Award to reflect the applicable implementation update described in this Notice as soon as possible, but no later than the next budget period following the effective date.
FOR INTRAMURAL ONLY: For new and ongoing IRP projects that support activities described in the Scope and Applicability of this Notice, the IRP project will work with their NIH ICO to adopt the applicable implementation update as soon as possible, but no later than the effective date of this notice. For newly established and ongoing intramurally-funded NIH-managed data repositories that support activities described in the Scope and Applicability of this Notice, the NIH-managed data repository will work with their managing NIH ICO to adopt the applicable implementation update as soon as possible, but no later than the effective date of this Notice.
Updates for NIH Controlled-Access Data Repositories, Approved Users, and Developers
The NIH Security Best Practices for Users of Controlled-Access Data
The NIH Security Best Practices for Users of Controlled-Access Data is intended to ensure that Approved Users of NIH controlled-access data under the GDS Policy maintain such data on institutional IT systems and third-party computing infrastructures that meet certain standards in accordance to NIST SP 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations To that end, NIH expects that:
The process for submitting an attestation will vary and may be incorporated as part of the process for accessing controlled data or through other agreements.
Expectations under the NIH Security Best Practices for Users of Controlled-Access Data are in addition to, and do not supersede, any local, State, Tribal, Federal laws and regulations, and/or relevant institutional policies.
Update to Approved User Agreements
The NIH Security Best Practices for Users of Controlled-Access Data update will be effective on January 25, 2025, at which point adherence to this standard will be included in new or renewed Data Use Certifications or similar agreements stipulating terms of access to controlled-access human genomic data regardless of whether the Approved User is supported by NIH or not.
The NIH Security Best Practices for Controlled-Access Data Repositories
NIH controlled-access data repositories that provide access to controlled-access human genomic data under the GDS Policy or store such data on a long-term basis are obligated to protect the confidentiality, integrity, and availability of the data. Accordingly, NIH adopted security controls in accordance with NIST SP 800-53 Security and Privacy Controls for Information Systems and Organizations. To that end, the NIH Security Best Practices for Controlled-Access Data Repositories expects that NIH controlled-access data repositories that store and share human genomic data under the GDS Policy will:
Expectations under the NIH Security Best Practices for Controlled-Access Data Repositories are in addition to, and do not supersede, any local, State, Tribal, Federal laws and regulations, and/or relevant institutional policies.
Minimum Standard Operating Procedures for Developer Oversight
NIH is establishing a developer access framework to ensure that developers, and those they directly supervise, who are provided access to controlled-access human genomic data under the GDS Policy, maintain participant protections, privacy, and oversight consistent with Policy expectations. Developer work includes testing platforms, pipelines, analysis tools, and user interfaces that store, manage, and interact with human genomic data from NIH controlled-access data repositories, as well as providing infrastructure development and repository maintenance, but does not include research (e.g., methods development). The Lead Developer(s) (e.g., for extramural the Principal Investigator (PI) who is listed as the Project Director (PD) or PI on the funding application; for intramural the developer team lead at the managing NIH ICO repository), those that they directly supervise, and the Lead Developers institution are expected to agree to developer terms of access described in the Term and Condition of Award, the Developer Data Use Agreement, if applicable, and any additional NIH program or ICO specific requirements.
The developer terms of access are based on the terms of access for researchers under the GDS Policy and include provisions detailing developer responsibilities, agreement to public posting of the name of the Lead Developers institution, intended developer activities, prohibitions on re-identifying or recontacting participants, agreement to uphold NIH Certificates of Confidentiality, prohibitions on transferring data, adherence to the NIH Security Best Practices for Controlled-Access Repositories or, if applicable, the NIH Security Best Practices for Users of Controlled-Access Data, and review of the NIH Security Awareness Course, among other provisions. The Developer Code of Conduct, included in the terms of access, is based on the Genomic Data User Code of Conduct and the developer terms of access. Although this update is for developer access to human genomic data under the GDS Policy, it may be relevant to developer access to other data maintained in NIH controlled-access data repositories.
This Notice establishes minimum standard operating procedures for developer oversight; it does not create or standardize technical controls for intake, processing, or authorization of access requests. To that end, developer access to controlled-access data will be overseen by the NIH Developer Data Access Committee (Developer DAC), composed of federal employees with the appropriate subject matter expertise and/or program expertise who will review and approve requests for developer access based on the description of use provided via a Developer Use Statement (DUS) .Repositories may employ different mechanisms for providing and monitoring access to controlled-access data. They may also employ different mechanisms for different types of developers, e.g., for repository staff vs external application developers. Regardless of what technical controls repositories use to grant access, developer access is not granted until the NIH Developer DAC has approved.
Lead Developers seeking access are expected to submit a request containing a DUS to the NIH Developer DAC ([email protected]) no later than at Just-in-Time (JIT) for grants and cooperative agreements, with the proposal provided by the offeror for contracts, or with the application for funding with Other Transactions. If a project has multiple Lead Developers, (e.g., for multicomponent awards), each Lead Developer must submit a DUS. All Lead Developers must be associated with an institution that is receiving or applying for NIH or other federal support for the developer work with a funding mechanism that has incorporated the developer terms of access.
The DUS should contain at least the following (note that NIH ICOs may have additional expectations):
If the Lead Developer seeks to work with a partner not directly funded by NIH or the federal government that will need access to NIH controlled-access data (and is not a third-party IT system and/or CSP) NIH will only provide the developer partner access to controlled-access data if:
Expectations under the Minimum Standard Operating Procedures for Developer Oversight are in addition to, and do not supersede, any local, State, Tribal, Federal laws and regulations, and/or relevant institutional policies. This framework, consisting of minimum standards for developer access, complements the NIST information security standards (e.g., NIST SP 800-53 and NIST SP 800-171) under the NIH Security Best Practices described in this Notice. It does not supersede, replace, or otherwise negate developer responsibilities under these standards.
Please direct all inquiries to:
IC Name: Office of Science Policy
Telephone: 301-496-9838
Email: [email protected]