79C3C34C52B45572883A05D425EB0F82

Operational Guidelines and Procedures for Human Research Ethics Committee

http://www.rss.hku.hk/HREC/guidelines.pdf

http://leaux.net/URLS/ConvertAPI Text Files/7424FFC638B6F62D2EA02BA007FA7EDC.en.txt

Examining the file media/Synopses/7424FFC638B6F62D2EA02BA007FA7EDC.html:

This file was generated: 2020-12-20 17:58:34

Indicators in focus are typically shown highlighted in yellow; Peer Indicators (that share the same Vulnerability association) are shown highlighted in pink; "Outside" Indicators (those that do NOT share the same Vulnerability association) are shown highlighted in green; Trigger Words/Phrases are shown highlighted in gray.

Link to Orphaned Trigger Words (Appendix (Indicator List, Indicator Peers, Trigger Words, Type/Vulnerability/Indicator Overlay)


Applicable Type / Vulnerability / Indicator Overlay for this Input

Vulnerability TypeVulnerabilityIndicator# Matches
Politicalpolitical affiliationparty2
Politicalvulnerablevulnerable1
HealthDrug Usageusage2
SocialAccess to Social Goodsaccess3
SocialAgeage1
SocialChildchild1
SocialChildchildren8
SocialLaboratory Staffresearch staff2
SocialLinguistic Proficiencylanguage1
SocialLiteracyilliterate1
SocialStudentstudent4
Socialeducationeducation1
Socialparentsparents4
General/OtherRelationship to Authorityauthority1
General/OtherUndue Influenceundue influence2
General/Otherbelmontbelmont2

Political / political affiliation

Searching for indicator party:

(return to top)
p.(None): to ensure that the design of projects takes account of any relevant ethical guidelines, is made available for
p.(None): information of all Research Postgraduate and Taught Postgraduate students in the Graduate School Handbook and the
p.(None): Postgraduate Handbook (Coursework Programmes) respectively.
p.(None):
p.(None): Declaration of Awareness to Seek Ethical Clearance
p.(None): 10. All postgraduate students admitted since September 1, 2006 are required to sign a declaration form upon first
p.(None): registration at the University to acknowledge their awareness of the requirement to comply with ethical clearance
p.(None): requirements. Research postgraduate (RPg) students are asked to indicate in their annual progress report form if
p.(None): ethical approval is required for the research involved in his/her proposed thesis. RPg students will be required to
p.(None): submit documentary evidence to show that the relevant ethical approval has been obtained for research work on their
p.(None): theses when they submit their detailed scheme of research and the candidate’s progress report, for purposes of
p.(None): confirmation of candidatures.
p.(None):
p.(None):
p.(None):
p.(None): - 2 -
p.(None):
p.(None): Research Postgraduate (RPg) Students
p.(None): 11. All RPg students are responsible for seeking ethical approval for their research projects with their supervisor
p.(None): and Head of Department endorsing the application before submission to the HREC.
p.(None):
p.(None): Taught Postgraduate (TPg) and Undergraduate (Ug) Students
p.(None): 12. TPg students are required to submit their ethical application, with endorsement of their supervisor, to the
p.(None): Faculty-based Research Ethics Committee or its delegate(s) who should be an independent party for approval. Ug
p.(None): students are assumed to be less experienced in judging if ethical clearance should be sought for their assignments, so
p.(None): the supervisor/tutor in charge is given responsibility for determining if each student’s project needs ethical
p.(None): clearance and for completing the necessary application for ethical approval on the students’ behalf, for submission to
p.(None): the Head of Department/Dean of Faculty (for unitary Faculties).
p.(None):
p.(None): V. Ethical Guidelines for Research involving Human Participants
p.(None):
p.(None): 13. Every PI should be aware of the basic ethical principles set out in the University’s Policy on Research Integrity
p.(None): and the Belmont Report which constitutes the ethical principles underpinning research involving human participants.
p.(None): The Policy document and a four- page summary of the Belmont Report can be downloaded from the website.
p.(None): Researchers should, in particular, note the following principles when conducting non- invasive, behavioral type of
p.(None): research within the purview of the HREC:
p.(None):
p.(None): - minimal risk and risk proportionate to research benefit;
p.(None): - informed consent;
p.(None): - no undue influence and inducement to participate;
p.(None): - protection of vulnerable research participants;
...

p.(None):
p.(None): consent, fabrication and falsification. PIs are strongly advised to remove all personal identifiers for long term
p.(None): retention of their research data, in order to minimize privacy risks. Data with personal identifiers must not be
p.(None): kept beyond 5 years after publication unless there is explicit written consent from the participants to retaining the
p.(None): data with personal identifiers preserved, such as in oral histories. Anonymised data and records should be retained
p.(None): for as long as they are of continuing value to the researcher and the wider research community.
p.(None):
p.(None): Security
p.(None): 26. Participants should be assured that the information collected will not be publicly disclosed in a way that
p.(None): specific person can be identified unless expressly consented to, and that every precaution will be taken in relation to
p.(None): the storage, use and disposition of data, for example, locking up raw data. For private sensitive data, PIs are
p.(None): suggested using indirect identifiers and keeping the direct identifiers separate from the data. Measures should be
p.(None): taken to ensure the integrity, prudence and competence of persons having access to data.
p.(None):
p.(None): Benefits
p.(None): 27. Prospective participants should not be adversely induced by financial reward or be pressured to participate in
p.(None): research. All reimbursement of expenses, such as traveling expenses, should be commensurate with standard practice
p.(None): and be reasonable.
p.(None):
p.(None): For Studies Involving External Parties
p.(None): 28. If an external party is involved in co-organizing the research project (e.g. in recruitment or data collection),
p.(None): a formal contract/letter of agreement or consent form should be signed before commencement of the project, and such
p.(None): document should be submitted together with the ethical application. Alternatively, an authorized representative of
p.(None): the external organization can participate in the research project as a co-investigator.
p.(None):
p.(None):
p.(None): VI. Types of Review
p.(None):
p.(None): 29. The HREC conducts three types of review i.e. expedited review, double review and full review. In general, for
p.(None): a research protocol which involves only minimal risks to human beings, an expedited review may be conducted to shorten
p.(None): the review process, subject to the Chairman’s discretion. If not, the application will go through double review or
p.(None): full review by the Committee.
p.(None):
p.(None): 30. Expedited Review
p.(None):
p.(None): Projects involving no greater than minimal risk will normally be considered by the Chairman (or another member of the
p.(None): Committee as recommended by the Chairman) under “expedited review”.
p.(None):
p.(None): 31. Double Review
p.(None):
p.(None): Research that does not fulfill the description of minimal risks will normally require double review by at least two
p.(None): members of the Committee.
p.(None):
p.(None): 32. Full Review
p.(None):
p.(None): If the applicant does not agree with the changes asked for, the reviewers do not agree in their assessments, or there
p.(None): is an important matter of principle, the application will receive a full review by the Committee.
p.(None):
p.(None):
p.(None): - 7 -
p.(None):
...

Political / vulnerable

Searching for indicator vulnerable:

(return to top)
p.(None): students are assumed to be less experienced in judging if ethical clearance should be sought for their assignments, so
p.(None): the supervisor/tutor in charge is given responsibility for determining if each student’s project needs ethical
p.(None): clearance and for completing the necessary application for ethical approval on the students’ behalf, for submission to
p.(None): the Head of Department/Dean of Faculty (for unitary Faculties).
p.(None):
p.(None): V. Ethical Guidelines for Research involving Human Participants
p.(None):
p.(None): 13. Every PI should be aware of the basic ethical principles set out in the University’s Policy on Research Integrity
p.(None): and the Belmont Report which constitutes the ethical principles underpinning research involving human participants.
p.(None): The Policy document and a four- page summary of the Belmont Report can be downloaded from the website.
p.(None): Researchers should, in particular, note the following principles when conducting non- invasive, behavioral type of
p.(None): research within the purview of the HREC:
p.(None):
p.(None): - minimal risk and risk proportionate to research benefit;
p.(None): - informed consent;
p.(None): - no undue influence and inducement to participate;
p.(None): - protection of vulnerable research participants;
p.(None): - protection of research involving deception of participants;
p.(None): - ensuring the confidentiality and security of research and personal data; and
p.(None): - compliance with the Law.
p.(None):
p.(None): Sources of Data
p.(None): 14. All research that involves collecting new data from human participants and/or using pre- existing personal data 1
p.(None): is subject to ethical clearance. Collection of new data from human participants covers all forms of collection
p.(None): process, e.g. experimental
p.(None): procedures/retreatment/intervention, focus group, telephone/internet survey, observation, personal interviews, or
p.(None): self-administered questionnaire, etc. Usage of pre-existing data refers to retrieving readily available personal
p.(None): data from existing documents/records for secondary analysis, irrespective of whether or not the data are publicly
p.(None): available 2, whether or not the data originally collected are intentionally for research purpose, and whether the
p.(None): personal data from existing documents/records will be extracted for secondary analysis. For example, using students’
p.(None): assignments for research analysis means to use pre-existing data from a private source that were originally collected
p.(None): for
p.(None): non-research purposes.
p.(None):
p.(None):
p.(None):
p.(None): 1 As defined by the Personal Data (Privacy) Ordinance, “personal data” means any data
p.(None): (a) relating directly or indirectly to a living individual; and (b) from which it is practicable for the identity of
p.(None): the individual to be directly or indirectly ascertained; and in a form in which access to or processing of the data is
...

Health / Drug Usage

Searching for indicator usage:

(return to top)
p.(None): covered in the following sections.
p.(None):
p.(None): 5. Researchers from Faculties other than Dentistry and Medicine but whose research protocol may involve clinical
p.(None): research, should submit their applications in the first instance to the HREC for consideration. The Chairman will
p.(None): determine, on behalf of the HREC, whether the research protocol should be referred to the IRB for consideration.
p.(None): Similarly, the IRB will receive and refer applications outside the scope of clinical studies to the HREC for
p.(None): consideration.
p.(None):
p.(None): 6. The responsibility for seeking compliance with the basic ethical principles and procedures rests with the
p.(None): Principal Investigator who should clearly indicate in his/her research proposal if it is necessary to seek ethical
p.(None): clearance.
p.(None):
p.(None): 7. When HKU staff or students engage (other than as research participants) in research projects led by other
p.(None): universities/organizations that involve human participants in the research investigations, if any part of the data
p.(None): collection is organized through or in the name of HKU, the responsible person from HKU (including staff and students)
p.(None): should seek ethical approval from HKU. For research projects without any HKU staff and students participating as PIs
p.(None): or Co-Is that involve human research participants in HKU, the PI of the project should seek ethical approval from HKU
p.(None): to ensure that the human research participants in HKU are well protected.
p.(None):
p.(None): 8. Exemption from ethical approval will only apply to anonymous surveys for improving teaching and learning (not
p.(None): for research) which are exclusively for the University's internal usage.
p.(None):
p.(None):
p.(None): IV. Research Work Conducted by Students
p.(None):
p.(None): 9. The University’s Policy on Research Integrity, which requires all members of the University (including students)
p.(None): to ensure that the design of projects takes account of any relevant ethical guidelines, is made available for
p.(None): information of all Research Postgraduate and Taught Postgraduate students in the Graduate School Handbook and the
p.(None): Postgraduate Handbook (Coursework Programmes) respectively.
p.(None):
p.(None): Declaration of Awareness to Seek Ethical Clearance
p.(None): 10. All postgraduate students admitted since September 1, 2006 are required to sign a declaration form upon first
p.(None): registration at the University to acknowledge their awareness of the requirement to comply with ethical clearance
p.(None): requirements. Research postgraduate (RPg) students are asked to indicate in their annual progress report form if
p.(None): ethical approval is required for the research involved in his/her proposed thesis. RPg students will be required to
p.(None): submit documentary evidence to show that the relevant ethical approval has been obtained for research work on their
p.(None): theses when they submit their detailed scheme of research and the candidate’s progress report, for purposes of
p.(None): confirmation of candidatures.
p.(None):
p.(None):
p.(None):
p.(None): - 2 -
p.(None):
p.(None): Research Postgraduate (RPg) Students
p.(None): 11. All RPg students are responsible for seeking ethical approval for their research projects with their supervisor
p.(None): and Head of Department endorsing the application before submission to the HREC.
p.(None):
p.(None): Taught Postgraduate (TPg) and Undergraduate (Ug) Students
p.(None): 12. TPg students are required to submit their ethical application, with endorsement of their supervisor, to the
...

p.(None): The Policy document and a four- page summary of the Belmont Report can be downloaded from the website.
p.(None): Researchers should, in particular, note the following principles when conducting non- invasive, behavioral type of
p.(None): research within the purview of the HREC:
p.(None):
p.(None): - minimal risk and risk proportionate to research benefit;
p.(None): - informed consent;
p.(None): - no undue influence and inducement to participate;
p.(None): - protection of vulnerable research participants;
p.(None): - protection of research involving deception of participants;
p.(None): - ensuring the confidentiality and security of research and personal data; and
p.(None): - compliance with the Law.
p.(None):
p.(None): Sources of Data
p.(None): 14. All research that involves collecting new data from human participants and/or using pre- existing personal data 1
p.(None): is subject to ethical clearance. Collection of new data from human participants covers all forms of collection
p.(None): process, e.g. experimental
p.(None): procedures/retreatment/intervention, focus group, telephone/internet survey, observation, personal interviews, or
p.(None): self-administered questionnaire, etc. Usage of pre-existing data refers to retrieving readily available personal
p.(None): data from existing documents/records for secondary analysis, irrespective of whether or not the data are publicly
p.(None): available 2, whether or not the data originally collected are intentionally for research purpose, and whether the
p.(None): personal data from existing documents/records will be extracted for secondary analysis. For example, using students’
p.(None): assignments for research analysis means to use pre-existing data from a private source that were originally collected
p.(None): for
p.(None): non-research purposes.
p.(None):
p.(None):
p.(None):
p.(None): 1 As defined by the Personal Data (Privacy) Ordinance, “personal data” means any data
p.(None): (a) relating directly or indirectly to a living individual; and (b) from which it is practicable for the identity of
p.(None): the individual to be directly or indirectly ascertained; and in a form in which access to or processing of the data is
p.(None): practicable.
p.(None):
p.(None): 2 “Publicly available” means that the general public can obtain the data. Sources are not considered “publicly
p.(None): available” if access to the data is limited to researchers.
p.(None):
p.(None): - 3 -
p.(None):
p.(None): Risk Assessment
p.(None): 15. To ensure that participants' interests and rights are protected, PIs are required to undertake “Risk Assessment”
p.(None): in completing the ethical application. For which, PIs should consider carefully if the research study will involve
p.(None): any possible risks which could induce greater than minimal physical and/or psychological stress/pain/discomfort to
...

Social / Access to Social Goods

Searching for indicator access:

(return to top)
p.(None): - protection of research involving deception of participants;
p.(None): - ensuring the confidentiality and security of research and personal data; and
p.(None): - compliance with the Law.
p.(None):
p.(None): Sources of Data
p.(None): 14. All research that involves collecting new data from human participants and/or using pre- existing personal data 1
p.(None): is subject to ethical clearance. Collection of new data from human participants covers all forms of collection
p.(None): process, e.g. experimental
p.(None): procedures/retreatment/intervention, focus group, telephone/internet survey, observation, personal interviews, or
p.(None): self-administered questionnaire, etc. Usage of pre-existing data refers to retrieving readily available personal
p.(None): data from existing documents/records for secondary analysis, irrespective of whether or not the data are publicly
p.(None): available 2, whether or not the data originally collected are intentionally for research purpose, and whether the
p.(None): personal data from existing documents/records will be extracted for secondary analysis. For example, using students’
p.(None): assignments for research analysis means to use pre-existing data from a private source that were originally collected
p.(None): for
p.(None): non-research purposes.
p.(None):
p.(None):
p.(None):
p.(None): 1 As defined by the Personal Data (Privacy) Ordinance, “personal data” means any data
p.(None): (a) relating directly or indirectly to a living individual; and (b) from which it is practicable for the identity of
p.(None): the individual to be directly or indirectly ascertained; and in a form in which access to or processing of the data is
p.(None): practicable.
p.(None):
p.(None): 2 “Publicly available” means that the general public can obtain the data. Sources are not considered “publicly
p.(None): available” if access to the data is limited to researchers.
p.(None):
p.(None): - 3 -
p.(None):
p.(None): Risk Assessment
p.(None): 15. To ensure that participants' interests and rights are protected, PIs are required to undertake “Risk Assessment”
p.(None): in completing the ethical application. For which, PIs should consider carefully if the research study will involve
p.(None): any possible risks which could induce greater than minimal physical and/or psychological stress/pain/discomfort to
p.(None): participants. Under normal circumstances, participants should not be exposed to risks which are greater than minimal
p.(None): risks 3. In case that there are risks, PIs should inform participants clearly about the type and what degree of the
p.(None): risk they may be undertaking, and what measures will be taken to minimize the risk, and what remedial support will be
p.(None): given to participants at risk. PIs should safeguard participants’ privacy and confidentiality. PIs should let
p.(None): participants know how their provided data will be deployed in the research, identifiable or anonymous 4, and how and
p.(None): how long the data will be safely kept. PIs should also assess if there is any potential conflict of interest that
p.(None): needs to be declared and addressed.
p.(None):
p.(None): Informed Consent
p.(None): 16. Respect for persons requires that participants, to the degree that they are capable, be given the opportunity to
...

p.(None): Student assent is still required even if passive parental consent is used.
p.(None):
p.(None): - 6 -
p.(None):
p.(None): consent, fabrication and falsification. PIs are strongly advised to remove all personal identifiers for long term
p.(None): retention of their research data, in order to minimize privacy risks. Data with personal identifiers must not be
p.(None): kept beyond 5 years after publication unless there is explicit written consent from the participants to retaining the
p.(None): data with personal identifiers preserved, such as in oral histories. Anonymised data and records should be retained
p.(None): for as long as they are of continuing value to the researcher and the wider research community.
p.(None):
p.(None): Security
p.(None): 26. Participants should be assured that the information collected will not be publicly disclosed in a way that
p.(None): specific person can be identified unless expressly consented to, and that every precaution will be taken in relation to
p.(None): the storage, use and disposition of data, for example, locking up raw data. For private sensitive data, PIs are
p.(None): suggested using indirect identifiers and keeping the direct identifiers separate from the data. Measures should be
p.(None): taken to ensure the integrity, prudence and competence of persons having access to data.
p.(None):
p.(None): Benefits
p.(None): 27. Prospective participants should not be adversely induced by financial reward or be pressured to participate in
p.(None): research. All reimbursement of expenses, such as traveling expenses, should be commensurate with standard practice
p.(None): and be reasonable.
p.(None):
p.(None): For Studies Involving External Parties
p.(None): 28. If an external party is involved in co-organizing the research project (e.g. in recruitment or data collection),
p.(None): a formal contract/letter of agreement or consent form should be signed before commencement of the project, and such
p.(None): document should be submitted together with the ethical application. Alternatively, an authorized representative of
p.(None): the external organization can participate in the research project as a co-investigator.
p.(None):
p.(None):
p.(None): VI. Types of Review
p.(None):
p.(None): 29. The HREC conducts three types of review i.e. expedited review, double review and full review. In general, for
p.(None): a research protocol which involves only minimal risks to human beings, an expedited review may be conducted to shorten
p.(None): the review process, subject to the Chairman’s discretion. If not, the application will go through double review or
p.(None): full review by the Committee.
p.(None):
p.(None): 30. Expedited Review
p.(None):
p.(None): Projects involving no greater than minimal risk will normally be considered by the Chairman (or another member of the
p.(None): Committee as recommended by the Chairman) under “expedited review”.
p.(None):
p.(None): 31. Double Review
p.(None):
...

Social / Age

Searching for indicator age:

(return to top)
p.(None):
p.(None): b) for school based studies of children in Primary (i.e. 5 years old and above), parental passive consent is
p.(None): normally sufficient for studies involving minimal risk, provided that only anonymous and non-sensitive data will be
p.(None): collected; and
p.(None):
p.(None): c) for school based studies of children in Secondary (i.e. 11 years old and above), parental passive consent is
p.(None): normally sufficient for studies involving minimal risk.
p.(None):
p.(None): For Adolescent Research Outside School
p.(None): d) for studies of adolescents aged 16 or above, parental consent is not normally required on the basis that they
p.(None): are mature minors.
p.(None):
p.(None): For Studies of University Students
p.(None): e) parental consent is normally not required for research projects involving no greater than minimal risks, even if
p.(None): the university students are aged 17 or below, on the understanding that they should be able to make their own
p.(None): decisions. For further details on dealing with the affairs of student minors, researchers should refer to the
p.(None): University's Guidance Note - Students under the age of 18 (document 466/617).
p.(None):
p.(None): Privacy and Confidentiality of Data
p.(None): 24. To comply with the Personal Data (Privacy) Ordinance, researchers must maintain the confidentiality of data
p.(None): related to individual research participants. Except by public observation, researchers should clearly indicate the
p.(None): purpose of the collection of data and the method to ensure the confidentiality of collected data. Researchers must
p.(None): also avoid use of any personal identifiers such as individual names and addresses in their research reports which could
p.(None): lead to the human participants being identified.
p.(None):
p.(None): 25. The minimum retention period for research data and records is three years after publication or public release of
p.(None): the research to ensure that there are no problems with
p.(None):
p.(None):
p.(None): 7 Passive parental consent means that parents are fully informed of the right to refuse participation by their
p.(None): children. Parents/guardians must be given reasonable time (e.g. 2 weeks), to object to the child’s participation.
p.(None): Student assent is still required even if passive parental consent is used.
p.(None):
p.(None): - 6 -
p.(None):
p.(None): consent, fabrication and falsification. PIs are strongly advised to remove all personal identifiers for long term
...

Social / Child

Searching for indicator child:

(return to top)
p.(None): the university students are aged 17 or below, on the understanding that they should be able to make their own
p.(None): decisions. For further details on dealing with the affairs of student minors, researchers should refer to the
p.(None): University's Guidance Note - Students under the age of 18 (document 466/617).
p.(None):
p.(None): Privacy and Confidentiality of Data
p.(None): 24. To comply with the Personal Data (Privacy) Ordinance, researchers must maintain the confidentiality of data
p.(None): related to individual research participants. Except by public observation, researchers should clearly indicate the
p.(None): purpose of the collection of data and the method to ensure the confidentiality of collected data. Researchers must
p.(None): also avoid use of any personal identifiers such as individual names and addresses in their research reports which could
p.(None): lead to the human participants being identified.
p.(None):
p.(None): 25. The minimum retention period for research data and records is three years after publication or public release of
p.(None): the research to ensure that there are no problems with
p.(None):
p.(None):
p.(None): 7 Passive parental consent means that parents are fully informed of the right to refuse participation by their
p.(None): children. Parents/guardians must be given reasonable time (e.g. 2 weeks), to object to the child’s participation.
p.(None): Student assent is still required even if passive parental consent is used.
p.(None):
p.(None): - 6 -
p.(None):
p.(None): consent, fabrication and falsification. PIs are strongly advised to remove all personal identifiers for long term
p.(None): retention of their research data, in order to minimize privacy risks. Data with personal identifiers must not be
p.(None): kept beyond 5 years after publication unless there is explicit written consent from the participants to retaining the
p.(None): data with personal identifiers preserved, such as in oral histories. Anonymised data and records should be retained
p.(None): for as long as they are of continuing value to the researcher and the wider research community.
p.(None):
p.(None): Security
p.(None): 26. Participants should be assured that the information collected will not be publicly disclosed in a way that
p.(None): specific person can be identified unless expressly consented to, and that every precaution will be taken in relation to
p.(None): the storage, use and disposition of data, for example, locking up raw data. For private sensitive data, PIs are
p.(None): suggested using indirect identifiers and keeping the direct identifiers separate from the data. Measures should be
p.(None): taken to ensure the integrity, prudence and competence of persons having access to data.
p.(None):
p.(None): Benefits
p.(None): 27. Prospective participants should not be adversely induced by financial reward or be pressured to participate in
...

Searching for indicator children:

(return to top)
p.(None): application form. This requires providing full details on the types of personal data to be used, and any appropriate
p.(None): informed consent forms or
p.(None): Personal Information Collection Statements from the original data collection process. It also requires an
p.(None): explanation of how this research is consistent with the purpose and use specified when the data were originally
p.(None): collected, as otherwise PIs must seek informed consent from participants again if they wish to use pre-existing data
p.(None): with personal
p.(None):
p.(None):
p.(None): 6 Personal identifier can be direct or indirect. Direct personal identifiers are, e.g. name, address, ID card
p.(None): numbers, medical record numbers, etc., while indirect identifier is, e.g. assigned code that can make a subject
p.(None): reasonably identifiable.
p.(None):
p.(None):
p.(None): - 5 -
p.(None):
p.(None): identifiers for a new purpose.
p.(None):
p.(None): Pilot Studies
p.(None): 21. There is a need to seek consent before obtaining data in pilot studies on the grounds that the informed consent
p.(None): form could be tested and be refined for use in any subsequent study.
p.(None):
p.(None): Parental Consent and Student Assent
p.(None): 22. The best practice should be to seek written consent from parents and to obtain assent from students themselves
p.(None): for research involving children under 18, even in cases where children were able to decline participation. The
p.(None): assent forms should be written in an easily comprehensible manner at children’s reading level, in order to facilitate
p.(None): their decision making on participating. For research with only minimal risk (including privacy risk), the following
p.(None): principles will determine if passive parental consent 7 can be used in place of written parental consent for
p.(None): participants who are children under 18.
p.(None): PIs seeking approval of passive parental consent should provide a full justification and an information sheet.
p.(None):
p.(None): For School-based Research
p.(None): 23. a) for school based studies of children below Primary, active consent of parents is normally required;
p.(None):
p.(None): b) for school based studies of children in Primary (i.e. 5 years old and above), parental passive consent is
p.(None): normally sufficient for studies involving minimal risk, provided that only anonymous and non-sensitive data will be
p.(None): collected; and
p.(None):
p.(None): c) for school based studies of children in Secondary (i.e. 11 years old and above), parental passive consent is
p.(None): normally sufficient for studies involving minimal risk.
p.(None):
p.(None): For Adolescent Research Outside School
p.(None): d) for studies of adolescents aged 16 or above, parental consent is not normally required on the basis that they
p.(None): are mature minors.
p.(None):
p.(None): For Studies of University Students
p.(None): e) parental consent is normally not required for research projects involving no greater than minimal risks, even if
p.(None): the university students are aged 17 or below, on the understanding that they should be able to make their own
p.(None): decisions. For further details on dealing with the affairs of student minors, researchers should refer to the
p.(None): University's Guidance Note - Students under the age of 18 (document 466/617).
p.(None):
p.(None): Privacy and Confidentiality of Data
p.(None): 24. To comply with the Personal Data (Privacy) Ordinance, researchers must maintain the confidentiality of data
p.(None): related to individual research participants. Except by public observation, researchers should clearly indicate the
p.(None): purpose of the collection of data and the method to ensure the confidentiality of collected data. Researchers must
p.(None): also avoid use of any personal identifiers such as individual names and addresses in their research reports which could
p.(None): lead to the human participants being identified.
p.(None):
p.(None): 25. The minimum retention period for research data and records is three years after publication or public release of
p.(None): the research to ensure that there are no problems with
p.(None):
p.(None):
p.(None): 7 Passive parental consent means that parents are fully informed of the right to refuse participation by their
p.(None): children. Parents/guardians must be given reasonable time (e.g. 2 weeks), to object to the child’s participation.
p.(None): Student assent is still required even if passive parental consent is used.
p.(None):
p.(None): - 6 -
p.(None):
p.(None): consent, fabrication and falsification. PIs are strongly advised to remove all personal identifiers for long term
p.(None): retention of their research data, in order to minimize privacy risks. Data with personal identifiers must not be
p.(None): kept beyond 5 years after publication unless there is explicit written consent from the participants to retaining the
p.(None): data with personal identifiers preserved, such as in oral histories. Anonymised data and records should be retained
p.(None): for as long as they are of continuing value to the researcher and the wider research community.
p.(None):
p.(None): Security
p.(None): 26. Participants should be assured that the information collected will not be publicly disclosed in a way that
p.(None): specific person can be identified unless expressly consented to, and that every precaution will be taken in relation to
p.(None): the storage, use and disposition of data, for example, locking up raw data. For private sensitive data, PIs are
p.(None): suggested using indirect identifiers and keeping the direct identifiers separate from the data. Measures should be
...

Social / Laboratory Staff

Searching for indicator research staff:

(return to top)
p.(None): 2/720 amended
p.(None):
p.(None): THE UNIVERSITY OF HONG KONG
p.(None):
p.(None): Human Research Ethics Committee
p.(None):
p.(None): Operational Guidelines and Procedures
p.(None):
p.(None):
p.(None): I. The University’s Ethical Committee Structure
p.(None):
p.(None): 1. As stipulated in the University’s Policy on Research Integrity
p.(None): ( http://www.rss.hku.hk/index.php/integrity/rcr/policy), all members of the University are under an obligation to
p.(None): comply with the highest standards of professional conduct. All research conducted by staff and students of the
p.(None): University involving human participants and the use of vertebrate animal subjects must be referred to the appropriate
p.(None): ethics committee:
p.(None):
p.(None): • the Institutional Review Board of the University of Hong Kong/Hospital Authority of Hong Kong West Cluster
p.(None): (“HKU/HA HKW IRB”), based in the Faculty of Medicine, receives for review any research protocols involving human
p.(None): participants and submitted by Principal Investigators (PI) who are academic/research staff of the Faculties of Medicine
p.(None): and Dentistry;
p.(None):
p.(None): • the Human Research Ethics Committee (HREC) receives for review any research protocols involving human
p.(None): participants submitted by Principal Investigators from the academic/research staff and students from Faculties other
p.(None): than Medicine and Dentistry; and
p.(None):
p.(None): • the Committee on the Use of Live Animals in Teaching and Research (CULATR) which reviews research protocols
p.(None): involving living animals.
p.(None):
p.(None): II. Ethical Reviews of Research Projects Involving Human Participants
p.(None):
p.(None): 2. The IRB handles ethical reviews of clinical research protocols conducted at the University of Hong Kong, while
p.(None): the HREC handles reviews of non-clinical research protocols involving human participants. A cross-referral mechanism
p.(None): has been established to enable the committees to refer applications beyond their remit to each other for review.
p.(None):
p.(None): 3. The following guidance notes on how to obtain ethical approval from the HREC are intended to provide the
p.(None): necessary information for PIs to complete the application form for ethical approval. The application form, together
p.(None): with background information, the terms of reference, and current membership of the HREC, can be downloaded from the
p.(None): HREC section of the Research Services website (the “website” hereafter) at
p.(None): http://www.rss.hku.hk/integrity/ethics-compliance/hrec.
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None): - 1 -
p.(None):
p.(None): III. Who Should Apply for Ethical Review by the HREC
p.(None):
p.(None): 4. Staff members and students from non-clinical faculties, who are the PI of a research project which involves
p.(None): human participants in research investigations (including secondary data analysis) should submit an application for
...

Social / Linguistic Proficiency

Searching for indicator language:

(return to top)
p.(None): participants. Under normal circumstances, participants should not be exposed to risks which are greater than minimal
p.(None): risks 3. In case that there are risks, PIs should inform participants clearly about the type and what degree of the
p.(None): risk they may be undertaking, and what measures will be taken to minimize the risk, and what remedial support will be
p.(None): given to participants at risk. PIs should safeguard participants’ privacy and confidentiality. PIs should let
p.(None): participants know how their provided data will be deployed in the research, identifiable or anonymous 4, and how and
p.(None): how long the data will be safely kept. PIs should also assess if there is any potential conflict of interest that
p.(None): needs to be declared and addressed.
p.(None):
p.(None): Informed Consent
p.(None): 16. Respect for persons requires that participants, to the degree that they are capable, be given the opportunity to
p.(None): choose what shall or shall not happen to them; the informed consent process is the instrument to provide this
p.(None): opportunity5. Researchers must
p.(None): accordingly obtain appropriate informed consent, and shall:
p.(None):
p.(None): a) give the research participant sufficient information about the study and how the study may affect the
p.(None): participant;
p.(None):
p.(None): b) deliver the information in a comprehensible manner, using a language readily understandable by the research
p.(None): participant; and
p.(None):
p.(None): c) assure the voluntary capacity of the participant by providing sufficient opportunity to consider whether or not
p.(None): to participate, and minimizing the possibility of coercion, undue influence, or harassment.
p.(None):
p.(None): 17. The process of obtaining informed consent has two components:
p.(None):
p.(None): a) providing the person who is being recruited to become a research participant with the information necessary to
p.(None): give informed consent by means such as an Information Sheet, and obtaining the consent to participate in the research;
p.(None): and
p.(None):
p.(None): b) documenting that informed consent has been obtained by means of an Informed Consent Form. Standard templates
p.(None): of Informed Consent Form can be downloaded from the website.
p.(None):
p.(None):
p.(None): 3 As defined by the IRB in its Standard Operation Procedures (2005), “Minimal Risk” means that the probability and
p.(None): magnitude of harm or discomfort anticipated in the research are not greater in and of themselves than those ordinarily
p.(None): encountered in daily life or during the performance of routine physical or psychological examination or test.
p.(None):
...

Social / Literacy

Searching for indicator illiterate:

(return to top)
p.(None): magnitude of harm or discomfort anticipated in the research are not greater in and of themselves than those ordinarily
p.(None): encountered in daily life or during the performance of routine physical or psychological examination or test.
p.(None):
p.(None): 4 Anonymous data: Data without personal identifier (e.g. name, ID card, DNA profile). Data is anonymous when there
p.(None): is no possible way to identify the participants from the data collected. Data are not anonymous if procedures, such
p.(None): as accessing a computer database, will identify the participant. For most specific cases, the omission of names and
p.(None): other personal identifiers as HKID/Passport numbers, is sufficient to qualify data as anonymous.
p.(None):
p.(None): 5 Section 6 (Informed Consent of Human Subjects of Research) of the IRB’s Standard Operating Procedures (2005).
p.(None):
p.(None): - 4 -
p.(None):
p.(None): The basic rule of human participant research is that both components of the informed consent process shall be
p.(None): completed.
p.(None):
p.(None): Recorded Consent Other Than Written Consent
p.(None): 18. Other than written consent, online/email recorded response can also serve as a means of obtaining informed
p.(None): consent as long as it is in response to a proper information sheet. Also, when conducting research where seeking
p.(None): written consent is not practical (e.g. illiterate respondents) or too sensitive, audio-recorded oral consent might be
p.(None): less of a privacy risk than written consent and can be considered as an alternative to written consent. In either
p.(None): case, please submit a full justification and an information sheet together with your application for ethical approval.
p.(None):
p.(None): Waiver of the Requirement of Recorded Informed Consent
p.(None): 19. Research participants must normally give recorded informed consent to any use of their personal data unless
p.(None): existing personal data is being used for the purposes for which they were collected or a directly related purpose.
p.(None):
p.(None): In case that any forms of recorded consent are not practical and that the new data to be collected are without
p.(None): personal identifiers6, the Committee may waive the requirement of written informed consent for the following types of
p.(None): research study:
p.(None):
p.(None): a) The research that involves no greater than minimal risk to the participants, and cannot practicably be carried
p.(None): out, if informed consent were to be obtained in advance, provided that the rights and welfare of the participants will
...

Social / Student

Searching for indicator student:

(return to top)
p.(None):
p.(None): Declaration of Awareness to Seek Ethical Clearance
p.(None): 10. All postgraduate students admitted since September 1, 2006 are required to sign a declaration form upon first
p.(None): registration at the University to acknowledge their awareness of the requirement to comply with ethical clearance
p.(None): requirements. Research postgraduate (RPg) students are asked to indicate in their annual progress report form if
p.(None): ethical approval is required for the research involved in his/her proposed thesis. RPg students will be required to
p.(None): submit documentary evidence to show that the relevant ethical approval has been obtained for research work on their
p.(None): theses when they submit their detailed scheme of research and the candidate’s progress report, for purposes of
p.(None): confirmation of candidatures.
p.(None):
p.(None):
p.(None):
p.(None): - 2 -
p.(None):
p.(None): Research Postgraduate (RPg) Students
p.(None): 11. All RPg students are responsible for seeking ethical approval for their research projects with their supervisor
p.(None): and Head of Department endorsing the application before submission to the HREC.
p.(None):
p.(None): Taught Postgraduate (TPg) and Undergraduate (Ug) Students
p.(None): 12. TPg students are required to submit their ethical application, with endorsement of their supervisor, to the
p.(None): Faculty-based Research Ethics Committee or its delegate(s) who should be an independent party for approval. Ug
p.(None): students are assumed to be less experienced in judging if ethical clearance should be sought for their assignments, so
p.(None): the supervisor/tutor in charge is given responsibility for determining if each student’s project needs ethical
p.(None): clearance and for completing the necessary application for ethical approval on the students’ behalf, for submission to
p.(None): the Head of Department/Dean of Faculty (for unitary Faculties).
p.(None):
p.(None): V. Ethical Guidelines for Research involving Human Participants
p.(None):
p.(None): 13. Every PI should be aware of the basic ethical principles set out in the University’s Policy on Research Integrity
p.(None): and the Belmont Report which constitutes the ethical principles underpinning research involving human participants.
p.(None): The Policy document and a four- page summary of the Belmont Report can be downloaded from the website.
p.(None): Researchers should, in particular, note the following principles when conducting non- invasive, behavioral type of
p.(None): research within the purview of the HREC:
p.(None):
p.(None): - minimal risk and risk proportionate to research benefit;
p.(None): - informed consent;
p.(None): - no undue influence and inducement to participate;
p.(None): - protection of vulnerable research participants;
p.(None): - protection of research involving deception of participants;
p.(None): - ensuring the confidentiality and security of research and personal data; and
p.(None): - compliance with the Law.
p.(None):
p.(None): Sources of Data
...

p.(None):
p.(None): c) The research could not practicably be carried out without the waiver or alteration.
p.(None):
p.(None): Pre-existing Data
p.(None): 20. Users of existing documents or records containing personal data must complete the “Existing Data” section of the
p.(None): application form. This requires providing full details on the types of personal data to be used, and any appropriate
p.(None): informed consent forms or
p.(None): Personal Information Collection Statements from the original data collection process. It also requires an
p.(None): explanation of how this research is consistent with the purpose and use specified when the data were originally
p.(None): collected, as otherwise PIs must seek informed consent from participants again if they wish to use pre-existing data
p.(None): with personal
p.(None):
p.(None):
p.(None): 6 Personal identifier can be direct or indirect. Direct personal identifiers are, e.g. name, address, ID card
p.(None): numbers, medical record numbers, etc., while indirect identifier is, e.g. assigned code that can make a subject
p.(None): reasonably identifiable.
p.(None):
p.(None):
p.(None): - 5 -
p.(None):
p.(None): identifiers for a new purpose.
p.(None):
p.(None): Pilot Studies
p.(None): 21. There is a need to seek consent before obtaining data in pilot studies on the grounds that the informed consent
p.(None): form could be tested and be refined for use in any subsequent study.
p.(None):
p.(None): Parental Consent and Student Assent
p.(None): 22. The best practice should be to seek written consent from parents and to obtain assent from students themselves
p.(None): for research involving children under 18, even in cases where children were able to decline participation. The
p.(None): assent forms should be written in an easily comprehensible manner at children’s reading level, in order to facilitate
p.(None): their decision making on participating. For research with only minimal risk (including privacy risk), the following
p.(None): principles will determine if passive parental consent 7 can be used in place of written parental consent for
p.(None): participants who are children under 18.
p.(None): PIs seeking approval of passive parental consent should provide a full justification and an information sheet.
p.(None):
p.(None): For School-based Research
p.(None): 23. a) for school based studies of children below Primary, active consent of parents is normally required;
p.(None):
p.(None): b) for school based studies of children in Primary (i.e. 5 years old and above), parental passive consent is
p.(None): normally sufficient for studies involving minimal risk, provided that only anonymous and non-sensitive data will be
p.(None): collected; and
p.(None):
p.(None): c) for school based studies of children in Secondary (i.e. 11 years old and above), parental passive consent is
p.(None): normally sufficient for studies involving minimal risk.
p.(None):
p.(None): For Adolescent Research Outside School
p.(None): d) for studies of adolescents aged 16 or above, parental consent is not normally required on the basis that they
p.(None): are mature minors.
p.(None):
p.(None): For Studies of University Students
p.(None): e) parental consent is normally not required for research projects involving no greater than minimal risks, even if
p.(None): the university students are aged 17 or below, on the understanding that they should be able to make their own
p.(None): decisions. For further details on dealing with the affairs of student minors, researchers should refer to the
p.(None): University's Guidance Note - Students under the age of 18 (document 466/617).
p.(None):
p.(None): Privacy and Confidentiality of Data
p.(None): 24. To comply with the Personal Data (Privacy) Ordinance, researchers must maintain the confidentiality of data
p.(None): related to individual research participants. Except by public observation, researchers should clearly indicate the
p.(None): purpose of the collection of data and the method to ensure the confidentiality of collected data. Researchers must
p.(None): also avoid use of any personal identifiers such as individual names and addresses in their research reports which could
p.(None): lead to the human participants being identified.
p.(None):
p.(None): 25. The minimum retention period for research data and records is three years after publication or public release of
p.(None): the research to ensure that there are no problems with
p.(None):
p.(None):
p.(None): 7 Passive parental consent means that parents are fully informed of the right to refuse participation by their
p.(None): children. Parents/guardians must be given reasonable time (e.g. 2 weeks), to object to the child’s participation.
p.(None): Student assent is still required even if passive parental consent is used.
p.(None):
p.(None): - 6 -
p.(None):
p.(None): consent, fabrication and falsification. PIs are strongly advised to remove all personal identifiers for long term
p.(None): retention of their research data, in order to minimize privacy risks. Data with personal identifiers must not be
p.(None): kept beyond 5 years after publication unless there is explicit written consent from the participants to retaining the
p.(None): data with personal identifiers preserved, such as in oral histories. Anonymised data and records should be retained
p.(None): for as long as they are of continuing value to the researcher and the wider research community.
p.(None):
p.(None): Security
p.(None): 26. Participants should be assured that the information collected will not be publicly disclosed in a way that
p.(None): specific person can be identified unless expressly consented to, and that every precaution will be taken in relation to
p.(None): the storage, use and disposition of data, for example, locking up raw data. For private sensitive data, PIs are
p.(None): suggested using indirect identifiers and keeping the direct identifiers separate from the data. Measures should be
p.(None): taken to ensure the integrity, prudence and competence of persons having access to data.
p.(None):
p.(None): Benefits
p.(None): 27. Prospective participants should not be adversely induced by financial reward or be pressured to participate in
p.(None): research. All reimbursement of expenses, such as traveling expenses, should be commensurate with standard practice
p.(None): and be reasonable.
...

Social / education

Searching for indicator education:

(return to top)
p.(None): document should be submitted together with the ethical application. Alternatively, an authorized representative of
p.(None): the external organization can participate in the research project as a co-investigator.
p.(None):
p.(None):
p.(None): VI. Types of Review
p.(None):
p.(None): 29. The HREC conducts three types of review i.e. expedited review, double review and full review. In general, for
p.(None): a research protocol which involves only minimal risks to human beings, an expedited review may be conducted to shorten
p.(None): the review process, subject to the Chairman’s discretion. If not, the application will go through double review or
p.(None): full review by the Committee.
p.(None):
p.(None): 30. Expedited Review
p.(None):
p.(None): Projects involving no greater than minimal risk will normally be considered by the Chairman (or another member of the
p.(None): Committee as recommended by the Chairman) under “expedited review”.
p.(None):
p.(None): 31. Double Review
p.(None):
p.(None): Research that does not fulfill the description of minimal risks will normally require double review by at least two
p.(None): members of the Committee.
p.(None):
p.(None): 32. Full Review
p.(None):
p.(None): If the applicant does not agree with the changes asked for, the reviewers do not agree in their assessments, or there
p.(None): is an important matter of principle, the application will receive a full review by the Committee.
p.(None):
p.(None):
p.(None): - 7 -
p.(None):
p.(None): VII. Procedures to be Followed when Applying for Ethical Review by the HREC
p.(None):
p.(None): 33. Research protocols submitted by staff members and RPg (i.e. MPhil and PhD) students will be scrutinized by the
p.(None): HREC. For Faculties of Education and Social Sciences, they each have their own mechanism in place to preview the
p.(None): ethical applications at Faculty level before they are submitted to the HREC. Ethical applications submitted by TPg
p.(None): students will be vetted by the Faculty Research Ethics Committees (the “RECs”). Faculties which do not have an ethics
p.(None): committee may have designated its Faculty Higher Degrees Committee/Faculty Research Committee to discharge such a
p.(None): function.
p.(None): Please consult your Faculty Office for details.
p.(None):
p.(None): 34. Heads of Departments (or Deans of unitary Faculties) or their delegates are responsible for the vetting of
p.(None): undergraduate students’ applications. Please refer to the appended flowchart on the procedures for submitting
p.(None): applications for ethical approval by the
p.(None): HREC.
p.(None):
p.(None): Obtaining Prior Ethical Approval
p.(None): 35. It is the responsibility of the PI to make sure that ethical approval has been obtained prior to any data
p.(None): collection/analysis taking place. Supervisors of RPg students are also responsible for ensuring that their students
p.(None): have obtained such ethical approval before starting data collection. Failure to obtain necessary ethical approval
p.(None): will cause rejection of research grant applications, and may require recollection of data. In addition, a letter of
p.(None): warning will be issued to the PI concerned, and if necessary, the Chairman of the
p.(None): HREC may refer the case to the Chairman of the University Research Committee for possible disciplinary action.
p.(None):
p.(None): Deadlines for Submission
p.(None): 36. There is no deadline for applications for ethical clearance. The processing time from submission of
...

Social / parents

Searching for indicator parents:

(return to top)
p.(None):
p.(None): Pre-existing Data
p.(None): 20. Users of existing documents or records containing personal data must complete the “Existing Data” section of the
p.(None): application form. This requires providing full details on the types of personal data to be used, and any appropriate
p.(None): informed consent forms or
p.(None): Personal Information Collection Statements from the original data collection process. It also requires an
p.(None): explanation of how this research is consistent with the purpose and use specified when the data were originally
p.(None): collected, as otherwise PIs must seek informed consent from participants again if they wish to use pre-existing data
p.(None): with personal
p.(None):
p.(None):
p.(None): 6 Personal identifier can be direct or indirect. Direct personal identifiers are, e.g. name, address, ID card
p.(None): numbers, medical record numbers, etc., while indirect identifier is, e.g. assigned code that can make a subject
p.(None): reasonably identifiable.
p.(None):
p.(None):
p.(None): - 5 -
p.(None):
p.(None): identifiers for a new purpose.
p.(None):
p.(None): Pilot Studies
p.(None): 21. There is a need to seek consent before obtaining data in pilot studies on the grounds that the informed consent
p.(None): form could be tested and be refined for use in any subsequent study.
p.(None):
p.(None): Parental Consent and Student Assent
p.(None): 22. The best practice should be to seek written consent from parents and to obtain assent from students themselves
p.(None): for research involving children under 18, even in cases where children were able to decline participation. The
p.(None): assent forms should be written in an easily comprehensible manner at children’s reading level, in order to facilitate
p.(None): their decision making on participating. For research with only minimal risk (including privacy risk), the following
p.(None): principles will determine if passive parental consent 7 can be used in place of written parental consent for
p.(None): participants who are children under 18.
p.(None): PIs seeking approval of passive parental consent should provide a full justification and an information sheet.
p.(None):
p.(None): For School-based Research
p.(None): 23. a) for school based studies of children below Primary, active consent of parents is normally required;
p.(None):
p.(None): b) for school based studies of children in Primary (i.e. 5 years old and above), parental passive consent is
p.(None): normally sufficient for studies involving minimal risk, provided that only anonymous and non-sensitive data will be
p.(None): collected; and
p.(None):
p.(None): c) for school based studies of children in Secondary (i.e. 11 years old and above), parental passive consent is
p.(None): normally sufficient for studies involving minimal risk.
p.(None):
p.(None): For Adolescent Research Outside School
p.(None): d) for studies of adolescents aged 16 or above, parental consent is not normally required on the basis that they
p.(None): are mature minors.
p.(None):
p.(None): For Studies of University Students
p.(None): e) parental consent is normally not required for research projects involving no greater than minimal risks, even if
p.(None): the university students are aged 17 or below, on the understanding that they should be able to make their own
p.(None): decisions. For further details on dealing with the affairs of student minors, researchers should refer to the
p.(None): University's Guidance Note - Students under the age of 18 (document 466/617).
p.(None):
p.(None): Privacy and Confidentiality of Data
p.(None): 24. To comply with the Personal Data (Privacy) Ordinance, researchers must maintain the confidentiality of data
p.(None): related to individual research participants. Except by public observation, researchers should clearly indicate the
p.(None): purpose of the collection of data and the method to ensure the confidentiality of collected data. Researchers must
p.(None): also avoid use of any personal identifiers such as individual names and addresses in their research reports which could
p.(None): lead to the human participants being identified.
p.(None):
p.(None): 25. The minimum retention period for research data and records is three years after publication or public release of
p.(None): the research to ensure that there are no problems with
p.(None):
p.(None):
p.(None): 7 Passive parental consent means that parents are fully informed of the right to refuse participation by their
p.(None): children. Parents/guardians must be given reasonable time (e.g. 2 weeks), to object to the child’s participation.
p.(None): Student assent is still required even if passive parental consent is used.
p.(None):
p.(None): - 6 -
p.(None):
p.(None): consent, fabrication and falsification. PIs are strongly advised to remove all personal identifiers for long term
p.(None): retention of their research data, in order to minimize privacy risks. Data with personal identifiers must not be
p.(None): kept beyond 5 years after publication unless there is explicit written consent from the participants to retaining the
p.(None): data with personal identifiers preserved, such as in oral histories. Anonymised data and records should be retained
p.(None): for as long as they are of continuing value to the researcher and the wider research community.
p.(None):
p.(None): Security
p.(None): 26. Participants should be assured that the information collected will not be publicly disclosed in a way that
p.(None): specific person can be identified unless expressly consented to, and that every precaution will be taken in relation to
p.(None): the storage, use and disposition of data, for example, locking up raw data. For private sensitive data, PIs are
p.(None): suggested using indirect identifiers and keeping the direct identifiers separate from the data. Measures should be
p.(None): taken to ensure the integrity, prudence and competence of persons having access to data.
p.(None):
p.(None): Benefits
...

General/Other / Relationship to Authority

Searching for indicator authority:

(return to top)
p.(None): 2/720 amended
p.(None):
p.(None): THE UNIVERSITY OF HONG KONG
p.(None):
p.(None): Human Research Ethics Committee
p.(None):
p.(None): Operational Guidelines and Procedures
p.(None):
p.(None):
p.(None): I. The University’s Ethical Committee Structure
p.(None):
p.(None): 1. As stipulated in the University’s Policy on Research Integrity
p.(None): ( http://www.rss.hku.hk/index.php/integrity/rcr/policy), all members of the University are under an obligation to
p.(None): comply with the highest standards of professional conduct. All research conducted by staff and students of the
p.(None): University involving human participants and the use of vertebrate animal subjects must be referred to the appropriate
p.(None): ethics committee:
p.(None):
p.(None): • the Institutional Review Board of the University of Hong Kong/Hospital Authority of Hong Kong West Cluster
p.(None): (“HKU/HA HKW IRB”), based in the Faculty of Medicine, receives for review any research protocols involving human
p.(None): participants and submitted by Principal Investigators (PI) who are academic/research staff of the Faculties of Medicine
p.(None): and Dentistry;
p.(None):
p.(None): • the Human Research Ethics Committee (HREC) receives for review any research protocols involving human
p.(None): participants submitted by Principal Investigators from the academic/research staff and students from Faculties other
p.(None): than Medicine and Dentistry; and
p.(None):
p.(None): • the Committee on the Use of Live Animals in Teaching and Research (CULATR) which reviews research protocols
p.(None): involving living animals.
p.(None):
p.(None): II. Ethical Reviews of Research Projects Involving Human Participants
p.(None):
p.(None): 2. The IRB handles ethical reviews of clinical research protocols conducted at the University of Hong Kong, while
p.(None): the HREC handles reviews of non-clinical research protocols involving human participants. A cross-referral mechanism
p.(None): has been established to enable the committees to refer applications beyond their remit to each other for review.
p.(None):
p.(None): 3. The following guidance notes on how to obtain ethical approval from the HREC are intended to provide the
p.(None): necessary information for PIs to complete the application form for ethical approval. The application form, together
p.(None): with background information, the terms of reference, and current membership of the HREC, can be downloaded from the
p.(None): HREC section of the Research Services website (the “website” hereafter) at
...

General/Other / Undue Influence

Searching for indicator undue influence:

(return to top)
p.(None): Faculty-based Research Ethics Committee or its delegate(s) who should be an independent party for approval. Ug
p.(None): students are assumed to be less experienced in judging if ethical clearance should be sought for their assignments, so
p.(None): the supervisor/tutor in charge is given responsibility for determining if each student’s project needs ethical
p.(None): clearance and for completing the necessary application for ethical approval on the students’ behalf, for submission to
p.(None): the Head of Department/Dean of Faculty (for unitary Faculties).
p.(None):
p.(None): V. Ethical Guidelines for Research involving Human Participants
p.(None):
p.(None): 13. Every PI should be aware of the basic ethical principles set out in the University’s Policy on Research Integrity
p.(None): and the Belmont Report which constitutes the ethical principles underpinning research involving human participants.
p.(None): The Policy document and a four- page summary of the Belmont Report can be downloaded from the website.
p.(None): Researchers should, in particular, note the following principles when conducting non- invasive, behavioral type of
p.(None): research within the purview of the HREC:
p.(None):
p.(None): - minimal risk and risk proportionate to research benefit;
p.(None): - informed consent;
p.(None): - no undue influence and inducement to participate;
p.(None): - protection of vulnerable research participants;
p.(None): - protection of research involving deception of participants;
p.(None): - ensuring the confidentiality and security of research and personal data; and
p.(None): - compliance with the Law.
p.(None):
p.(None): Sources of Data
p.(None): 14. All research that involves collecting new data from human participants and/or using pre- existing personal data 1
p.(None): is subject to ethical clearance. Collection of new data from human participants covers all forms of collection
p.(None): process, e.g. experimental
p.(None): procedures/retreatment/intervention, focus group, telephone/internet survey, observation, personal interviews, or
p.(None): self-administered questionnaire, etc. Usage of pre-existing data refers to retrieving readily available personal
p.(None): data from existing documents/records for secondary analysis, irrespective of whether or not the data are publicly
p.(None): available 2, whether or not the data originally collected are intentionally for research purpose, and whether the
p.(None): personal data from existing documents/records will be extracted for secondary analysis. For example, using students’
p.(None): assignments for research analysis means to use pre-existing data from a private source that were originally collected
p.(None): for
p.(None): non-research purposes.
p.(None):
p.(None):
p.(None):
p.(None): 1 As defined by the Personal Data (Privacy) Ordinance, “personal data” means any data
p.(None): (a) relating directly or indirectly to a living individual; and (b) from which it is practicable for the identity of
...

p.(None): given to participants at risk. PIs should safeguard participants’ privacy and confidentiality. PIs should let
p.(None): participants know how their provided data will be deployed in the research, identifiable or anonymous 4, and how and
p.(None): how long the data will be safely kept. PIs should also assess if there is any potential conflict of interest that
p.(None): needs to be declared and addressed.
p.(None):
p.(None): Informed Consent
p.(None): 16. Respect for persons requires that participants, to the degree that they are capable, be given the opportunity to
p.(None): choose what shall or shall not happen to them; the informed consent process is the instrument to provide this
p.(None): opportunity5. Researchers must
p.(None): accordingly obtain appropriate informed consent, and shall:
p.(None):
p.(None): a) give the research participant sufficient information about the study and how the study may affect the
p.(None): participant;
p.(None):
p.(None): b) deliver the information in a comprehensible manner, using a language readily understandable by the research
p.(None): participant; and
p.(None):
p.(None): c) assure the voluntary capacity of the participant by providing sufficient opportunity to consider whether or not
p.(None): to participate, and minimizing the possibility of coercion, undue influence, or harassment.
p.(None):
p.(None): 17. The process of obtaining informed consent has two components:
p.(None):
p.(None): a) providing the person who is being recruited to become a research participant with the information necessary to
p.(None): give informed consent by means such as an Information Sheet, and obtaining the consent to participate in the research;
p.(None): and
p.(None):
p.(None): b) documenting that informed consent has been obtained by means of an Informed Consent Form. Standard templates
p.(None): of Informed Consent Form can be downloaded from the website.
p.(None):
p.(None):
p.(None): 3 As defined by the IRB in its Standard Operation Procedures (2005), “Minimal Risk” means that the probability and
p.(None): magnitude of harm or discomfort anticipated in the research are not greater in and of themselves than those ordinarily
p.(None): encountered in daily life or during the performance of routine physical or psychological examination or test.
p.(None):
p.(None): 4 Anonymous data: Data without personal identifier (e.g. name, ID card, DNA profile). Data is anonymous when there
p.(None): is no possible way to identify the participants from the data collected. Data are not anonymous if procedures, such
p.(None): as accessing a computer database, will identify the participant. For most specific cases, the omission of names and
...

General/Other / belmont

Searching for indicator belmont:

(return to top)
p.(None): submit documentary evidence to show that the relevant ethical approval has been obtained for research work on their
p.(None): theses when they submit their detailed scheme of research and the candidate’s progress report, for purposes of
p.(None): confirmation of candidatures.
p.(None):
p.(None):
p.(None):
p.(None): - 2 -
p.(None):
p.(None): Research Postgraduate (RPg) Students
p.(None): 11. All RPg students are responsible for seeking ethical approval for their research projects with their supervisor
p.(None): and Head of Department endorsing the application before submission to the HREC.
p.(None):
p.(None): Taught Postgraduate (TPg) and Undergraduate (Ug) Students
p.(None): 12. TPg students are required to submit their ethical application, with endorsement of their supervisor, to the
p.(None): Faculty-based Research Ethics Committee or its delegate(s) who should be an independent party for approval. Ug
p.(None): students are assumed to be less experienced in judging if ethical clearance should be sought for their assignments, so
p.(None): the supervisor/tutor in charge is given responsibility for determining if each student’s project needs ethical
p.(None): clearance and for completing the necessary application for ethical approval on the students’ behalf, for submission to
p.(None): the Head of Department/Dean of Faculty (for unitary Faculties).
p.(None):
p.(None): V. Ethical Guidelines for Research involving Human Participants
p.(None):
p.(None): 13. Every PI should be aware of the basic ethical principles set out in the University’s Policy on Research Integrity
p.(None): and the Belmont Report which constitutes the ethical principles underpinning research involving human participants.
p.(None): The Policy document and a four- page summary of the Belmont Report can be downloaded from the website.
p.(None): Researchers should, in particular, note the following principles when conducting non- invasive, behavioral type of
p.(None): research within the purview of the HREC:
p.(None):
p.(None): - minimal risk and risk proportionate to research benefit;
p.(None): - informed consent;
p.(None): - no undue influence and inducement to participate;
p.(None): - protection of vulnerable research participants;
p.(None): - protection of research involving deception of participants;
p.(None): - ensuring the confidentiality and security of research and personal data; and
p.(None): - compliance with the Law.
p.(None):
p.(None): Sources of Data
p.(None): 14. All research that involves collecting new data from human participants and/or using pre- existing personal data 1
p.(None): is subject to ethical clearance. Collection of new data from human participants covers all forms of collection
p.(None): process, e.g. experimental
p.(None): procedures/retreatment/intervention, focus group, telephone/internet survey, observation, personal interviews, or
p.(None): self-administered questionnaire, etc. Usage of pre-existing data refers to retrieving readily available personal
p.(None): data from existing documents/records for secondary analysis, irrespective of whether or not the data are publicly
...


Orphaned Trigger Words



p.(None): undergraduate students’ applications. Please refer to the appended flowchart on the procedures for submitting
p.(None): applications for ethical approval by the
p.(None): HREC.
p.(None):
p.(None): Obtaining Prior Ethical Approval
p.(None): 35. It is the responsibility of the PI to make sure that ethical approval has been obtained prior to any data
p.(None): collection/analysis taking place. Supervisors of RPg students are also responsible for ensuring that their students
p.(None): have obtained such ethical approval before starting data collection. Failure to obtain necessary ethical approval
p.(None): will cause rejection of research grant applications, and may require recollection of data. In addition, a letter of
p.(None): warning will be issued to the PI concerned, and if necessary, the Chairman of the
p.(None): HREC may refer the case to the Chairman of the University Research Committee for possible disciplinary action.
p.(None):
p.(None): Deadlines for Submission
p.(None): 36. There is no deadline for applications for ethical clearance. The processing time from submission of
p.(None): application to notification of approval will normally take not more than 3 weeks, provided that the submitted
p.(None): application form is properly completed with all required documents attached. In addition, Principal Investigators of
p.(None): RGC GRF and
p.(None): ECS proposals are cautioned particularly to submit their applications for ethical approval by not later than end of
p.(None): February, as in accordance with the RGC’s ruling, where such ethical approval is required but has not yet been obtained
p.(None): by the RGC deadline (normally set on April 15), the application will be regarded as being withdrawn.
p.(None):
p.(None): Documents to be Completed and Submitted
p.(None): 37. The application form, the standard templates of informed consent form (and deception: post-debriefing consent
p.(None): form) can be downloaded from the website. Please
p.(None): submit the online application, a full research proposal, and questionnaire and/or interview script and informed consent
p.(None): form (if any) to the Human Research Ethics Committee via the Human Research Ethics Application System.
p.(None):
p.(None): VIII.The Outcome of the Review
p.(None):
p.(None): 38. The Committee will normally notify the applicant by email of the result of
p.(None): application within 3 weeks’ time from receipt of his/her duly completed application with all required documents.
p.(None): Research cannot begin until the protocol has been approved by the Committee.
p.(None):
p.(None): Approved:
p.(None): 39. A letter of approval will be issued to the PI with indication of the ethics approval period granted, which
p.(None): normally shall not be more than four years, unless an extension has been granted. An HREC reference number will be
p.(None): assigned to each approved project and indicated in the letter of approval. The PIs are required to include the HREC
p.(None): reference
p.(None):
p.(None): - 8 -
p.(None):
p.(None): number in all materials sent to potential and actual participants.
p.(None):
p.(None): 40. To improve transparency of the ethics approval process and allow general public to search for research projects
p.(None): with ethical approval granted by the Committee, the project title/abbreviated project title provided by the PI in the
p.(None): application form, HREC reference number, ethical approval period, and name and department of the PI of all research
p.(None): projects approved by the HREC with effect from April 1, 2015 will be posted on a public website (
p.(None): http://www.rss.hku.hk/integrity/ethics-compliance/hrec-approved-projects) maintained by the Research Services until the
p.(None): expiry date of the ethical approval period.
p.(None):
p.(None): Conditionally Approved:
p.(None): 41. The approval letter is issued with comments/concerns to be satisfactorily addressed.
p.(None):
p.(None): If Approval is Not Given:
p.(None): 42. The Committee will specify its comments/recommendations on the notification to the PIs of protocols which are not
p.(None): approved.
p.(None):
p.(None): Reconsideration of Decision:
p.(None): 43. The Committee will further consider the resubmitted proposals according to the Committee’s recommendations.
p.(None):
p.(None):
p.(None): IX. Progress Monitoring
p.(None):
p.(None): 44. The PIs of all active research projects are required to report to the Committee any amendments and new
p.(None): information on the project. Any deviation from the study protocol or compliance incident that has occurred during a
p.(None): study and may adversely affect the rights, safety or well-being of any participant or breaches of confidentiality
p.(None): should be reported to the HREC within 15 calendar days from the first awareness of the deviation/incident by the PI.
p.(None): PIs may also be required to submit a final completion report on the request of the Committee. The report form can be
p.(None): downloaded from the
p.(None): website.
p.(None):
p.(None): 45. Ethical approval is time-limited, normally to be granted initially for four years. Should extension of such
p.(None): ethical approval be needed, the PI has to apply for such extension well before the initially approved expiration date
p.(None): on a prescribed form, and justifications for such extension must be provided in the application.
p.(None):
p.(None):
p.(None): X. How to Maintain Ethical Standard in Research
p.(None):
p.(None): Right to Appeal
p.(None): 46. The RECs or the Faculty Higher Degrees Committee/Faculty Research Committee as appropriate can refer special
p.(None): cases requiring advice to the HREC for ethical review. The Heads and Deans can refer special cases requiring advice to
p.(None): the RECs or its equivalent committee or HREC for ethical clearance. All applicants have a right to appeal, and to
p.(None): refer cases with doubts or problems to the HREC for further review.
p.(None):
p.(None): 47. The ethics committees established by the self-funded units of the University, such as the HKU SPACE, the
p.(None): Versitech, can also refer special cases of appeal to the HREC for informal advice.
p.(None):
p.(None): 48. A statement informing participants of their right as research participants to contact HREC directly if they have
p.(None): any concerns or questions should also be provided on all recruitment materials, consent forms, information sheets, and
p.(None): debriefing notes for
p.(None):
p.(None): - 9 -
p.(None):
p.(None): dispatch to all research participants. All recruitment materials and consent forms must include a readily reachable
p.(None): contact of the PI or relevant personnel of the study for participants’ enquiries about details of the study (normally a
p.(None): telephone number for studies conducted in Hong Kong, and an email address for overseas studies), the HREC’s contact
p.(None): number for enquiries about participants’ rights and the HREC reference number assigned to each approved project as
p.(None): indicated in the letter of approval. For surveys conducted by telephone and/or self-administered questionnaire, full
p.(None): contact information of the HREC and also the PI concerned must be provided before data collection starts (but can be
p.(None): after selection of a respondent).
p.(None):
p.(None): Annual Report by Heads/Deans
p.(None): 49. The Head or Dean as appropriate will be invited to submit an annual statistical report on the number of approved
p.(None): applications/re-submissions and any acute incidents which have occurred, to the HREC by the end of the academic year.
p.(None):
p.(None):
p.(None): XI. Contact Information
p.(None):
p.(None): 50. Enquiries may be directed to:
p.(None): - Professor L.F. Zhang, Chair of the HREC Tel: 2241 5267; Email: hrec@hku.hk
p.(None):
p.(None): - Miss Annie Ngai, Head, Research Services Tel: 2859 1911, Email: anniengai@hku.hk
p.(None):
p.(None): - Ms. Kate Yip, Assistant Registrar, Research Services Tel: 2241 5266; Email: kkkyip@hku.hk
p.(None):
p.(None):
p.(None): September 2020
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None): - 10 -
p.(None):
p.(None): Human Research Ethics Committee (HREC)
p.(None):
p.(None): Procedures for Applications for Ethical Approval
p.(None):
p.(None): Please read carefully the Operational Guidelines and Procedures of the HREC regarding the Section on Who Should Apply
p.(None): for Ethical Review before completing the application form.
p.(None):
p.(None):
p.(None):
p.(None): Staff
p.(None):
p.(None): RPg Students (MPhil/PhD)
p.(None):
p.(None): Taught Postgraduate Students
p.(None):
p.(None): Undergraduate Students
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None):
p.(None): Faculty-Based Research Ethics
p.(None): Committee (RECs) or its delegates
p.(None):
p.(None): Special cases
p.(None): Tutor or supervisors in charge of Ug students who are PIs of
p.(None): research projects for the relevant
p.(None): Department will apply to Head of
p.(None): Departments
p.(None):
p.(None):
p.(None):
p.(None): Annual statistical report / Special cases / Appeal cases
p.(None):
p.(None):
p.(None):
p.(None): Human Research Ethics Committee
p.(None):
p.(None):
p.(None): For RPg Students/Staff:
p.(None): Submit an online application to the HREC via the Human Research Ethics Application System.
p.(None):
p.(None): For TPg Students:
p.(None): As advised by the Faculty, please complete either the HREC application form (in hardcopy) or the relevant application
p.(None): form and send it to your Faculty Office.
p.(None):
p.(None): For Ug Students:
p.(None): As advised by your Department, please complete the HREC application form (in hardcopy) or the appropriate application
p.(None): form with your Tutor/Supervisor as the Principal Applicant, and send it to the Head of your Department/Dean of the
p.(None): Faculty.
p.(None):
p.(None): The Heads of Departments and the RECs or its delegates can refer special cases to the HREC. The
p.(None): TPg/Ug students can appeal to HREC for a further review on their research protocols.
p.(None):
p.(None): July 2020
p.(None):
p.(None):
p.(None):
p.(None): ...

Appendix

Indicator List

IndicatorVulnerability
accessAccess to Social Goods
ageAge
authorityRelationship to Authority
belmontbelmont
childChild
childrenChild
educationeducation
illiterateLiteracy
languageLinguistic Proficiency
parentsparents
partypolitical affiliation
research staffLaboratory Staff
studentStudent
undue influenceUndue Influence
usageDrug Usage
vulnerablevulnerable

Indicator Peers (Indicators in Same Vulnerability)

IndicatorPeers
child['children']
children['child']

Trigger Words

capacity

coercion

consent

ethics

harm

protection

risk

sensitive

welfare


Applicable Type / Vulnerability / Indicator Overlay for this Input

Vulnerability TypeVulnerabilityIndicator# Matches
Politicalpolitical affiliationparty2
Politicalvulnerablevulnerable1
HealthDrug Usageusage2
SocialAccess to Social Goodsaccess3
SocialAgeage1
SocialChildchild1
SocialChildchildren8
SocialLaboratory Staffresearch staff2
SocialLinguistic Proficiencylanguage1
SocialLiteracyilliterate1
SocialStudentstudent4
Socialeducationeducation1
Socialparentsparents4
General/OtherRelationship to Authorityauthority1
General/OtherUndue Influenceundue influence2
General/Otherbelmontbelmont2