[email protected]
  • Securities Law
  • Incorporations
  • Managed Legal
  • Capital Markets
Generis Global Legal Services
  • Services
    • Structured Finance
    • M&A
    • Electronic Discovery
    • Document Review
    • Legal Research
    • Funding
    • Incorporation
    • Consulting
    • Managed Legal Services & LPO
    • Agreements
  • Careers
  • About Us
  • Contact Us
  • Partner Program
  • Knowledge Base
  • Tools
    • Business Cost Calculator
    • Patent Cost Calculator
    • Trademark Cost Calculator
    • Settlement Letter Generator
    • Employee Contract Maker
    • Divorce Petition Drafter
    • Lease Agreement Generator
    • Discovery Request Builder
    • Will Creator
    • NDA Maker
    • Dissolution Fee Calculator
    • Bylaws Drafter
    • UCC Filing Fee Estimator
    • Franchise Fee Calculator
    • IP Assignment Tool
    • Merger Fee Estimator
    • Stock Grant Tool
    • Business License Lister
Select Page

Four Things You Should Know About Data Use Agreements

Mar 14, 2022

The HIPAA requires Data Use Agreements (“DUA”). DUAs are commercial agreements that are used to convey non-public data that is subject to use limitations. DUA agreements define the terms and circumstances of the transfer and must be signed before any data is used or disclosed to a third party.

 Data Use Agreements

HIPAA outlines the circumstances under which covered organisations may use or disclose protected health information (PHI) for research purposes. The definition of research is “a systematic examination, encompassing research formulation, testing, and evaluation, with the goal of developing or contributing to generalizable information.” (See 45 CFR 164.501 for details.) HIPAA safeguards the privacy of an individual’s identifiable health information while also guaranteeing that researchers continue to have access to medical information required to undertake essential research.
DUAs should, at a minimum, incorporate the following important provisions:

Table of Contents

      • A. Define the constrained data set and handle data use constraints:
      • B. Determine who will use or receive the information:
      • C. Obligations to preserve data and privacy rights associated with confidential or protected data transfers:
      • D. Liability for damage caused by the data’s use:
  • Smart Legal Starts Here
  • Smart Legal Starts Here
  • Related Posts
A. Define the constrained data set and handle data use constraints:

A restricted data collection is one that has been stripped of certain HIPAA-specified direct identifiers.

Establish the boundaries of use and closely describe the uses or disclosures for a given purpose to be as exact and thorough as feasible (i.e. research, public health, or health care operations).

B. Determine who will use or receive the information:

In the case of scientific research, for example, choose whether the data is to be utilised only by the Principal Investigator (PI) or whether rights are extended to the PI’s research team.

Furthermore, unless as allowed and/or otherwise authorised by law, restrict the receiver from using or disclosing the information.

If the receiver is permitted to share data with project subcontractors, insert a condition requiring the subcontractors to adhere to the same limits outlined in the agreement.

C. Obligations to preserve data and privacy rights associated with confidential or protected data transfers:

Require the receiver to take adequate precautions to avoid unauthorised use or disclosure.

If the data comes from human subjects, you must get informed permission from the individuals or obtain an appropriate Institutional Review Board waiver of consent that allows disclosure for the proposed DUA.

Check to check whether the info is HIPPA compliant (i.e. if the data is de-identified within the meaning of HIPPA and not disclosed with a code or any other means used to identify the data). To be de-identified, there must be zero awareness that any information, alone or in combination with any other information, might be used to identify a person. Name, date of birth, address, telephone numbers, email addresses, social security numbers, medical record numbers, URL linkages, and IP addresses are examples of data that might be used to identify a person.

D. Liability for damage caused by the data’s use:

Require the receiver to notify any unauthorised use, disclosure, or data breach as soon as they become aware of it.

The Bottom Line

Every data transmission is unique to the data that is being sent. Consult with an attorney to handle your individual requirements in order to reduce risk and responsibility.

Email This Share on X Share on LinkedIn
Citations
Embed This Article

Copy and paste this <iframe> into your site. It renders a lightweight card.

Preview loads from ?cta_embed=1 on this post.

NEW

Smart Legal Starts Here

✓Free walkthroughs for your legal situations
✓Track your legal request in your free dashboard
✓Draft and review your docs free
✓Only pay when you want action
+ Post a Legal Service Request

Smart Legal Starts Here

✓Free walkthroughs for your legal situations
✓Track your legal request in your free dashboard
✓Draft and review your docs free
✓Only pay when you want action
+ Post a Legal Service Request

Related Posts

  • Data privacy legislation in the United States: four states to watch
  • How to Use Data Visualization to Improve Investor Understanding of PPM Data
  • The Probate Procedure: Four Easy Steps
  • The Four Biggest Mistakes in Historic Business Partnerships
  • Four Important Facts About Triple-Net Leases That Tenants Should Be Aware Of
  • When Starting a Small Business, You Have Four Options for Paying Employees.
  • Four Steps to Assessing a Stock Option Grant
  • Four Things to Think About Before Hiring Remote Workers
  • The Four Lawyers Every Startup Should Hire
  • A Quick Guide to the Four Forms of Contract Breach
  • A Step-by-Step Guide to Starting a Business in Andorra
  • Navigating Andorra’s Tax Haven Status: Optimizing Business and Wealth
  • The Importance of Intellectual Property Rights in Andorra
  • A Guide to Andorra’s Corporate Law: Key Considerations for Foreign Investors
  • Key Considerations for Businesses Operating in Andorra: Employment Regulations
  • A Guide to Real Estate Acquisition in Andorra: Legal Procedures and Pitfalls to Avoid
  • A Comprehensive Guide to Setting up a Financial Services Company in Andorra
  • The Impact of Andorra’s EU Agreements on Local Businesses
  • Strengthening Anti-Money Laundering Measures in Andorra: Combating Financial Crime and Terrorism Financing
  • Andorra’s Commitment to Compliance and Anti-Money Laundering Measures
  • A Comprehensive Guide to Preparing for Your First Consultation on Civil or Criminal Judgment Appeals in Wyoming
  • Preparing for Your First Consultation on Appeals in Wisconsin
  • Preparation Guide for Your First Legal Consultation on Appeals in West Virginia
  • Preparing for Your Appeal Consultation in Washington: A Comprehensive Guide
  • First Consultation Preparation Guide for Appeal from a Civil or Criminal Judgment in Virginia
  • Refund Policy
  • Terms of Use
  • Privacy Policy
  • AI Agent Policy
  • Facebook
  • Twitter
  • Instagram
  • RSS
© 2025 Generis Global Legal Services. All rights reserved.

Quick Apply

Application submitted

Thanks for applying! Our team will review your application and get back to you within 15 days. If you don’t hear from the HR team within that time, your application may not have been successful.