1 00:00:09,275 --> 00:00:09,943 Good afternoon. 2 00:00:09,943 --> 00:00:10,910 I am David 3 00:00:10,910 --> 00:00:14,814 Wendler from the Department of Bioethics here at the NIH Clinical Center. 4 00:00:14,814 --> 00:00:18,084 And today I'm going to talk and hopefully we're going 5 00:00:18,084 --> 00:00:21,354 to have some time for discussion on the ethical issues 6 00:00:21,354 --> 00:00:25,258 that are raised in connecting research with what are called vulnerable subjects. 7 00:00:25,258 --> 00:00:28,828 And I'll talk minute on what I mean by that. 8 00:00:28,828 --> 00:00:32,198 Just a couple of notes. I work at the NIH. 9 00:00:32,198 --> 00:00:36,169 I work here in the clinical center, but I am emphatically not a spokesperson 10 00:00:36,169 --> 00:00:37,037 for the NIH. 11 00:00:37,037 --> 00:00:39,839 What I say are going to be my own views. 12 00:00:39,839 --> 00:00:44,377 They're based on my own thoughts and, as you'll see in some cases, my own research. 13 00:00:44,377 --> 00:00:47,480 I hope people here agree with me on some of this, 14 00:00:47,480 --> 00:00:50,316 but if we're really lucky people will disagree on some, 15 00:00:50,750 --> 00:00:55,255 which will give us a chance to have a good discussion. 16 00:00:55,255 --> 00:00:58,191 All right. So research with vulnerable subjects. 17 00:00:58,191 --> 00:01:00,527 Everybody who's here, everybody's who's watching 18 00:01:00,527 --> 00:01:03,663 online, knows the importance of conducting clinical research. 19 00:01:03,663 --> 00:01:08,334 It's not the only way, but it's certainly one of the best, 20 00:01:08,334 --> 00:01:12,238 and one of the primary ways for identifying new treatments, 21 00:01:12,238 --> 00:01:16,543 new interventions, new ways to keep people from getting sick, cure 22 00:01:16,543 --> 00:01:20,847 people who are sick, and treat people who are chronically ill. 23 00:01:20,847 --> 00:01:24,751 In order to preserve clinical research, continue to do it, 24 00:01:24,751 --> 00:01:30,457 keep public trust in it, protect subjects, it's important that we have sufficient 25 00:01:30,457 --> 00:01:34,461 protections in place for the people who participate in research. 26 00:01:34,461 --> 00:01:38,865 And the point of today's lecture is this is especially important 27 00:01:38,865 --> 00:01:40,066 with vulnerable subjects. 28 00:01:40,066 --> 00:01:43,269 And this is a topic that's not new. 29 00:01:43,269 --> 00:01:46,873 This is not a claim that's original to me. 30 00:01:46,873 --> 00:01:51,277 Regulations, commentators, and guidelines for at least the last 40 years 31 00:01:51,277 --> 00:01:55,682 or so have been emphasizing the importance of protecting vulnerable subjects 32 00:01:55,682 --> 00:01:57,684 who participate in clinical research. 33 00:01:57,717 --> 00:02:02,789 This is just one blurb, one example of that from the U.S. 34 00:02:02,789 --> 00:02:04,891 regulations, which says that IRB. 35 00:02:04,891 --> 00:02:09,996 So review committees should be aware of the special problems of research 36 00:02:09,996 --> 00:02:13,800 involving vulnerable populations and then should try to develop 37 00:02:13,800 --> 00:02:18,037 ways additional protections, additional safeguards to protect vulnerable subjects. 38 00:02:18,037 --> 00:02:20,974 So that raises three obvious questions, 39 00:02:20,974 --> 00:02:25,211 and I'm going to talk about a little bit today. 40 00:02:25,211 --> 00:02:28,615 One, who's vulnerable or which subjects are vulnerable? 41 00:02:28,915 --> 00:02:31,718 What are the challenges that are raised 42 00:02:31,718 --> 00:02:35,321 when we try to conduct research with vulnerable subjects? 43 00:02:35,321 --> 00:02:38,124 And what additional requirements, protections, or safeguards 44 00:02:38,124 --> 00:02:42,529 can we put in place to try to address those concerns. 45 00:02:42,529 --> 00:02:47,333 So I'm going try to briefly go through each of these questions. 46 00:02:47,333 --> 00:02:50,937 I'll talk a little bit initially on some background 47 00:02:50,937 --> 00:02:54,140 regarding the debate over who's a vulnerable subject, 48 00:02:54,140 --> 00:02:59,345 how you define vulnerable subjects, and then I'm just going to hone in on one 49 00:02:59,345 --> 00:03:02,882 I think a very important example, but one example of research 50 00:03:02,882 --> 00:03:06,753 with a vulnerable population in order to provide some insight into what 51 00:03:06,753 --> 00:03:10,290 those concerns that get raised and then what are some protections 52 00:03:10,290 --> 00:03:14,460 that can be put in place to try to address those concerns. 53 00:03:14,460 --> 00:03:15,428 So vulnerability. 54 00:03:15,428 --> 00:03:17,997 If you just think about it very generally. 55 00:03:17,997 --> 00:03:21,367 So Merriam Webster says that vulnerable individuals are those 56 00:03:21,367 --> 00:03:25,104 who are capable of being wounded, they're open to damage, 57 00:03:25,104 --> 00:03:29,209 or they're assailable, which I think is an absolutely wonderful word. 58 00:03:29,209 --> 00:03:33,313 So a vulnerable individual is any individual who can be harmed, 59 00:03:33,313 --> 00:03:37,817 who can be hurt, who can be damaged, who can be wounded. 60 00:03:37,817 --> 00:03:43,790 So if you think about that for a second, it's not hard to think of examples 61 00:03:43,790 --> 00:03:47,527 of individuals who can be harmed, hurt, or wounded, right. 62 00:03:47,527 --> 00:03:48,928 That's easy to do. 63 00:03:48,928 --> 00:03:53,132 What's actually hard is to think about who doesn't fit this definition? 64 00:03:53,132 --> 00:03:57,136 What individual isn't capable of being wounded or open to damage? 65 00:03:57,136 --> 00:04:01,174 And that raises one of the first challenges and one of 66 00:04:01,174 --> 00:04:05,011 the debates that's going on right now in thinking about research 67 00:04:05,011 --> 00:04:08,881 with vulnerable subjects, which is if you think of vulnerable subjects 68 00:04:08,881 --> 00:04:12,385 as somebody who's capable of being harmed, damaged, or wounded, 69 00:04:12,385 --> 00:04:16,222 and then you think about humans, presumably one of the fundamental 70 00:04:16,222 --> 00:04:20,426 aspects of the human predicament is the fact that we're all capable 71 00:04:20,426 --> 00:04:22,528 of being harmed, damaged, or wounded. 72 00:04:22,528 --> 00:04:24,030 We can experience disease. 73 00:04:24,030 --> 00:04:27,400 Someone can cause us to suffer pain, loneliness, rejection. 74 00:04:27,400 --> 00:04:30,003 We can die. We can be killed. 75 00:04:30,003 --> 00:04:35,642 There are just myriad ways in which all of us can be harmed or damaged. 76 00:04:35,642 --> 00:04:37,877 So this seems to suggest then, 77 00:04:37,877 --> 00:04:42,382 if we take the definition of vulnerability seriously, that everybody is vulnerable. 78 00:04:42,382 --> 00:04:45,752 And if our human subjects are human, it follows, 79 00:04:45,752 --> 00:04:50,256 according to some pretty basic logic, that all human subjects are vulnerable. 80 00:04:50,256 --> 00:04:54,727 So if all human subjects are vulnerable, then what does it mean 81 00:04:54,727 --> 00:04:58,665 or how does it make sense to think about extra protections 82 00:04:58,665 --> 00:05:01,668 for vulnerable subjects if in fact everybody's vulnerable? 83 00:05:01,668 --> 00:05:03,636 Here's one example of that. 84 00:05:03,636 --> 00:05:05,405 One of the complaints people 85 00:05:05,405 --> 00:05:09,676 have been making over the last decade or so in research ethics 86 00:05:09,676 --> 00:05:13,946 is that lists of vulnerable subjects just keep growing longer and longer. 87 00:05:13,946 --> 00:05:15,348 This is an example. 88 00:05:15,348 --> 00:05:19,285 CIOMS is the Council of the International Organization of Medical Sciences. 89 00:05:19,719 --> 00:05:23,523 It is a very prominent and influential set of guidelines 90 00:05:23,523 --> 00:05:26,559 for human subjects research, particularly human subjects research 91 00:05:26,559 --> 00:05:28,428 that's conducted in developing countries. 92 00:05:28,428 --> 00:05:33,366 And here is a non-exhaustive list from them of subjects who are vulnerable. 93 00:05:33,366 --> 00:05:37,537 And as you just think about it, you could look through 94 00:05:37,537 --> 00:05:41,708 a couple of the examples, this is an awfully long list. 95 00:05:41,708 --> 00:05:44,344 And this isn't even a complete list. 96 00:05:44,677 --> 00:05:48,815 And then the question becomes obviously if all of these people 97 00:05:48,815 --> 00:05:52,185 and even more are vulnerable, then how is it 98 00:05:52,185 --> 00:05:56,889 that we can come up with protections and safeguards for vulnerable subjects? 99 00:05:56,889 --> 00:05:58,958 So this is the concern. 100 00:05:58,958 --> 00:06:03,062 What sense does it make to try to institute special protections 101 00:06:03,062 --> 00:06:05,698 for vulnerable subjects if almost everybody's vulnerable? 102 00:06:05,698 --> 00:06:11,704 This is a, excuse me, this is a quote from a review about ten years ago 103 00:06:11,704 --> 00:06:15,441 on the issue of vulnerability in research by Carol Levine, 104 00:06:15,441 --> 00:06:21,080 also Christine Grady, who talked here a couple of weeks ago, was on this paper. 105 00:06:21,347 --> 00:06:24,851 And they point out that if everybody's vulnerable, then it seems 106 00:06:24,851 --> 00:06:28,054 as though the concept becomes too nebulous to be meaningful. 107 00:06:28,054 --> 00:06:29,322 So there's this problem. 108 00:06:29,322 --> 00:06:32,492 It looks like if you look at things like standard 109 00:06:32,492 --> 00:06:34,093 definitions of vulnerability, everybody's vulnerable. 110 00:06:34,093 --> 00:06:38,231 But if then if everybody's vulnerable, how is it that you can implement 111 00:06:38,231 --> 00:06:39,832 additional protections for vulnerable subjects. 112 00:06:39,832 --> 00:06:42,702 Doesn't that just mean that everybody needs additional protections? 113 00:06:42,902 --> 00:06:46,973 And if everybody's vulnerable, then it seems in a sense that nobody is. 114 00:06:46,973 --> 00:06:49,208 So what do we make of this? 115 00:06:49,208 --> 00:06:52,845 So here's one way for me that I try to explain this. 116 00:06:52,845 --> 00:06:57,650 It's the thing about two different kinds of claims that we can make when we talk 117 00:06:57,650 --> 00:07:01,287 about vulnerability, either in general or with respect to human subjects research. 118 00:07:01,821 --> 00:07:05,458 And the first one is what I call categorical claims. 119 00:07:05,458 --> 00:07:08,728 So it's a claim that all of the individuals 120 00:07:08,728 --> 00:07:11,998 in some group, some set, some population are vulnerable. 121 00:07:11,998 --> 00:07:13,466 That's a categorical claim. 122 00:07:13,466 --> 00:07:17,470 And then a comparative claim, which is that some individuals within 123 00:07:17,470 --> 00:07:21,474 a group, class, or set are more vulnerable than other individuals 124 00:07:21,474 --> 00:07:24,043 within that group, class, or set. 125 00:07:24,043 --> 00:07:26,579 So here's some just basic examples. 126 00:07:26,579 --> 00:07:30,216 Categorical claim, all cars are at risk of being stolen. 127 00:07:30,216 --> 00:07:31,484 That seems pretty clear. 128 00:07:31,484 --> 00:07:36,255 Just about every car is at least in a position where somebody might steal it. 129 00:07:36,255 --> 00:07:38,157 That talks about all cars, right. 130 00:07:38,157 --> 00:07:39,759 Now here's a comparative claim. 131 00:07:39,759 --> 00:07:44,197 At least according to data from last year, I assume this is still true, 132 00:07:44,197 --> 00:07:48,000 that Hondas, at least in the U.S., are the most stolen car. 133 00:07:48,000 --> 00:07:52,138 So it looks like Hondas are at an increased risk of being stolen. 134 00:07:52,405 --> 00:07:56,075 And what this suggests that is whatever we're talking about vulnerability, 135 00:07:56,075 --> 00:08:00,780 the first thing we need to know is whether or not we're talking about 136 00:08:00,780 --> 00:08:04,450 a categorical claim, all individuals, like all human beings, are vulnerable. 137 00:08:04,450 --> 00:08:07,153 Or are we talking about a comparative claim. 138 00:08:07,153 --> 00:08:10,156 Some set of human beings, or say research subjects, 139 00:08:10,156 --> 00:08:13,860 are more vulnerable than other set, or individuals, or research subjects. 140 00:08:15,261 --> 00:08:17,730 So what do you with categorical claims? 141 00:08:17,730 --> 00:08:22,335 So the fact that everybody's vulnerable, the fact that everybody can be harmed, 142 00:08:22,335 --> 00:08:26,205 the fact that human subjects, all human subjects can be harmed, 143 00:08:26,205 --> 00:08:27,273 isn't necessarily meaningless. 144 00:08:27,273 --> 00:08:31,511 It makes the point that what we need is we need protections 145 00:08:31,511 --> 00:08:35,748 for all research participants, no matter who they are, and no matter 146 00:08:35,748 --> 00:08:37,517 where they participate in research. 147 00:08:37,517 --> 00:08:40,953 This is a point that was made by Fred Grinnell 148 00:08:40,953 --> 00:08:44,390 who is a -- works in research ethics from Texas. 149 00:08:44,390 --> 00:08:48,194 And basically, what he argues, he argues is once you take 150 00:08:48,194 --> 00:08:52,331 seriously the fact that all -- the fact that all human subjects 151 00:08:52,331 --> 00:08:56,102 are vulnerable, what we need is we need a new framework 152 00:08:56,102 --> 00:08:58,538 for thinking about how to protect subjects. 153 00:08:58,538 --> 00:09:02,308 And in particular, he talks about a kind of precautionary principle, 154 00:09:02,308 --> 00:09:05,411 which is a principle that gets derived from thinking 155 00:09:05,411 --> 00:09:09,181 about protection of the environment, which is basically that you're trying 156 00:09:09,181 --> 00:09:13,319 to be very careful in terms of the risks that you're willing 157 00:09:13,319 --> 00:09:16,422 to accept in a particular activity, or an enterprise. 158 00:09:16,589 --> 00:09:19,692 And Fred's thought is given the fact that everybody is vulnerable, 159 00:09:19,692 --> 00:09:23,129 all human subjects are vulnerable, maybe this is the kind of approach 160 00:09:23,129 --> 00:09:25,665 we should take to research ethics, as well. 161 00:09:25,665 --> 00:09:28,801 So we can talk about it if people are interested. 162 00:09:28,801 --> 00:09:30,503 I'm not necessarily advocating this view. 163 00:09:30,503 --> 00:09:32,772 My point is just that the categorical claim 164 00:09:32,772 --> 00:09:35,641 all subjects are vulnerable can make sense to the extent 165 00:09:35,641 --> 00:09:39,312 that what you're trying to figure out is what should be the regulations 166 00:09:39,312 --> 00:09:42,181 or the protections for everybody who participates in clinical research. 167 00:09:42,181 --> 00:09:45,685 So that's all regulations as part of a categorical claim. 168 00:09:45,685 --> 00:09:47,887 Now there is the comparative claim. 169 00:09:47,887 --> 00:09:50,222 So what do the comparative claims do? 170 00:09:50,222 --> 00:09:53,926 So as I mentioned, comparative claims are picking out specific groups 171 00:09:53,926 --> 00:09:57,964 who are especially, or more vulnerable, or at an increased risk of 172 00:09:57,964 --> 00:09:58,631 being vulnerable. 173 00:09:58,631 --> 00:10:03,002 And here the suggestion is that once you've got general protections in place 174 00:10:03,002 --> 00:10:06,372 for all subjects, then the question is are those protections 175 00:10:06,372 --> 00:10:10,409 sufficient for all the different groups that might enroll in your research? 176 00:10:10,743 --> 00:10:13,713 If the answer is yes, great, you're set. 177 00:10:13,713 --> 00:10:16,582 But if not, then it suggests that there 178 00:10:16,816 --> 00:10:19,652 comparatively vulnerable subjects who might need additional protections. 179 00:10:19,652 --> 00:10:23,556 And that's where the call for additional protections comes in. 180 00:10:23,556 --> 00:10:26,726 So one of the groups that's famously started 181 00:10:26,726 --> 00:10:31,897 some of this was the National Commission, which was one of the first groups 182 00:10:31,897 --> 00:10:36,736 in the U.S., at least, to think about regulations for human subjects research. 183 00:10:36,736 --> 00:10:38,738 And they started out with some 184 00:10:38,738 --> 00:10:40,806 recommendations for human subjects research in general. 185 00:10:40,806 --> 00:10:44,276 And then once they developed those, they then stopped and said, 186 00:10:44,276 --> 00:10:47,413 okay, are they good enough for all types of research? 187 00:10:47,413 --> 00:10:50,883 Or are there some categories of research or categories of subjects 188 00:10:50,883 --> 00:10:53,052 who need even greater or additional protections? 189 00:10:53,052 --> 00:10:56,222 And their answer was yes in a couple of cases. 190 00:10:56,522 --> 00:10:59,959 And one of the examples for them was children, where children 191 00:10:59,959 --> 00:11:03,396 might need even more protections than we give to competent adults. 192 00:11:03,396 --> 00:11:04,664 So that's the distinction 193 00:11:04,664 --> 00:11:08,100 between comparative claims here and then the prior categorical claims. 194 00:11:08,100 --> 00:11:11,537 So one example of this, this is a nice example, 195 00:11:11,537 --> 00:11:15,307 this one of the most influential papers I think that's been written 196 00:11:15,307 --> 00:11:18,744 vulnerability in human subjects research by Ken Kipnis, who's in Hawaii. 197 00:11:18,744 --> 00:11:20,680 And basically, he says this. 198 00:11:20,680 --> 00:11:25,351 He says when I'm talking about vulnerable subjects, what I mean is 199 00:11:25,351 --> 00:11:28,454 I assume that the basic baseline, guidelines, regulations 200 00:11:28,454 --> 00:11:31,190 protections are in place, and they're working. 201 00:11:31,190 --> 00:11:35,461 And then what I'm going to ask is are there groups 202 00:11:35,461 --> 00:11:37,029 or are there individuals 203 00:11:37,029 --> 00:11:41,300 for whom that general set of guidelines or protections isn't sufficient 204 00:11:41,300 --> 00:11:45,171 so that we need even extra added safeguards or protections? 205 00:11:45,171 --> 00:11:48,874 Going beyond what he calls that baseline of regulations. 206 00:11:48,874 --> 00:11:51,410 These are a couple of examples. 207 00:11:51,544 --> 00:11:53,779 So DOH is the Declaration of Helsinki. 208 00:11:53,779 --> 00:11:57,950 That's one of the most influential set of guidelines on human subjects research. 209 00:11:57,950 --> 00:12:00,186 And here, they're giving a comparative claim. 210 00:12:00,186 --> 00:12:02,121 Some research populations are particularly vulnerable. 211 00:12:02,121 --> 00:12:04,657 So they're not talking about all human subjects. 212 00:12:04,657 --> 00:12:06,926 Maybe their granting that all human subjects 213 00:12:06,926 --> 00:12:08,828 are vulnerable to a certain extent. 214 00:12:08,828 --> 00:12:12,031 Then they're saying, well, some populations are even more vulnerable 215 00:12:12,031 --> 00:12:15,234 than that baseline, and they need extra or special protections. 216 00:12:15,234 --> 00:12:20,473 Then a similar comment from CIOMS that I mentioned just a minute ago. 217 00:12:20,473 --> 00:12:22,641 So here's a comparative example. 218 00:12:22,641 --> 00:12:23,809 So the U.S. 219 00:12:23,809 --> 00:12:27,680 regulations based on the suggestions made by the National Commission 220 00:12:27,680 --> 00:12:30,816 that I mentioned a minute ago, the U.S. 221 00:12:30,816 --> 00:12:33,919 regulations are based on the National Commission's recommendations. 222 00:12:33,919 --> 00:12:35,087 And the U.S. 223 00:12:35,087 --> 00:12:37,823 decided there's a couple of important populations 224 00:12:37,823 --> 00:12:40,159 who need additional or special protections. 225 00:12:40,159 --> 00:12:42,495 Prisoners is one of them. 226 00:12:42,495 --> 00:12:44,463 Children, as I mentioned, is another. 227 00:12:44,463 --> 00:12:48,033 And one of the extra protections here is there are stricter 228 00:12:48,033 --> 00:12:51,303 limits on the risks to which you can expose children. 229 00:12:51,303 --> 00:12:55,508 So the idea is while we need some protections for research with competent 230 00:12:55,508 --> 00:12:59,411 adults, but as long as they're competent, as long as they understand, 231 00:12:59,411 --> 00:13:04,316 as long as they give informed consent, then maybe we can allow them to accept 232 00:13:04,316 --> 00:13:09,188 or be exposed to a higher level of risk in the context of clinical research. 233 00:13:09,188 --> 00:13:12,992 But now we start talking about younger children or infants, given 234 00:13:12,992 --> 00:13:16,095 that they can't give informed consent, those general protections 235 00:13:16,095 --> 00:13:19,899 aren't going to be enough, and we want some additional limits 236 00:13:19,899 --> 00:13:23,702 on the extent to which we can expose children to risks 237 00:13:23,702 --> 00:13:25,771 in the context of clinical research. 238 00:13:27,907 --> 00:13:28,774 So here's 239 00:13:28,774 --> 00:13:32,311 a crucial point and hopefully somebody here will ask me 240 00:13:32,311 --> 00:13:36,315 if this doesn't make sense, but when we're talking about these 241 00:13:36,315 --> 00:13:39,618 comparative claims, more vulnerable, somebody more vulnerable than us, 242 00:13:39,618 --> 00:13:42,154 children are more vulnerable than competent adults. 243 00:13:42,154 --> 00:13:45,825 Hondas are more vulnerable than other cars of being stolen. 244 00:13:45,825 --> 00:13:50,196 If you think about those claims for a minute, what you'll realize 245 00:13:50,196 --> 00:13:54,567 is that they tend to be context dependent, meaning whether or not 246 00:13:54,567 --> 00:13:58,237 some group, population, or set of individuals is more vulnerable 247 00:13:58,237 --> 00:14:01,507 than others, is going to depend upon the context. 248 00:14:01,807 --> 00:14:06,212 So when it comes to research, it's going to depend upon the type of research, 249 00:14:06,212 --> 00:14:08,581 where it's conducted, and how it's conducted. 250 00:14:08,581 --> 00:14:12,685 This is just one simple example based on my earlier case of cars. 251 00:14:12,685 --> 00:14:16,522 It turns out that in certain towns in the west of the U.S., 252 00:14:16,522 --> 00:14:19,458 Hondas actually aren't very susceptible to being stolen at all. 253 00:14:19,458 --> 00:14:21,193 People aren't interested in them. 254 00:14:21,193 --> 00:14:22,962 They're interested in SUVs and trucks. 255 00:14:22,962 --> 00:14:25,831 So if you've got a Honda, and you're driving in 256 00:14:26,031 --> 00:14:29,468 Washington D.C., it's probably more likely to be stolen than other cars. 257 00:14:29,468 --> 00:14:31,537 You might want to take more protections. 258 00:14:31,537 --> 00:14:35,674 If you live in one of these towns in the West, you probably don't 259 00:14:35,674 --> 00:14:37,142 need to be as concerned. 260 00:14:37,142 --> 00:14:41,580 So the context affects whether or not that car is more likely to be stolen. 261 00:14:41,881 --> 00:14:47,486 So I threaten people here that there are going to be a couple of quiz questions. 262 00:14:47,486 --> 00:14:49,221 Here comes the first one. 263 00:14:49,221 --> 00:14:51,323 Context dependent applied to clinical research. 264 00:14:51,323 --> 00:14:54,126 Maki works in a lab at the NIH. 265 00:14:54,126 --> 00:14:56,228 He's been working with clinical investigators 266 00:14:56,228 --> 00:15:00,432 doing both translational science and basic science for at least 15 years. 267 00:15:00,432 --> 00:15:04,637 One day she's walking through the halls here at the clinical center 268 00:15:04,637 --> 00:15:07,473 where there're often ads up for clinical studies. 269 00:15:07,773 --> 00:15:12,278 She sees an ad and she's interested in enrolling in a study. 270 00:15:12,278 --> 00:15:14,580 Is Maki a vulnerable subject? 271 00:15:14,580 --> 00:15:18,684 [inaudible commentary] According to CIOM she is? 272 00:15:18,684 --> 00:15:19,418 How come? 273 00:15:22,922 --> 00:15:26,458 [inaudible commentary] Because she's an employee. 274 00:15:26,458 --> 00:15:31,196 So why would be an employee or why might being an employee 275 00:15:31,196 --> 00:15:34,733 make her vulnerable, or more vulnerable, comparatively vulnerable? 276 00:15:34,733 --> 00:15:37,670 [inaudible commentary] Yeah. 277 00:15:37,670 --> 00:15:40,039 [inaudible commentary] Okay, so. 278 00:15:40,039 --> 00:15:44,944 Sorry, so -- there's lots and lots of people listening online. 279 00:15:44,944 --> 00:15:49,682 If you can come up to the microphone, that would be good. 280 00:15:49,682 --> 00:15:52,017 Otherwise, I'll just repeat for people. 281 00:15:52,017 --> 00:15:57,156 So basically, her point here is if you remember the list from CIOMS, 282 00:15:57,156 --> 00:16:00,693 employees are one of the examples of vulnerable subjects, 283 00:16:00,693 --> 00:16:04,229 or what I'm calling comparatively, or especially vulnerable subjects. 284 00:16:04,229 --> 00:16:08,367 And then my question was, well, why would they be on that list? 285 00:16:08,367 --> 00:16:10,302 And your nice response is, well, 286 00:16:10,302 --> 00:16:14,139 it might be that given that she's an employee at the NIH, 287 00:16:14,139 --> 00:16:17,977 Maki feels some compulsion to say yes and be in a study. 288 00:16:17,977 --> 00:16:19,578 So take an obvious example, 289 00:16:19,578 --> 00:16:23,749 imagine that this is a study that's being run by her lab chief. 290 00:16:24,249 --> 00:16:26,785 Imagine her lab chief is the principal investigator 291 00:16:26,785 --> 00:16:30,889 of this study and now you want to enroll Maki in that study. 292 00:16:30,889 --> 00:16:32,458 You're going to be worried. 293 00:16:32,458 --> 00:16:36,562 You might be worried -- is she able to say no given that 294 00:16:36,562 --> 00:16:40,032 the person who's in charge, who wants to complete this study, 295 00:16:40,032 --> 00:16:42,568 presumably, is somebody who has power over her. 296 00:16:42,568 --> 00:16:47,139 And that is a very nice example, and it turns out at the clinical center 297 00:16:47,139 --> 00:16:50,943 at least we have a very specific policy for doing research with employees 298 00:16:50,943 --> 00:16:53,579 where there sometimes needs to be an independent assessment 299 00:16:53,579 --> 00:16:55,481 just exactly to address that concern. 300 00:16:55,481 --> 00:16:57,116 So on the one hand, 301 00:16:57,116 --> 00:17:01,487 if for the PI is her boss, do you think she's going to be vulnerable. 302 00:17:01,487 --> 00:17:02,955 But on the other hand, 303 00:17:02,955 --> 00:17:06,792 imagine she doesn't know any of the people who are doing this research. 304 00:17:06,792 --> 00:17:09,995 You might think in that case, she might be less vulnerable 305 00:17:09,995 --> 00:17:11,430 than almost anybody else. 306 00:17:11,430 --> 00:17:13,332 She really understands this stuff, right. 307 00:17:13,332 --> 00:17:16,769 She's been doing and involved in clinical research for 15 years, 308 00:17:16,769 --> 00:17:20,205 she might be better able to assess its value, its risks, 309 00:17:20,205 --> 00:17:23,342 its potential benefits, than somebody who doesn't have that background. 310 00:17:23,342 --> 00:17:28,347 So this is just a nice example, I think, of how whether or not a person 311 00:17:28,347 --> 00:17:32,084 or a group of people, say in this case employees, whether vulnerable 312 00:17:32,084 --> 00:17:35,521 is going to depend on the context that we're talking about. 313 00:17:35,754 --> 00:17:38,590 So those lists aren't going to apply broadly. 314 00:17:38,590 --> 00:17:41,927 It's going to depend on the case in question. 315 00:17:41,927 --> 00:17:42,461 Okay. 316 00:17:42,461 --> 00:17:44,963 So that's a discussion of who's vulnerable. 317 00:17:44,963 --> 00:17:46,365 So the same question. 318 00:17:46,365 --> 00:17:49,201 So what protections are appropriate for vulnerable subjects. 319 00:17:49,201 --> 00:17:53,439 And, as I said, given that vulnerability's going to be context dependent 320 00:17:53,439 --> 00:17:56,642 whether or not somebody needs protections, and moreover what 321 00:17:56,642 --> 00:18:00,879 those protections need to be, is going to depend upon that context. 322 00:18:00,879 --> 00:18:02,548 So this is exactly your point. 323 00:18:02,548 --> 00:18:06,418 If the PI is her boss, then we need to make sure that Maki's 324 00:18:06,418 --> 00:18:08,654 able to -- not necessarily an informed decision. 325 00:18:08,654 --> 00:18:11,690 She probably understands, but we need to make sure she's able 326 00:18:11,690 --> 00:18:13,092 to make a voluntary decision. 327 00:18:13,092 --> 00:18:14,460 That her boss isn't coercing 328 00:18:14,460 --> 00:18:17,529 her, manipulating her, or forcing her to be in this study. 329 00:18:17,529 --> 00:18:19,998 Whereas, an infant. That's not what you're worried about. 330 00:18:19,998 --> 00:18:21,900 You're worried that infants can't understand. 331 00:18:21,900 --> 00:18:24,837 So there you're going to focus more on understanding 332 00:18:24,837 --> 00:18:28,273 rather than the voluntariness of the decision the person makes. 333 00:18:28,273 --> 00:18:31,710 So here's just a couple examples of applying the vulnerabilities 334 00:18:31,710 --> 00:18:32,711 and the safeguards. 335 00:18:32,711 --> 00:18:37,282 So employees, as I mentioned, what we do, so we do an independent assessment 336 00:18:37,282 --> 00:18:41,220 to make sure the person understands and they're making their own decision 337 00:18:41,220 --> 00:18:41,553 voluntarily. 338 00:18:41,553 --> 00:18:44,823 In the case of children, you're worried they don't understand. 339 00:18:45,257 --> 00:18:47,259 They can't look out for their best interest. 340 00:18:47,259 --> 00:18:49,261 You want their parents typically to help them. 341 00:18:49,261 --> 00:18:51,230 Or you have somebody who doesn't speak English. 342 00:18:51,230 --> 00:18:54,500 Well, if they speak French and they're enrolling in a study in Paris, 343 00:18:54,500 --> 00:18:55,467 they're in good shape. 344 00:18:55,467 --> 00:18:58,237 If they're speaking only French and they're enrolling in a study 345 00:18:58,237 --> 00:19:00,472 at the clinical center, that might be a problem. 346 00:19:00,472 --> 00:19:02,708 They might not understand as well as other people. 347 00:19:02,908 --> 00:19:05,077 You might need a translator. 348 00:19:05,077 --> 00:19:06,812 So very different context. 349 00:19:06,812 --> 00:19:09,882 Very different vulnerabilities and very different protections, 350 00:19:09,882 --> 00:19:13,352 depending upon the context and the particular vulnerability.