- I’m extremely busy this semester and don’t see how I can finish all my critiques in time. What’s the harm in asking my senior postdoc to help me out?
- The rules say that I can’t share applications with someone who has not been officially designated to participate in the peer review meeting. How do I know who has been officially designated?
- What would NIH do to me if they thought I had broken confidentiality in peer review?
- How would NIH know about breaches of confidentiality in peer review?
All review materials are confidential. Materials may not be shared with others. If you cannot finish your critiques by the deadline, please contact your scientific review officer.
Applications, proposals, and confidential meeting materials cannot be shared with anyone who is not a member of the study section where those documents and information are being reviewed. Officially-designated members include appointed members, temporary or ad hoc members, the Scientific Review Officer, and NIH staff with a need to know.
If NIH determines that you committed a bona fide breach of confidentiality in the peer review process, we could contact you and your institution, and ask you to step down from an appointed term of service on a study section. Depending on the severity of the breach, the NIH may refer the matter to the NIH Office of Management Assessment and possibly to the Office of the Inspector General in the Department of Health and Human Services, which could result in further administrative actions such as debarment or even criminal penalties. If the matter is referred to these authorities, the NIH would be unlikely to contact you or your institution first, as it now involves possible criminal violations.
Information about possible breaches of confidentiality come to the NIH in numerous ways. Often, an applicant will report that data, figures or text from his or her grant application appears in a publication authored by a reviewer on the panel where the application was reviewed. In addition to being a breach of confidentiality, this may also constitute research misconduct in the form of plagiarism.
We sometimes learn about breaches of confidentiality from other reviewers, colleagues and students of reviewers, or even members of the media. We also have internal controls to monitor access to our computer systems.