2006
DOI: 10.2196/jmir.8.4.e28
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Common De-Identification Heuristics for Personal Health Information

Abstract: Background With the growing adoption of electronic medical records, there are increasing demands for the use of this electronic clinical data in observational research. A frequent ethics board requirement for such secondary use of personal health information in observational research is that the data be de-identified. De-identification heuristics are provided in the Health Insurance Portability and Accountability Act Privacy Rule, funding agency and professional association privacy guidelines, and common pract… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 68 publications
(48 citation statements)
references
References 26 publications
0
47
0
Order By: Relevance
“…We used a secure hash algorithm using patient health insurance number to track de-identified patients across sites. 11,12 Administrative health data…”
Section: Data Collectionmentioning
confidence: 99%
“…We used a secure hash algorithm using patient health insurance number to track de-identified patients across sites. 11,12 Administrative health data…”
Section: Data Collectionmentioning
confidence: 99%
“…The risk of re-identification by this means is called "journalist re-identification risk". 21 In this case, the intruder needs an external database, known as an identification database, 22 against which to compare the prescription database. In effect, the identification database contains background information about many patients.…”
Section: Type Of Re-identification Riskmentioning
confidence: 99%
“…22 For patients who are youth (generally 18 years of age or younger), there are few publicly available and easily accessible government databases (federal, provincial, or municipal) containing pertinent quasi-identifiers, since they do not own property, borrow money, have telephones in their own names, or vote. 22 However, the membership of sports teams is often publicly available (e.g., an Internet search using the term "youth roster birth" will generate lists of sports teams, along with dates of birth), and many of these lists contain detailed demographic information about the team members. Furthermore, youth increasingly reveal basic demographic information about themselves on blogs and social networking websites, such as Facebook.…”
Section: Type Of Re-identification Riskmentioning
confidence: 99%
“…The other approach that is getting an increasing interest to provide a secure access to sensitive data is data safe haven (DSH; analogous to virtual data laboratory and data enclave) where a dataset is stored in a secure computing environment, and the data users get readonly access via secure access sites and/or remote connection. A data user may view microdata and conduct data manipulations and statistical analysis, but the dataset cannot be taken out of the secure environment and analyses results are evaluated for disclosure risk before leaving the secure environment [94,95].…”
Section: Data Safe Havenmentioning
confidence: 99%