ABSTRACT

Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients' privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health information. It situates and contextualizes this risk-ba

chapter 1|26 pages

- Introduction

chapter 4|18 pages

- The Impact of Consent

chapter 5|24 pages

- Data Breach Notifications

chapter 6|6 pages

- Peeping and Snooping

chapter 9|14 pages

- Alternative Methods for Data Access

chapter 10|14 pages

- Scope, Terminology, and Definitions

chapter 12|10 pages

- Definitions of Identifiability

chapter 14|10 pages

- Data Masking Methods

chapter 15|8 pages

- Theoretical Re-Identification Attacks

chapter 17|6 pages

- Measures of Uniqueness

chapter 18|20 pages

- Modeling the Threat

chapter 19|10 pages

- Choosing Metric Thresholds

chapter 20|14 pages

- De-Identification Methods

chapter 21|10 pages

- Practical Tips

chapter 24|4 pages

- How Many Friends Do We Have?

chapter 25|4 pages

- Cell Size Precedents