Title: How to Manage Data De-identification
1How to Manage Data De-identification
Source www.dcmsys.com
2Data de-identification is vital when handling
patient imaging information for research or
educational use.
Source www.dcmsys.com
3Quality Assurance - Any data de-identification
methods must feature QA functions to ensure that
protected healthcare information is verifiably
de-identified before being shared outside a
hospitals infrastructure.
Source www.dcmsys.com
4Adaptive and Scalable - A de-identification
system cant be cookie-cutter, not with all the
situations healthcare workers find themselves in.
Any framework must be modifiable in liaison with
clients in order to achieve the dual goals of
producing useful imaging data while complying
with HIPAA and Safe Harbor provisions.
Source www.dcmsys.com
5Third-party Reviewers - Before use, the systems
methodology, code, and data de-identification
algorithms should be independently reviewed by
objective third parties in order to ensure the
integrity of personal data is preserved.
Source www.dcmsys.com
6Source https//www.dcmsys.com. Information
shared above is the personal opinion of the
author and not affiliated with the website.