Repository logo

Heuristics for de-identifying health data

Loading...
Thumbnail ImageThumbnail Image

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

Before releasing personal health information for secondary uses, such as research or public health monitoring, organizations must de-identify the data they've collected. Several common heuristics are useful for this purpose, but they also have limitations. // NOTE // This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Description

Keywords

privacy interests, security, personal health information, secondary use of data, de-identification, privacy in healthcare

Citation

IEEE Security and Privacy, 6(4), 58-61.

Related Materials

Alternate Version