Patient Data De-identification and its Requirements - PowerPoint PPT Presentation

About This Presentation
Title:

Patient Data De-identification and its Requirements

Description:

It must be properly de-identified, which requires sufficient QA to ensure data security. Source: , Information shared above is the personal opinion of the author and not affiliated with the website. – PowerPoint PPT presentation

Number of Views:36

less

Transcript and Presenter's Notes

Title: Patient Data De-identification and its Requirements


1
Patient Data De-identification and its
Requirements
Source www.dcmsys.com
2
The utility of de-identified patient data in
medical research is hard to overstate, but
ensuring patient privacy must always be at the
heart of the operation.
Source www.dcmsys.com
3
Quality Assurance - Before protected healthcare
information (PHI) is shared outside of the client
hospitals infrastructure, it must be properly
de-identified, which requires sufficient QA to
ensure data security.
Source www.dcmsys.com
4
Independent Review - Objective third-party
reviewers are required to review the methodology,
code, and de-identification algorithms, to ensure
that the integrity of PHI has not been
compromised.
Source www.dcmsys.com
5
Adaptive Framework - Because not all healthcare
providers have the same perspective or research
requirements, de-identification processes will
necessarily differ. A scalable, adaptive
framework is vital to meet the two goals of
preserving patients privacy while using imaging
data to further medical science.
Source www.dcmsys.com
6
Airtight Data Protection - Messages, images, and
associated metadata must be de-identified in a
way which will prevent re-identification by
anyone, except the source healthcare provider.
Source https//www.dcmsys.com/patient-data-securi
ty/dicom-data-de-identification-and-re-identificat
ion/, Information shared above is the personal
opinion of the author and not affiliated with the
website.
Write a Comment
User Comments (0)
About PowerShow.com