something should be said about de-identification

XMLWordPrintableJSON

    • Type: Change Request
    • Resolution: Persuasive with Modification
    • Priority: Medium
    • FHIR Core (FHIR)
    • DSTU2
    • Security
    • Security
    • Hide

      Persuasive with Mod

      Add a H4 to the Privacy and Security Module Page

      http://build.fhir.org/secpriv-module.html

      "De-Identification, pseudonymization, anonymization"

      De-Identifiction is inclusive of pseudonymization and anonymization; which are Process of reducing privacy risk by eliminating and modifying data elements to meet a targeted use-case.

      Use-Case: "Requesting Client should have access to De-Identifed data only."

      Trigger: Based on an Access Control decision that results in a PERMIT with an Obligation to De-Identify, the Results delivered to the Requesting Client would be de-identified.

      Consideration: This assumes the system knows the type and intencity of the de-identificaiton algorithm. Where de-identification is best viewed as a Process, not an algorithm. A Process that reduces Privacy risk while enabling a targeted and authorized use-case.

      Discussion: With the Observation Resource, one would remove the subject element as it is a Direct Identifier. However there are many other Reference elements that can easily be used to navigate back to the Subject; e.g., Observation.context value of Encounter or EpisodeOfCare; or Observation.performer.

      Some identifiers in Observation Resource:

      • Direct Identifiers: .identifier, .subject, . performer, .text, .specimen, .device, .related, .text, .comment
      • Indirect Identifiers: ..issued, .component

      Emphasis: The .specimen is a direct identifier of a particular specimen; and would be an indirect identifier of a particular person. There is a ramification of having the specimen identifier. One solution is to create pseudo specimen resources that will standin for the original specimen resource. This psudo specimen management is supplied by a trusted-third-party that maintains a database of pseudo-identifiers with authorized reversability.

      Further Standards: ISO Pseudonymization, NIST, IHE De-Identificaiton Handbook, DICOM (Part 15...) ****Editor fill in appropriate references and links

      Show
      Persuasive with Mod Add a H4 to the Privacy and Security Module Page http://build.fhir.org/secpriv-module.html "De-Identification, pseudonymization, anonymization" De-Identifiction is inclusive of pseudonymization and anonymization; which are Process of reducing privacy risk by eliminating and modifying data elements to meet a targeted use-case. Use-Case : "Requesting Client should have access to De-Identifed data only." Trigger : Based on an Access Control decision that results in a PERMIT with an Obligation to De-Identify, the Results delivered to the Requesting Client would be de-identified. Consideration : This assumes the system knows the type and intencity of the de-identificaiton algorithm. Where de-identification is best viewed as a Process, not an algorithm. A Process that reduces Privacy risk while enabling a targeted and authorized use-case. Discussion : With the Observation Resource, one would remove the subject element as it is a Direct Identifier. However there are many other Reference elements that can easily be used to navigate back to the Subject; e.g., Observation.context value of Encounter or EpisodeOfCare; or Observation.performer. Some identifiers in Observation Resource: Direct Identifiers: .identifier, .subject, . performer, .text, .specimen, .device, .related, .text, .comment Indirect Identifiers: ..issued, .component Emphasis: The .specimen is a direct identifier of a particular specimen; and would be an indirect identifier of a particular person. There is a ramification of having the specimen identifier. One solution is to create pseudo specimen resources that will standin for the original specimen resource. This psudo specimen management is supplied by a trusted-third-party that maintains a database of pseudo-identifiers with authorized reversability. Further Standards : ISO Pseudonymization, NIST, IHE De-Identificaiton Handbook, DICOM (Part 15...) ****Editor fill in appropriate references and links
    • Kathleen Connor / Joe Lamy: 3-0-0
    • Enhancement
    • Non-substantive
    • DSTU2

      De-Identification topics

      mobile health workgroup http://lists.hl7.org/read/messages?id=297060

      FHIR chat https://chat.fhir.org/#narrow/stream/implementers/topic/De-identification.20mechanisms.20in.20FHIR

      Discussion in Security WG August 30 indicates that we should say something about de-identification, but not much. Mostly pointing at good external standards such as ISO, NIST, and the IHE De-Identification Handbook. Important to point out that De-Identification is a PROCESS, not an endpoint.

            Assignee:
            Unassigned
            Reporter:
            John Moehrke
            Watchers:
            1 Start watching this issue

              Created:
              Updated:
              Resolved: