A PRIVACY ANALYTICS WHITE PAPER. The De-identification Maturity Model. Khaled El Emam, PhD Waël Hassan, PhD

Size: px
Start display at page:

Download "A PRIVACY ANALYTICS WHITE PAPER. The De-identification Maturity Model. Khaled El Emam, PhD Waël Hassan, PhD"

Transcription

1 A PRIVACY ANALYTICS WHITE PAPER The De-identification Maturity Model Authors: Khaled El Emam, PhD Waël Hassan, PhD 1

2 Table of Contents The De-identification Maturity Model... 4 Introduction... 4 DMM Structure... 4 Key De-identification Practice Dimension... 6 P1 Ad-hoc... 6 P2 Masking... 7 P3 Heuristics... 8 P4 Risk-based... 8 P5 Governance... 8 The Implementation Dimension... 8 I1 - The Initial Level... 9 I2 The Repeatable Level... 9 I3 The Defined Level... 9 I4 The Measured Level... 9 The Cumulative Nature of the Implementation Dimension... 9 The Automation Dimension A1 Home-grown Automation A2 Standard Automation Use of the De-identification Maturity Model The Practice Dimension and Compliance Scoring Process Improvement Ambiguous Cases Case Case

3 Case Case Mapping to the Twelve Characteristics Quantitative Assessment Scheme References About Privacy Analytics

4 The De-identification Maturity Model Introduction Privacy Analytics has developed the De-identification Maturity Model or DMM as a formal framework for evaluating the maturity of anonymization services within an organization. The framework gauges the level of an organization s readiness and experience with respect to anonymization in terms of people, processes, technologies and consistent measurement practices. The DMM is used as a measurement tool and enables the enterprise to implement a fact-based improvement strategy. The DMM is a successor to a previous analysis in which we identified twelve criteria for evaluating an anonymization methodology [1], and to an earlier maturity model which we developed to assess the identifiability of data [2]. The criteria used, in both instances, were based on contemporary standards. The set of twelve criteria, although useful for general evaluation purposes, poses two challenges regarding its application: (a) how can these criteria be used to evaluate the anonymization practices of organizations, and (b) do all of the twelve criteria need to be implemented at once? We have now developed a maturity model based on these twelve criteria: the De-identification Maturity Model. The DMM is intended to serve a number of purposes: it can (a) be used by organizations as a yardstick to evaluate their de-identification practices, (b) provide a roadmap for improvement, helping organizations to determine what they need to do next in order to improve their de-identification practices and (c) allow different units or departments within a larger organization to compare their de-identification practices in a concise and objective way. Organizations that have a higher maturity score on the DMM are considered to have better and more sophisticated de-identification practices. Higher maturity scores indicate that the organization is able to: (a) defensibly ensure that the risk of re-identification is very small, (b) meet regulatory and legal requirements, (c) share more data for secondary purposes using fewer resources (greater efficiency), (d) share higher quality data that better meets the analytical needs of the data recipients, (e) de-identify data through consistent practices, and (f) better estimate the resources and time required to de-identify a data set. DMM Structure The DMM has five maturity levels to describe the de-identification practices that an organization has in place, with level 1 being the lowest level of maturity and level 5 being the highest level of maturity. Borrowing a term from the ISO/IEC international standard [1] on software process assessment, we will assume that the scope of the DMM is an organizational unit (or OU for short). An OU is a general term for entities of all sizes, from small units of a few people assigned to a specific project up to whole enterprises. We therefore deliberately do not define an OU because the definition will be case specific. It may be a particular business unit within a larger enterprise, or it can be a whole ministry of health. DMM is a descriptive model developed through discussions with, and experiences and observations of, more than 60 OUs over the last five years. The model is intended to capture the stages that an OU passes through as it implements de-identification services. Based on our experiences, the DMM describes the evolutionary stages through which OUs achieve greater levels of sophistication and efficiency. 4

5 The DMM has three dimensions, as illustrated in FIGURE 1. The first dimension is the nature of the deidentification methodology that the OU has in place: this is the Key De-identification Practice dimension. The second dimension captures how well these practices are being implemented. This Implementation dimension covers elements such as proper management of de-identification practices, documentation of practices, and their measurement. The third dimension of Automation assesses the degree of automation of the de-identification process. We will examine each of these dimensions in detail below. Figure 1: The three dimensions of the De-identification Maturity Model. The DMM can be represented in the form of a matrix as illustrated in Figure 2. This matrix also allows for the explicit scoring of an OU s de-identification services. 5

6 Figure 2: The de-identification maturity matrix showing all three dimensions of the DMM. Key De-identification Practice Dimension P1 Ad-hoc At this level, an OU does not have any defined practices for de-identification. The OU may not even realize that de-identification is necessary. If it is recognized as necessary, it is left to database administrators or analysts to figure out what to do, without much guidance. The methods that are used to de-identify the data are either developed in-house (e.g., invented by a programmer) or picked up by browsing the Internet. At Practice Level 1 (P1), such methods are not proven to be rigorous or defensible. OUs at this level will often lack adequate advice from their legal counsel, have a weak or non-existent privacy or compliance office, and/or have poor communication with this office. OUs at the Practice Level 1 tend to have a lot of variability in how they de-identify data, as the type and amount of de-identification applied will be depend on the analyst who is performing it, and that analyst s experience and skill. They may apply various techniques on the data, such as rudimentary masking methods, or other non-reviewed approaches. The quality of the data coming out of the OU will also vary, as the extent of de-identification may be indiscriminately high or low. Some OUs at Practice Level 1 recognize the low maturity of their de-identification capacities and err on the conservative side by not releasing any data. For OUs at this level which do release data, a data breach would almost certainly be considered notifiable in jurisdictions where there are breach notification laws in place. 6

7 P2 Masking OUs at this level only implement masking techniques. Masking techniques focus exclusively on direct identifiers such as name, phone number, health plan number, and so on. They include techniques such as pseudonymization, the suppression of fields, and randomization [3]. As we have documented elsewhere [1], masking is not sufficient to ensure that the risk of re-identification is very small for the data set. Masking is necessary, but not sufficient, to protect against identity disclosure. Even if good masking techniques are used, it is possible to produce a data set with a high risk of re-identification. According to our observations, OUs often remain at Practice Level 2 for one or a combination of these three reasons: (a) masking tool vendors erroneously convince them that masking is sufficient to ensure that the risk of re-identification is small, (b) the OU needs to disclose unique identifiers (such as social security numbers or health insurance numbers) to facilitate data matching but is uncomfortable doing so and consequently chooses to implement pseudonymization, and (c) the individuals who are tasked with implementing de-identification lack knowledge of the area and do not know about residual risks from indirect identifiers. In healthcare, and increasingly outside of healthcare, this method of de-identification alone will not meet the expected standards for protection of personal information (see the table mapping to existing standards below). Therefore, OUs at Practice Level 2 will also have to go through a notification process if they experience a breach, in jurisdictions where there are breach notification laws. 7

8 P3 Heuristics At this level OUs have masking techniques in place, and have started to add heuristic methods for protecting indirect identifiers. Heuristic methods are rules-of-thumb that are used to de-identify data. For example, the commonly used cell size of five is a rule of thumb, as is the heuristic that no geographic area with less than 20,000 residents will be released. Oftentimes these heuristics are just copied from another organization that is believed to be reputable or is perceived to have good practices for managing privacy. A discussion of heuristics can be found elsewhere [4]. This is a significant improvement from Practice Level 2 in that it is starting to look at ways to protect indirect identifiers, such as location, age, dates of service, types of service, etc., that can be used in combination to identify individuals. However, heuristics have two key disadvantages: (a) they do not ensure that the risk of re-identification is very small for the OU s particular data sets, and (b) they may result in too much distortion of the data set. The primary reasons for these disadvantages are that heuristics do not rely on measurement of re-identification risk and do not take the context of the use or disclosure of the data into account. P4 Risk-based Risk-based de-identification involves the use of empirically validated and peer-reviewed measures to determine the acceptable re-identification risk and to demonstrate that the actual risk in the data sets is at or below this acceptable risk level. In addition to measurement, there are specific techniques that take into account the context of the de-identification when deciding on an acceptable risk level. Because risk can be measured, it is possible to perform only enough de-identification on the data to meet the risk threshold, and no more. In addition to risk measurement, OUs at this level quantify information loss, or the amount of change made to the data. By considering these two types of measures, the OU can ensure that the data experiences minimal change while still meeting the risk threshold requirement. Of course, masking techniques are still used at this level to protect direct identifiers in the data set. These are assumed to be carried over from lower levels on this dimension. At this level, if practices are implemented consistently, it would be relatively straightforward to make the case that no notification is required if there is a data breach of the de-identified data. P5 Governance At the highest level of maturity, masking and risk-based de-identification are applied as described in Practice Level 4. However, now there is a governance framework in place, as well as practices to implement it. Governance practices include performing audits of data recipients, monitoring changes in regulations, and having a re-identification response process. The Implementation Dimension The de-identification practices described above can be implemented with different levels of rigor. We define four levels of implementation: Initial, Repeatable, Defined, and Measured. Note, that there is no Implementation dimension for OUs at the P1 level because there are no de-identification practices to implement. Consequently these cells are crossed out in Figure 2. 8

9 I1 - The Initial Level At the Initial level the de-identification practices are performed by an analyst with no documented process, no specific training, and no performance measurements in place. It is experiential and the quality of the de-identification that is performed will depend largely on the skills and effort of the analyst performing it. This leads to variability in how well and how quickly de-identification can be performed. It also means that the OU is at risk of losing a significant amount of its de-identification expertise if these analysts leave or retire; there is no institutional memory being built up to maintain the practices within the OU. I2 The Repeatable Level At the Repeatable level the OU has basic project management practices in place to manage the deidentification service. This means that: (a) there are roles and responsibilities defined for performing deidentification, and (b) there is a known high-level process for receiving data, de-identifying it, and then releasing it to the data users. At this level there is a basic structure in place for de-identification. Also critical at this level is the involvement of the privacy or compliance office in helping to shape deidentification practices. Since these staff would have a more intimate understanding of legislation and regulations, their inputs are advisable at the early stages of implementing de-identification practices. I3 The Defined Level The Defined level of implementation means that the de-identification process is documented and there is training in it in place. Documentation is critical because it is a requirement in privacy standards. The HIPAA Privacy Rule Statistical Method, for example, explicitly mentions documentation of the process as a compliance requirement. Training ensures that the analysts performing the de-identification will be able to do it correctly and consistently. In order to comply with regulatory requirements, the nature of the documentation also matters. The purpose of the documentation is to demonstrate to an auditor or an investigator, in the event of a potentially adversarial situation, the precise practices that are used to de-identify the data. An auditor or investigator will be looking at the process documentation for a number of reasons, such as: (a) there has been a breach and the regulator is investigating it; (b) there has been a patient complaint about data sharing and concerns have been expressed in the media, resulting in an audit being commissioned; and/ or (c) a client of the OU has complained that data they are receiving from the OU are not de-identified properly. The documentation is then necessary to make the case strongly and convincingly that adequate methods were used to de-identify the data. Based on our experience, a two or three page policy document, for example, will generally not be considered to be sufficient. I4 The Measured Level The Measured level of implementation pertains to performance measures of the de-identification process being made and used. Measures can be based on tracking of the data sets that are released and of any data sharing agreements. For example, the OU can examine trends of data releases and their types over time to enable better resource allocation; for instance, overlaps in data requests could lead to the creation of standard data sets. Other measures can include data user satisfaction surveys and measures of response times and delays in getting data out. The Cumulative Nature of the Implementation Dimension The levels in the Implementation dimension are cumulative in that it is difficult to implement a higher level without having implemented a lower level. For example, meaningful performance measures will be difficult to collect without having a defined process. 9

10 The Automation Dimension Automation is essential for scalability. Any data set that is not trivial in size can only be de-identified using automated tools. Automation becomes critical as data sets become larger and as de-identification needs to be performed regularly (as in data feeds). Without automation, it will be difficult to believe that there is a de-identification process in place. A1 Home-grown Automation An OU may attempt to develop its own scripts and tools to de-identify data sets. Based on our experiences, solutions developed in-house tend to have fundamental weaknesses in them, or to be incomplete. For example, some OUs may try to develop their own algorithms for creating pseudonyms. We have sometimes seen OUs develop their own hashing schemes for pseudonyms. We strongly advise against this, because they will almost certainly not work correctly, or will be easy to re-identify (one should only use NIST approved hashing schemes). But even for seemingly straightforward masking schemes, de-identification can be reversed if not constructed carefully [1]. It takes a considerable amount of expertise in this area to construct effective masking techniques. We have also observed home grown de-identification scripts that distort the data too much, because they focus on modifying data to protect privacy without considering data utility. A2 Standard Automation Standard automation means adopting tools that have been used more broadly by multiple organizations and have received scrutiny. These may be publicly available (open source) or commercial tools. The advantage of standard tools is transparency, in that their algorithms have likely been reviewed and evaluated by a larger community. Any weaknesses have been identified and flagged, and the developer(s) of the tools have been made aware of them and likely addressed them. Data masking is not a trivial task. Developing pseudonymization or randomization schemes that are guaranteed not to be reversible (at least have a low probability) requires significant knowledge in the area of disclosure control. The measurement of re-identification risk is an active area of research among statisticians, and the de-identification of indirect identifiers is a complex optimization problem. The metrics and algorithms of any tools adopted should be proven to be defensible. Use of the De-identification Maturity Model The Practice Dimension and Compliance Across multiple jurisdictions, OUs at levels P1 and P2 in the Practice dimension are generally not compliant with de-identification regulations. Practice Level 3 OUs may pass an audit, but with major findings, because they will not be able to provide objective evidence that their de-identification techniques ensure that re-identification risk is very small (since there is no measurement in place). The outcome of an audit or an investigation will depend on how strict the auditor is, but in general, de-identified data cannot be defensibly considered to be re-identifiable. In general, we recommend that Practice Level 3 should be a transitional stage to higher Practice levels. 10

11 Figure 3: An example of scoring P2-I3-A1 on the maturity matrix. Scoring An OU scored on the DMM has three scores: the Practice score, the Implementation score, and the Automation score. For example, an OU that has purchased a data masking tool and implemented it, and has documented the data masking process and its justifications thoroughly, would be scored at P2-I3-A2. If the masking tool was home grown, but with the same level of documentation and training, then the score would be P2-I3-A1. This is illustrated on the maturity matrix in Figure 3. The check marks in the matrix indicate the three dimensions of the score. The absolute minimum score to be able to make any defensible claim of compliance with current standards would be a P4-I3-A1 score. We deliberately did not attach weights to the dimensions as we do not have a parsimonious way of doing so. Based on our experiences we would argue that an OU would be best off improving its P score first, and then focusing on Automation, followed by the Implementation. Without the appropriate deidentification practices (Practice dimension) in place, adequate privacy protection is impossible. The OU must first have reasonable de-identification practices in place. Then, automation is necessary for the deidentification of data sets of any substantial size. Finally, the Implementation dimension should receive attention. Therefore, the priority ranking is Practice > Automation > Implementation. Improvements beyond the minimum required for compliance may be motivated by a drive to achieve certain outcomes, such as finding efficiencies, improving service quality, and reducing costs. For example, further improvements allow for the release of higher quality data, the release of larger volumes of data, faster data releases, and lower operating costs. 11

12 In large OUs there may be multiple departments and units performing de-identification, and each of these departments and units may have a different DMM score. These scores may be quite divergent, reflecting significant heterogeneity within the OU. This makes it challenging to compute or present an OU-wide score. There are three ways to approach such heterogeneity: (a) present a range for each of the three scores to reflect that heterogeneity, (b) present the average for each score, or (c) define multiple department or unit profiles and present a separate assessment for each. The third approach requires some explanation. In a case where there are two extreme sets of practices within an OU, some very good and some very poor (according to the maturity model), it would be difficult to present a coherent picture of the whole OU. Those departments or units with high maturity scores would be represented, characterized, and described in a Pioneers profile. Those departments or units with low maturity scores would be represented by a Laggards profile. Each profile s scores on the three DMM dimensions would be an average or a range of the scores of the departments or units represented. Process Improvement The DMM provides a roadmap for an OU to improve its de-identification practices. The Practice dimension target for an OU that only occasionally uses and discloses data for secondary purposes would be Practice Level 4. The Practice dimension target for an OU that uses and discloses data for secondary purposes on quite a regular basis would be Practice Level 5. Process improvement plans generally focus on all three dimensions. These may be performed simultaneously or staggered, depending on resources. It is very reasonable for an OU to skip certain Practice Levels. Recall that the DMM characterizes the natural evolution of de-identification practices that an OU goes through. In a deliberate process improvement context an OU may skip Practice Levels to move directly to the targeted state. For example, an OU at Practice Level 1 (Ad-hoc) would not deliberately move to a still non-compliant Practice Level 2 (Masking), but directly to Practice Level 4 (Risk-based). As noted above, the Implementation Levels (Initial, Repeatable, Defined, and Measured) are cumulative. This means that skipping Implementation Levels is not recommended (and will not work very well). Ambiguous Cases We consider below some grey areas or edge cases that have been encountered in practice. These are intended to help interpret the DMM. Case 1 Assume that an OU is using a masking technique, but that technique is known to be reversible. For example, the method that is used for creating the pseudonym from a social security number or medical record number has weaknesses in that one can infer the original identifier from the pseudonym. Weaknesses with other masking techniques have been described elsewhere [1]. Would that OU be considered at Practice Level 1 (Ad Hoc) or Practice Level 2 (Masking)? In general we would consider this OU to still be at Practice Level 1 since the approach that is used for masking would be considered adhoc. To be a true Practice Level 2 OU the masking methods must be known to be strong, in that they cannot be easily reverse engineered by an adversary. Case 2 A Practice Level 2 (Masking) OU has implemented pseudonymization but has not implemented other forms of masking on direct identifiers. Would that OU still be considered at Practice Level 2? If all of the direct identifiers have not been determined and masked properly, then this OU is considered at Practice Level 1 (Ad Hoc). Pseudonymization by itself may not sufficient. Also, sometimes OU s will create pseudonyms for some direct identifiers but not for others a form of partial pseudonymization. Again, this would still keep the OU at Practice Level 1. 12

13 Case 3 A series of algorithms and checklists have been developed and implemented by an OU s staff to deidentify indirect identifiers. The algorithms always de-identify the data sets the same way, and do not take the context into account. Because the context is not accounted for, this would be considered a Level 3 (Heuristic) OU. Being able to adjust the parameters of the de-identification to account for the data use and disclosure context is important for the DMM definition of Practice Level 4 (Risk-based). Case 4 An OU needs to disclose data to allow the data recipient to link the data set with another data set. The two data sets do not have a unique identifier in common, therefore probabilistic linkage is necessary. This means that indirect identifiers such as the patient s date of birth, postal code, and date of admission need to be disclosed without any de-identification. In that case, because there is a necessity to disclose fields that are suitable for probabilistic linkage does not mean that the data set is considered to have a very small risk of re-identification. Unless the data custodian can demonstrate that the measured risk is very small, then this cannot be considered as having a very small risk of re-identification. Furthermore, there are alternative approaches one can use for secure probabilistic matching that do not require the sharing of the indirect identifiers. Mapping to the Twelve Characteristics In an earlier analysis we documented twelve characteristics of anonymization methodologies that are mentioned in contemporary standards, such as guidance and best practice documents from regulators [1], [5]. The following mapping indicates how the DMM maps to these criteria. There are three conclusions that one can draw from this mapping. First, that the DMM covers the 12 characteristics and therefore it is consistent with existing standards. Second, that the DMM covers some practices that are not mentioned in the standards. There are a number of reasons for this: The standards describe a high maturity OU. The DMM covers low maturity as well as high maturity OUs. Hence, we discuss some of the practices we see in low maturity OUs. The standards do not cover some practices that we believe are critical for the effective implementation of de-identification, such as automation (the Automation dimension) and performance measurement (the I4 level). These are practical requirements that enable the scaling of deidentification. We have observed that large scale de-identification is becoming the norm because of the volume of health data that is being used and disclosed for secondary purposes. Third, we see that the union of current standards describes a P5-I3-A1 OU. As noted above we consider P5 practices most suitable for OUs that perform a significant amount of de-identification. And the standards do not discuss performance measurement and automation 13

14 MAPPING THE DMM TO THE TWELVE CHARACTERISTICS CRITERION Is the methodology documented? Has the methodology received external or independent scrutiny? Does the methodology require and have a process for the explicit identification of the data custodian and the data recipients? Does the methodology require and have a process for the identification of plausible adversaries and plausible attacks on the data? Does the methodology require and have a process for the determination of direct identifiers and quasi-identifiers? Does the methodology have a process for identifying mitigating controls to manage any residual risks? Does the methodology require the measurement of actual reidentification risks for different attacks from the data? Is it possible to set, in a defensible way, re-identification risk thresholds? MAPPING I3 this is a requirement of the Implementation Defined Level P5 this is part of governance P2 onwards Customizing the fields to mask or to de-identify can depend on the data recipient P4 this kind of practice would mostly be relevant in a risk-based de-identification approach This is generally considered in the structure of the Practice dimension P4 this kind of practice would mostly be relevant in a risk-based de-identification approach P4 this kind of practice would mostly be relevant in a risk-based de-identification approach P4 this kind of practice would mostly be relevant in a risk-based de-identification approach Is there a process and template for the implementation of the reidentification risk assessment and de-identification? P4 this kind of practice would mostly be relevant in a risk-based de-identification approach Does the methodology provide a set of data transformations to apply? Does the methodology consider data utility? Does the methodology address de-identification governance? I3 a documented methodology with appropriate training would explain the data transformations P2 and P4 usually masking methodologies have a subjective measure of data utility and risk-based ones a more objective measure of data utility Elements of governance are covered in Practice Level 5 and also in Implementation Level 3. 14

15 Quantitative Assessment Scheme We now discuss a scoring scheme for the maturity model. This is the scoring scheme that we have been using and we found that it provides results that have face validity. Recall that the objective of using the DMM is often to identify weaknesses and put in place a roadmap for improvement, and a scoring scheme that supports that objective would be considered acceptable. An assessment can be performed by the OU itself or by an external assessor. It consists of a series of questions around each of the dimensions. The response to a question is Yes (and gets a score of 4), No (and gets a score of zero), or is being planned (and gets a score of 1). For each dimension in the DMM, start at the level 2 questions. Score the level 2 questions and take their average. If the average score is less than or equal to 3 then that OU is at level 1 on that dimension. If the OU has a score greater than 3, then proceed to the next level s questions, and so on. KEY DE-IDENTIFICATION PRACTICE DIMENSION CRITERION Yes No Planned Level 2 - Masking Does the OU s de-identification methodology require and have a process for the determination of direct identifiers and quasi-identifiers? Does the OU have practices for either deleting direct identifiers or creating pseudonyms from unique direct identifiers (such as MRNs, health insurance numbers, SSNs or SINs)? Does the OU have practices for the randomization of other non-unique direct identifiers? Is data utility explicitly considered when deciding which direct identifiers to mask and how? Does the OU require and have a process for the explicit identification of the data custodian and the data recipients? Level 3 - Heuristics Does the OU s de-identification methodology require and have a process for the determination of direct identifiers and quasi-identifiers? Does the OU have practices for either deleting direct identifiers or creating pseudonyms from unique direct identifiers (such as MRNs, health insurance numbers, SSNs or SINs)? Does the OU have practices for the randomization of other non-unique direct identifiers? Is data utility explicitly considered when deciding which direct identifiers to mask and how? 15

16 Does the OU require and have a process for the explicit identification of the data custodian and the data recipients? Does the OU have a checklist of indirect identifiers to always remove or generalize (similar in concept to the US HIPAA Privacy Rule Safe Harbor list)? Does the OU use general rules-of-thumb to generalize or aggregate certain indirect identifiers (e.g., never release more than three characters of the postal code) that are always applied for all data releases? Level 4 Risk-based Does the OU s de-identification methodology require and have a process for the determination of direct identifiers and quasi-identifiers? Does the OU have practices for either deleting direct identifiers or creating pseudonyms from unique direct identifiers (such as MRNs, health insurance numbers, SSNs or SINs)? Does the OU have practices for the randomization of other non-unique direct identifiers? Is data utility explicitly considered when deciding which direct identifiers to mask and how? Does the OU require and have a process for the explicit identification of the data custodian and the data recipients? Does the OU require and have a process for the identification of plausible adversaries and plausible attacks on the data? Does the OU have a process for identifying mitigating controls to manage any residual risks? Does the OU require the measurement of actual reidentification risks for different attacks from the data? Is it possible to set, in a defensible way, re-identification risk thresholds? Is there a process and template for the implementation of the re-identification risk assessment and de-identification? Level 5 Governance Does the OU s de-identification methodology require and have a process for the determination of direct identifiers and quasi-identifiers? 16

17 Does the OU have practices for either deleting direct identifiers or creating pseudonyms from unique direct identifiers (such as MRNs, health insurance numbers, SSNs or SINs)? Does the OU have practices for the randomization of other non-unique direct identifiers? Is data utility explicitly considered when deciding which direct identifiers to mask and how? Does the OU require and have a process for the explicit identification of the data custodian and the data recipients? Does the OU require and have a process for the identification of plausible adversaries and plausible attacks on the data? Does the OU have a process for identifying mitigating controls to manage any residual risks? Does the OU require the measurement of actual reidentification risks for different attacks from the data? Is it possible to set, in a defensible way, re-identification risk thresholds? Is there a process and template for the implementation of the re-identification risk assessment and de-identification? Does the OU conduct of audits of data recipients (or require third-party audits) to ensure that conditions of data release are being satisfied? Does the OU have an explicit process for monitoring changes in relevant regulations and precedents (e.g., court cases or privacy commissioner orders)? Is there a process for dealing with an attempted or successful re-identification of a released data set? Has the OU subjected its de-identification practices to external review and scrutiny to ensure that they are defensible? Does the OU commission re-identification testing to ensure that realistic re-identification attacks will have a very small probability of success? Does the OU monitor multiple data releases to the same recipients for overlapping variables that may increase the risk of re-identification? 17

18 IMPLEMENTATION DIMENSION CRITERION Yes No Planned Level 2 - Repeatable Does the OU have someone responsible for de-identification? Does the OU have clearly defined expected inputs and outputs for the de-identification? Are there templates for data requests and de-identification reports, certificates, and agreements? Is the privacy or compliance function involved in defining or reviewing the de-identification practices? Level 3 - Defined Is the de-identification process documented? Does the OU have evidence the documented process is followed? Are all analysts who need to perform or advise on deidentification activities receiving appropriate training? Level 4 - Measured Does the OU collect and store performance data, for example, on the number and size of de-identified data sets, the types of fields, the types of data recipients, how long deidentification takes? Is trend analysis performed on the collected performance data to understand how performance is changing over time? Are actions taken by the OU to improve performance based on the trend analysis? Are satisfaction surveys of data recipients conducted and analyzed? AUTOMATION DIMENSION CRITERION Yes No Planned Level 2 Standard Automation Does the OU use off-the-shelf data masking tools? Does the OU use off-the-shelf data de-identification tools? Is the functioning of the masking tools transparent (i.e., documented and reviewed)? Is the functioning of the de-identification tools transparent (i.e., documented and reviewed)? 18

19 References 1. International Standards Organization, catalogue_detail_ics.htm?csnumber=60555, Accessed April K. El Emam, Risky Business: Sharing Health Data while Protecting Privacy. Trafford K. El Emam, Risk-based De-identification of Health Data, IEEE Security and Privacy, vol. 8, no. 3, pp , El Emam, K., Guide to the De-identification of Personal Health Information. CRC Press (Auerbach), K. El Emam, Heuristics for De-identifying Health Data, IEEE Security and Privacy, pp , K. El Emam, The Twelve Characteristics of a De-identification Methodology, Privacy Analytics Inc. Contact Us Privacy Analytics, Inc. 800 King Edward Avenue Suite 3042 Ottawa, ON, K1N 6N5 Telephone: info@privacyanalytics.ca Copyright 2013 Privacy Analytics, Inc. All Rights Reserved. About Privacy Analytics Privacy Analytics Inc. is a world-renowned developer of data anonymization solutions. Its proprietary, integrated de-identification and masking software PARAT enables secondary users of personal information to have granular de-identified data that retains a high level of usefulness. For health information, PARAT operationalizes the HIPAA Privacy Rule De-Identification Standard, enabling users to quickly and efficiently anonymize large quantities of data while complying with legal standards. Privacy Analytics resulted from the commercialization of the research efforts of the Electronic Health Information Laboratory (EHIL) of the University of Ottawa, which over the past decade has produced more than 150 peer-reviewed papers. The work of EHIL has been influential in the development of regulations and guidance worldwide. With PARAT software, organizations can realize the value of the sensitive data they hold, while still protecting the privacy of individuals when conducting critical research and complex analytics. They can facilitate innovation for the improvement of society and still meet the most stringent legal, privacy and compliance regulations. Privacy Analytics offers education dedicated to data anonymization and re-identification risk management Sharing Personal Health Information for Secondary Purposes: An Enterprise Risk Management Framework. Privacy Analytics is proud to be recognized by the Ontario Information and Privacy Commissioner as a Privacy by Design Organizational Ambassador. The company is committed to the Privacy by Design objectives of ensuring privacy and gaining personal control over one s information and, for organizations, gaining a sustainable competitive advantage. 19

Safe Harbor Vs the Statistical Method

Safe Harbor Vs the Statistical Method Safe Harbor Vs the In order to leverage protected health information (PHI) for secondary purposes, an understanding of the different deidentification mechanisms is required. Under the U.S. Health Insurance

More information

De-Identification Reduce Privacy Risks When Sharing Personally Identifiable Information

De-Identification Reduce Privacy Risks When Sharing Personally Identifiable Information De-Identification Reduce Privacy Risks When Sharing Personally Identifiable Information De-Identification Unlock the value in your data Privacy Analytics Inc. is commercializing the technology developed

More information

Risk Management using the HITRUST De-Identification Framework

Risk Management using the HITRUST De-Identification Framework Risk Management using the HITRUST De-Identification Framework Dr. Khaled El Emam, CEO, Privacy Analytics Kimberly Gray, J.D., Global CPO, IMS Health Why we de-identify One of most important, useful, and

More information

A Reality Check on Health Information Privacy: How should we understand re-identification risks under HIPAA?

A Reality Check on Health Information Privacy: How should we understand re-identification risks under HIPAA? A Reality Check on Health Information Privacy: How should we understand re-identification risks under HIPAA? Daniel C. Barth-Jones, M.P.H., Ph.D. Assistant Professor of Clinical Epidemiology, Mailman School

More information

Addendum 1 Compliance indicators for the Australian Privacy Principles

Addendum 1 Compliance indicators for the Australian Privacy Principles Healthy Profession. Computer and security standards Addendum 1 indicators for the Australian Privacy Principles The compliance indicators for the Australian Privacy Principles (APP) matrix identify the

More information

pic National Prescription Drug Utilization Information System Database Privacy Impact Assessment

pic National Prescription Drug Utilization Information System Database Privacy Impact Assessment pic National Prescription Drug Utilization Information System Database Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s

More information

Office of the Chief Privacy Officer. Privacy & Security in an App Enabled World HIMSS, Tuesday March 1, 2016, Las Vegas, NV

Office of the Chief Privacy Officer. Privacy & Security in an App Enabled World HIMSS, Tuesday March 1, 2016, Las Vegas, NV Office of the Chief Privacy Officer Privacy & Security in an App Enabled World HIMSS, Tuesday March 1, 2016, Las Vegas, NV Table of Contents Introduction Why Apps? What ONC is doing to advance use of Apps

More information

U.S. Department of Energy Office of Inspector General Office of Audit Services. Audit Report

U.S. Department of Energy Office of Inspector General Office of Audit Services. Audit Report U.S. Department of Energy Office of Inspector General Office of Audit Services Audit Report The Department's Unclassified Foreign Visits and Assignments Program DOE/IG-0579 December 2002 U. S. DEPARTMENT

More information

Guidance on De-identification of Protected Health Information September 4, 2012.

Guidance on De-identification of Protected Health Information September 4, 2012. Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule September 4, 2012 OCR gratefully

More information

PRIVACY BREACH GUIDELINES

PRIVACY BREACH GUIDELINES PRIVACY BREACH GUIDELINES Purpose The may provide some guidance to government institutions, local authorities, and health information trustees (hereinafter Organizations) in Saskatchewan when a privacy

More information

Matching Accuracy of Patient Tokens in De-Identified Health Data Sets

Matching Accuracy of Patient Tokens in De-Identified Health Data Sets Matching Accuracy of Patient Tokens in De-Identified Health Data Sets A False Positive Analysis Executive Summary One of the most important and early tasks all healthcare analytics organizations face is

More information

Getting Ready for Ontario s Privacy Legislation GUIDE. Privacy Requirements and Policies for Health Practitioners

Getting Ready for Ontario s Privacy Legislation GUIDE. Privacy Requirements and Policies for Health Practitioners Getting Ready for Ontario s Privacy Legislation GUIDE Privacy Requirements and Policies for Health Practitioners PUBLISHED BY THE COLLEGE OF DENTAL HYGIENISTS OF ONTARIO SEPTEMBER 2004 2 This booklet is

More information

A Study on Personal Health Information De-identification Status for Big Data

A Study on Personal Health Information De-identification Status for Big Data , pp.54-58 http://dx.doi.org/10.14257/astl.2016.136.14 A Study on Personal Health Information De-identification Status for Big Data Young-Chul Chung 1, Ya-Ri Lee 2, Jung-Sook Kim 3* 1, Ho-Kyun Park 4 1

More information

Data Integration and Big Data In Ontario Brian Beamish Information and Privacy Commissioner of Ontario

Data Integration and Big Data In Ontario Brian Beamish Information and Privacy Commissioner of Ontario Data Integration and Big Data In Ontario Brian Beamish Information and Privacy Commissioner of Ontario Access, Privacy and Records and Information Management (RIM) Symposium October 17, 2016 Our Office

More information

POLICY STATEMENT PRIVACY POLICY

POLICY STATEMENT PRIVACY POLICY POLICY STATEMENT PRIVACY POLICY Version: 3.0 Issue Date: 01/07/2009 Last Review: 10/02/2016 Issued By: General Manager APPROVAL This policy has been approved by the Boards of METRO Church Australia and

More information

Audit of Engage Grants Program

Audit of Engage Grants Program Natural Sciences and Engineering Research Council of Canada Approved by the President on March 16, 2016 1 TABLE OF CONTENTS NSERC 1 EXECUTIVE SUMMARY... 3 2 BACKGROUND... 6 3 AUDIT RATIONALE... 6 4 AUDIT

More information

De-identification and Clinical Trials Data: Oh the Possibilities!

De-identification and Clinical Trials Data: Oh the Possibilities! De-identification and Clinical Trials Data: Oh the Possibilities! Bradley Malin, Ph.D. Assoc. Prof. & Vice Chair of Biomedical Informatics, School of Medicine Assoc. Prof. of Computer Science, School of

More information

AUTHORIZATION FOR INDIRECT COLLECTION OF PERSONAL INFORMATION. Ministry of Health & Ministry Responsible for Seniors

AUTHORIZATION FOR INDIRECT COLLECTION OF PERSONAL INFORMATION. Ministry of Health & Ministry Responsible for Seniors AUTHORIZATION FOR INDIRECT COLLECTION OF PERSONAL INFORMATION Ministry of Health & Ministry Responsible for Seniors David Loukidelis, Information and Privacy Commissioner 1.0 NATURE OF THIS DOCUMENT [1]

More information

Privacy Policy - Australian Privacy Principles (APPs)

Privacy Policy - Australian Privacy Principles (APPs) Policy New England North West Health Ltd (Trading as HealthWISE New England North West) will be referred to as HealthWISE for the purposes of this document. HealthWISE recognises that Information Privacy

More information

C. Agency for Healthcare Research and Quality

C. Agency for Healthcare Research and Quality Page 1 of 7 C. Agency for Healthcare Research and Quality Draft Guidelines for Ensuring the Quality of Information Disseminated to the Public Contents I. Agency Mission II. Scope and Applicability of Guidelines

More information

Viewing the GDPR Through a De-Identification Lens: A Tool for Clarification and Compliance. Mike Hintze 1

Viewing the GDPR Through a De-Identification Lens: A Tool for Clarification and Compliance. Mike Hintze 1 Viewing the GDPR Through a De-Identification Lens: A Tool for Clarification and Compliance Mike Hintze 1 In May 2018, the General Data Protection Regulation (GDPR) will become enforceable as the basis

More information

Health Research 2017 Call for Proposals. Evaluation process guide

Health Research 2017 Call for Proposals. Evaluation process guide Health Research 2017 Call for Proposals Evaluation process guide Evaluation process guide Health Research 2017 Call for Proposals la Caixa Foundation 0 0 Introduction This guide sets out the procedure

More information

THE JOURNEY FROM PHI TO RHI: USING CLINICAL DATA IN RESEARCH

THE JOURNEY FROM PHI TO RHI: USING CLINICAL DATA IN RESEARCH THE JOURNEY FROM PHI TO RHI: USING CLINICAL DATA IN RESEARCH Helenemarie Blake, Esq. Chief Privacy Officer, Interim Office of HIPAA & Privacy Security August 2016 SCENARIO You are putting a study together

More information

Guide to the SEI Partner Network

Guide to the SEI Partner Network Guide to the SEI Partner Network January 2018 Your Guide to Delivering SEI Services The SEI Partner Network is a premier group of organizations that deliver time-tested, proven services developed by the

More information

Performance audit report. Department of Internal Affairs: Administration of two grant schemes

Performance audit report. Department of Internal Affairs: Administration of two grant schemes Performance audit report Department of Internal Affairs: Administration of two grant schemes Office of of the the Auditor-General PO PO Box Box 3928, Wellington 6140 Telephone: (04) (04) 917 9171500 Facsimile:

More information

Request for Proposals (RFP) # School Health Transactional System. Release Date: July 24, 2018

Request for Proposals (RFP) # School Health Transactional System. Release Date: July 24, 2018 Request for Proposals (RFP) # 2018-10 School Health Transactional System Release Date: July 24, 2018 Bidders' Conference: August 6, 2018, 3:30-5 p.m. EST Final Application Deadline: August 21, 2018 by

More information

Reporting a Privacy Breach to the Commissioner

Reporting a Privacy Breach to the Commissioner SEPTEMBER 2017 Reporting a Privacy Breach to the Commissioner GUIDELINES FOR THE HEALTH SECTOR To strengthen the privacy protection of personal health information, the Ontario government has amended the

More information

LifeBridge Health HIPAA Policy 4. Uses of Protected Health Information for Research

LifeBridge Health HIPAA Policy 4. Uses of Protected Health Information for Research LifeBridge Health HIPAA Policy 4 Uses of Protected Health Information for Research This Policy contains the following Sections: I. Policy II. III. IV. Definitions Applicability Procedures A. Individual

More information

Sample Privacy Impact Assessment Report Project: Outsourcing clinical audit to an external company in St. Anywhere s hospital

Sample Privacy Impact Assessment Report Project: Outsourcing clinical audit to an external company in St. Anywhere s hospital Sample Privacy Impact Assessment Report Project: Outsourcing clinical audit to an external company in St. Anywhere s hospital October 2010 2 Please Note: The purpose of this document is to demonstrate

More information

AMSTERDAM FUND FOR THE ARTS PROFESSIONAL ARTS SCHEME

AMSTERDAM FUND FOR THE ARTS PROFESSIONAL ARTS SCHEME (The Amsterdam Fund for the Arts) This Professional Arts Scheme is available in both Dutch and English. The Dutch text shall prevail in the event of any differences (of interpretation). AMSTERDAM FUND

More information

A Standardized Approach to De-Identification

A Standardized Approach to De-Identification Paper DH06 A Standardized Approach to De-Identification Benoit Vernay, Novartis, Basel, Switzerland Ravi Yandamuri, MMS Holdings Inc., Canton, USA ABSTRACT Data transparency has become a popular topic

More information

GAO DEFENSE CONTRACTING. Improved Policies and Tools Could Help Increase Competition on DOD s National Security Exception Procurements

GAO DEFENSE CONTRACTING. Improved Policies and Tools Could Help Increase Competition on DOD s National Security Exception Procurements GAO United States Government Accountability Office Report to Congressional Committees January 2012 DEFENSE CONTRACTING Improved Policies and Tools Could Help Increase Competition on DOD s National Security

More information

A fresh start for registration. Improving how we register providers of all health and adult social care services

A fresh start for registration. Improving how we register providers of all health and adult social care services A fresh start for registration Improving how we register providers of all health and adult social care services The Care Quality Commission is the independent regulator of health and adult social care

More information

HOW ONE HOSPITAL EMBRACED PATIENT SATISFACTION TRANSPARENCY

HOW ONE HOSPITAL EMBRACED PATIENT SATISFACTION TRANSPARENCY Success Story HOW ONE HOSPITAL EMBRACED PATIENT SATISFACTION TRANSPARENCY EXECUTIVE SUMMARY As consumers pay more for their healthcare they are demanding more transparency. In a telling example, it s estimated

More information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information GAO United States General Accounting Office Report to the Committee on Armed Services, U.S. Senate March 2004 INDUSTRIAL SECURITY DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection

More information

3. Does the institution have a dedicated hospital-wide committee geared towards the improvement of laboratory test stewardship? a. Yes b.

3. Does the institution have a dedicated hospital-wide committee geared towards the improvement of laboratory test stewardship? a. Yes b. Laboratory Stewardship Checklist: Governance Leadership Commitment It is extremely important that the Laboratory Stewardship Committee is sanctioned by the hospital leadership. This may be recognized by

More information

The Allen Distinguished Investigator( ADI) Program seeks to create a cohort of

The Allen Distinguished Investigator( ADI) Program seeks to create a cohort of Paul G. Allen Family Foundation Request for Proposals Allen Distinguished Investigators Program 2012 RFP release date: August 1, 2012 RFP submission deadline: October 30, 2012 Purpose: The Allen Distinguished

More information

Privacy Impact Assessment: care.data

Privacy Impact Assessment: care.data High quality care for all, now and for future generations Document Control Document Purpose Document Name Information Version 1.1 Publication Date 03/04/2014 Description Associated Documents Issued by

More information

Accountable Care Atlas

Accountable Care Atlas Accountable Care Atlas MEDICAL PRODUCT MANUFACTURERS SERVICE CONTRACRS Accountable Care Atlas Overview Map Competency List by Phase Detailed Map Example Checklist What is the Accountable Care Atlas? The

More information

Developing a framework for the secondary use of My Health record data WA Primary Health Alliance Submission

Developing a framework for the secondary use of My Health record data WA Primary Health Alliance Submission Developing a framework for the secondary use of My Health record data WA Primary Health Alliance Submission November 2017 1 Introduction WAPHA is the organisation that oversights the commissioning activities

More information

Requests for Proposals

Requests for Proposals Social Data Initiative Requests for Proposals Social Media and Democracy Research Grants Date of RFP posting July 11, 2018 Last date revised July 11, 2018 Deadline Rolling submissions with first review

More information

PRIVACY BREACH MANAGEMENT GUIDELINES. Ministry of Justice Access and Privacy Branch

PRIVACY BREACH MANAGEMENT GUIDELINES. Ministry of Justice Access and Privacy Branch Ministry of Justice Access and Privacy Branch December 2015 Table of Contents December 2015 What is a privacy breach? 3 Preventing privacy breaches 3 Responding to privacy breaches 4 Step 1 Contain the

More information

Privacy and EHR Information Flows in Canada

Privacy and EHR Information Flows in Canada Privacy and EHR Information Flows in Canada Common understandings of the Pan-Canadian Health Information Privacy Group Pan-Canadian Health Information Privacy Group June 30, 2010 Acknowlegements This document

More information

Statement of Guidance: Outsourcing Regulated Entities

Statement of Guidance: Outsourcing Regulated Entities Statement of Guidance: Outsourcing Regulated Entities 1. STATEMENT OF OBJECTIVES 1.1 This Statement of Guidance ( Guidance ) is intended to provide guidance to regulated entities on the establishment of

More information

Farm Co-operatives and Collaboration Pilot Program Farmer Group Projects Funding Guidelines

Farm Co-operatives and Collaboration Pilot Program Farmer Group Projects Funding Guidelines Farm Co-operatives and Collaboration Pilot Program Farmer Group Projects Funding Guidelines 1 June 2017 Page 2 of 11 Farmer Group Projects Funding Rounds Overview Farmer Group Projects is a competitive

More information

PRIVACY AND ANTI-SPAM CODE FOR OUR ORGANIZATION

PRIVACY AND ANTI-SPAM CODE FOR OUR ORGANIZATION PRIVACY AND ANTI-SPAM CODE FOR OUR ORGANIZATION Please refer to Appendix A for a glossary of defined terms. INTRODUCTION The Personal Health Information Protection Act, 2004 (PHIPA) came into effect on

More information

The EU GDPR: Implications for U.S. Universities and Academic Medical Centers

The EU GDPR: Implications for U.S. Universities and Academic Medical Centers The EU GDPR: Implications for U.S. Universities and Academic Medical Centers Mark Barnes February 21, 2018 Agenda Introduction Jurisdictional Scope of the GDPR Compared with the Directive Offering Goods

More information

STATEMENT. JEFFREY SHUREN, M.D., J.D. Director, Center for Devices and Radiological Health Food and Drug Administration

STATEMENT. JEFFREY SHUREN, M.D., J.D. Director, Center for Devices and Radiological Health Food and Drug Administration STATEMENT JEFFREY SHUREN, M.D., J.D. Director, Center for Devices and Radiological Health Food and Drug Administration Institute of Medicine Committee on Patient Safety and Health Information Technology

More information

Health Technology Assessment (HTA) Good Practices & Principles FIFARMA, I. Government s cost containment measures: current status & issues

Health Technology Assessment (HTA) Good Practices & Principles FIFARMA, I. Government s cost containment measures: current status & issues KeyPointsforDecisionMakers HealthTechnologyAssessment(HTA) refers to the scientific multidisciplinary field that addresses inatransparentandsystematicway theclinical,economic,organizational, social,legal,andethicalimpactsofa

More information

Spencer Foundation Request for Proposals for Research-Practice Partnership Grants

Spencer Foundation Request for Proposals for Research-Practice Partnership Grants Spencer Foundation Request for Proposals for Research-Practice Partnership Grants For many years, the Spencer Foundation has awarded research grants to support the work of Research- Practice Partnerships

More information

BIOMETRICS IN HEALTH CARE : A VALUE PROPOSITION FROM HEALTH CARE SECTOR

BIOMETRICS IN HEALTH CARE : A VALUE PROPOSITION FROM HEALTH CARE SECTOR UMANICK TECHNOLOGIES, S.L. www.umanick.com info@umanick.com 1 / 7 Introduction In any country s health care system, many challenges have yet to be resolved. And patient identification is perhaps the greatest

More information

Compliance with Personal Health Information Protection Act

Compliance with Personal Health Information Protection Act Compliance with Personal Health Information Protection Act Ontario s Personal Health Information & Protection Act (PHIPA) governs the collection, use and disclosure of personal health information by midwives

More information

IHE IT Infrastructure Handbook. De-Identification

IHE IT Infrastructure Handbook. De-Identification Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Handbook 10 De-Identification 15 20 Date: March 14, 2014 Author: IHE IT Infrastructure Technical Committee Email: ITI@ihe.net 25 Please verify

More information

http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.htm 19 December 2016 Productivity Commission By email: data.access@pc.gov.au RE: Draft Report - Data Availability

More information

A Privacy Compliance Checklist: Organizing for Privacy Management

A Privacy Compliance Checklist: Organizing for Privacy Management Help with FOIP!! vember 2007 A Privacy Compliance Checklist: Organizing for Privacy Management (Combines Organizational Privacy Measures and Personal Information Holding checklists) Introduction The following

More information

How we use your information. Information for patients and service users

How we use your information. Information for patients and service users How we use your information Information for patients and service users What we record about you Pennine Care NHS Foundation Trust provides mental health and community health services to people living in

More information

Child Care Program (Licensed Daycare)

Child Care Program (Licensed Daycare) Chapter 1 Section 1.02 Ministry of Education Child Care Program (Licensed Daycare) Follow-Up on VFM Section 3.02, 2014 Annual Report RECOMMENDATION STATUS OVERVIEW # of Status of Actions Recommended Actions

More information

The Growth Fund Guidance

The Growth Fund Guidance The Growth Fund Guidance A programme developed in partnership between Big Lottery Fund, Big Society Capital, Access the Foundation for Social Investment Guidance What s it all about? The social investment

More information

Retrospective Chart Review Studies

Retrospective Chart Review Studies Retrospective Chart Review Studies Designed to fulfill requirements for real-world evidence Retrospective chart review studies are often needed in the absence of suitable healthcare databases and/or other

More information

Farm Data Code of Practice Version 1.1. For organisations involved in collecting, storing, and sharing primary production data in New Zealand

Farm Data Code of Practice Version 1.1. For organisations involved in collecting, storing, and sharing primary production data in New Zealand Farm Data Code of Practice Version 1.1 For organisations involved in collecting, storing, and sharing primary production data in New Zealand MARCH 2016 1 Farm Data Code of Practice The Farm Data Code of

More information

Business Risk Planning

Business Risk Planning Business Risk Planning SENTINEL EVENTS EHNAC Background The Electronic Healthcare Network Accreditation Commission (EHNAC) is a federally recognized, standards development organization and tax-exempt,

More information

Implementing National Health Observatories

Implementing National Health Observatories Implementing National Health Observatories Operational Approach and Strategic Recommendations Information Decision Action Technical Series on Information for Decision-Making PWR CHI/HA/02 Technical Series

More information

Privacy Toolkit for Social Workers and Social Service Workers Guide to the Personal Health Information Protection Act, 2004 (PHIPA)

Privacy Toolkit for Social Workers and Social Service Workers Guide to the Personal Health Information Protection Act, 2004 (PHIPA) Social Workers and Social Service Workers Guide to the Personal Health Information Protection Act, 2004 (PHIPA) COPYRIGHT 2005 BY ONTARIO COLLEGE OF SOCIAL WORKERS AND SOCIAL SERVICE WORKERS ALL RIGHTS

More information

Accountability Framework and Organizational Requirements

Accountability Framework and Organizational Requirements Ministry of Health and Long-Term Care Accountability Framework and Organizational Requirements Consultation Document Population and Public Health Division May 2017 Ministry of Health and Long-Term Care

More information

Publication Development Guide Patent Risk Assessment & Stratification

Publication Development Guide Patent Risk Assessment & Stratification OVERVIEW ACLC s Mission: Accelerate the adoption of a range of accountable care delivery models throughout the country ACLC s Vision: Create a comprehensive list of competencies that a risk bearing entity

More information

PRIVACY BREACH MANAGEMENT POLICY

PRIVACY BREACH MANAGEMENT POLICY \(.kon Education Education PRIVACY BREACH MANAGEMENT POLICY Effective Date: September 1, 2016 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (A TIPP Act) public bodies

More information

CONCEPTS AND METHODS FOR DE-IDENTIFYING CLINICAL TRIAL DATA. Khaled El Emam, Ph.D. (University of Ottawa) and

CONCEPTS AND METHODS FOR DE-IDENTIFYING CLINICAL TRIAL DATA. Khaled El Emam, Ph.D. (University of Ottawa) and CONCEPTS AND METHODS FOR DE-IDENTIFYING CLINICAL TRIAL DATA Khaled El Emam, Ph.D. (University of Ottawa) and Bradley Malin, Ph.D. (Vanderbilt University) Disclaimer: The authors are responsible for the

More information

III. The provider of support is the Technology Agency of the Czech Republic (hereafter just TA CR ) seated in Prague 6, Evropska 2589/33b.

III. The provider of support is the Technology Agency of the Czech Republic (hereafter just TA CR ) seated in Prague 6, Evropska 2589/33b. III. Programme of the Technology Agency of the Czech Republic to support the development of long-term collaboration of the public and private sectors on research, development and innovations 1. Programme

More information

SHOULD I APPLY FOR AN ARC FUTURE FELLOWSHIP? GUIDELINES

SHOULD I APPLY FOR AN ARC FUTURE FELLOWSHIP? GUIDELINES SHOULD I APPLY FOR AN ARC FUTURE FELLOWSHIP? GUIDELINES Compiled by Gary Luck and Kate Organ, Research Office, CSU Synopsis ARC Future Fellowships (FFs) fund projects that advance theory or practical application

More information

Precedence Privacy Policy

Precedence Privacy Policy Precedence Privacy Policy This Policy describes how Precedence Health Care Pty Ltd (Precedence), and any company which it owns or controls, manages personal information for which it is responsible, specifically

More information

Rutgers School of Nursing-Camden

Rutgers School of Nursing-Camden Rutgers School of Nursing-Camden Rutgers University School of Nursing-Camden Doctor of Nursing Practice (DNP) Student Capstone Handbook 2014/2015 1 1. Introduction: The DNP capstone project should demonstrate

More information

UNESCO/Emir Jaber al-ahmad al-jaber al-sabah Prize for Digital Empowerment of Persons with Disabilities. Application Guidelines for 2018/2019

UNESCO/Emir Jaber al-ahmad al-jaber al-sabah Prize for Digital Empowerment of Persons with Disabilities. Application Guidelines for 2018/2019 UNESCO/Emir Jaber al-ahmad al-jaber al-sabah Prize for Digital Empowerment of Persons with Disabilities Application Guidelines for 2018/2019 Contents Objectives of the Prize... 2 The Prize... 3 Conceptual

More information

Call for Proposal EACEA/07/2017 Erasmus+ Programme KA3 Support for Policy Reform. Social Inclusion through Education, Training and Youth

Call for Proposal EACEA/07/2017 Erasmus+ Programme KA3 Support for Policy Reform. Social Inclusion through Education, Training and Youth Call for Proposal EACEA/07/2017 Erasmus+ Programme KA3 Support for Policy Reform Social Inclusion through Education, Training and Youth Instructions for Applicants 1 1. Introduction 2. Registration of

More information

A Qualitative Study of Master Patient Index (MPI) Record Challenges from Health Information Management Professionals Perspectives

A Qualitative Study of Master Patient Index (MPI) Record Challenges from Health Information Management Professionals Perspectives A Qualitative Study of Master Patient Index (MPI) Record Challenges from Health Information Management Professionals Perspectives by Joe Lintz, MS, RHIA Abstract This study aimed gain a better understanding

More information

Mortality Data in Healthcare Analytics

Mortality Data in Healthcare Analytics Mortality Data in Healthcare Analytics Sourcing Robust Data In a HIPAA-Compliant Manner Executive Summary The incorporation of mortality data into healthcare data sets allows fraud prevention, accurate

More information

Contains Nonbinding Recommendations. Draft Not for Implementation

Contains Nonbinding Recommendations. Draft Not for Implementation 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Public Notification of Emerging Postmarket Medical Device Signals ( Emerging Signals ) Draft Guidance for Industry

More information

How the Quality Improvement Plan and the Service Accountability Agreement Can Transform the Health Care System

How the Quality Improvement Plan and the Service Accountability Agreement Can Transform the Health Care System How the Quality Improvement Plan and the Service Accountability Agreement Can Transform the Health Care System Local Health Integration Network (LHIN) Health Quality Ontario (HQO) Quality Improvement Task

More information

WEATHERIZATION ASSISTANCE PROGRAM. Procurement. Trainer s Manual Three Hour Workshop

WEATHERIZATION ASSISTANCE PROGRAM. Procurement. Trainer s Manual Three Hour Workshop WEATHERIZATION ASSISTANCE PROGRAM Procurement Trainer s Manual Three Hour Workshop WEATHERIZATION ASSISTANCE PROGRAM Procurement for Department of Energy Weatherization Assistance Grantees Learning Objectives

More information

Briefing: Quality governance for housing associations

Briefing: Quality governance for housing associations 25 March 2014 Briefing: Quality governance for housing associations Quality and clinical governance in housing, care and support services Summary of key points: This paper is designed to support housing

More information

Canadian Agricultural Automation Cluster: Call for Proposals

Canadian Agricultural Automation Cluster: Call for Proposals Canadian Agricultural Automation Cluster: Call for Proposals Deadline: 5pm EST Tuesday November 14, 2017 The Initiative: Vineland Research and Innovation Centre (Vineland) is currently developing a large-scale

More information

SSF Call for Proposals: Framework Grants for Research on. Big Data and Computational Science

SSF Call for Proposals: Framework Grants for Research on. Big Data and Computational Science 2016-01-28 SSF Call for Proposals: Framework Grants for Research on Big Data and Computational Science The Swedish Foundation for Strategic Research announces SEK 200 million in a national call for proposals

More information

FRENCH LANGUAGE HEALTH SERVICES STRATEGY

FRENCH LANGUAGE HEALTH SERVICES STRATEGY FRENCH LANGUAGE HEALTH SERVICES STRATEGY 2016-2019 Table of Contents I. Introduction... 4 Partners... 4 A. Champlain LHIN IHSP... 4 B. South East LHIN IHSP... 5 C. Réseau Strategic Planning... 5 II. Goal

More information

Guide 2: Submitting a Potential Research Topic or Potential Network Topic

Guide 2: Submitting a Potential Research Topic or Potential Network Topic Guide 2: Submitting a Potential Research Topic or Potential Network Topic Guide 2: Submitting a Potential Research Topic or Potential Network Topic EURAMET MSU, Hampton Road, Teddington, Middlesex, TW11

More information

Draft Code of Practice FOR PUBLIC CONSULTATION

Draft Code of Practice FOR PUBLIC CONSULTATION Draft Code of Practice FOR PUBLIC CONSULTATION Foreword Data Governance Australia DGA is committed to setting industry standards and benchmarks for the responsible and ethical collection, use and management

More information

Instructions for Submission: Research Grant Applications National Multiple Sclerosis Society 2018

Instructions for Submission: Research Grant Applications National Multiple Sclerosis Society 2018 Instructions for Submission: Research Grant Applications National Multiple Sclerosis Society 2018 INTRODUCTION Please read these instructions and follow them carefully. Applications that are incomplete

More information

Response to the Department of Health consultation on a draft health information policy framework

Response to the Department of Health consultation on a draft health information policy framework Response to the Department of Health consultation on a draft health information policy framework November 2017 1. Introduction HIQA welcomes the opportunity to contribute to this consultation which will

More information

Indicator 22 Patient records meet requirements to describe and support the management of health care provided.

Indicator 22 Patient records meet requirements to describe and support the management of health care provided. SECTION 3: Clinical Effectiveness Process Indicator 22 Patient records meet requirements to describe and support the management of health care provided. Record Review Where do we start? Patient records

More information

Harvesting Wearable Device Data Session 230, March 6, 2018 Ajay K. Mittal, Associate Director, IT American College of Cardiology

Harvesting Wearable Device Data Session 230, March 6, 2018 Ajay K. Mittal, Associate Director, IT American College of Cardiology Harvesting Wearable Device Data Session 230, March 6, 2018 Ajay K. Mittal, Associate Director, IT American College of Cardiology 1 Conflict of Interest Ajay K. Mittal, MS, B. Tech. Has no real or apparent

More information

Restricted Call for proposals addressed to National Authorities for Higher Education in Erasmus+ programme countries

Restricted Call for proposals addressed to National Authorities for Higher Education in Erasmus+ programme countries Annex 6 Instructions for completing the application package Erasmus+ Programme KA3 Support for Policy Reform Support to the implementation of EHEA reforms EACEA/49/2015 Restricted Call for proposals addressed

More information

REQUEST FOR PROPOSAL. Conduct a Resident Satisfaction Survey. City of Hyattsville, Maryland

REQUEST FOR PROPOSAL. Conduct a Resident Satisfaction Survey. City of Hyattsville, Maryland REQUEST FOR PROPOSAL Conduct a Resident Satisfaction Survey City of Hyattsville, Maryland Date Issued: April 29, 2013 Date Due: May 17, 2013 at 4:00 PM Date of Proposal Opening: May 21, 2013 Page 1 of

More information

PERSONAL HEALTH INFORMATION PROTECTION ACT (PHIPA) Frequently Asked Questions (FAQ s) Office of Access and Privacy

PERSONAL HEALTH INFORMATION PROTECTION ACT (PHIPA) Frequently Asked Questions (FAQ s) Office of Access and Privacy PERSONAL HEALTH INFORMATION PROTECTION ACT (PHIPA) Frequently Asked Questions (FAQ s) Office of Access and Privacy The purpose of PHIPA is to protect and govern the individual s right to retain control

More information

INSERT ORGANIZATION NAME

INSERT ORGANIZATION NAME INSERT ORGANIZATION NAME Quality Management Program Description Insert Year SAMPLE-QMProgramDescriptionTemplate Page 1 of 13 Table of Contents I. Overview... Purpose Values Guiding Principles II. III.

More information

Dr. Kristin Heins, ND Thrive Natural Family Health 110 Eglinton Avenue East, Suite 502 Toronto, Ontario M4P 2Y1 Telephone: (647)

Dr. Kristin Heins, ND Thrive Natural Family Health 110 Eglinton Avenue East, Suite 502 Toronto, Ontario M4P 2Y1 Telephone: (647) Psychotherapy Client Information Today's date: A. Identification Your name: Date of birth: Age: Your nicknames/previous/maiden/aliases: Sex: [ ]Male [ ]Female Gender: Title: [ ]Mr. [ ]Mrs. [ ]Miss [ ]Ms

More information

Brussels, 19 December 2016 COST 133/14 REV

Brussels, 19 December 2016 COST 133/14 REV Brussels, 19 December 2016 COST 133/14 REV CSO DECISION Subject: Amendment of documents COST 133/14: COST Action Proposal Submission, Evaluation, Selection and Approval The COST Action Proposal Submission,

More information

Ontario s Digital Health Assets CCO Response. October 2016

Ontario s Digital Health Assets CCO Response. October 2016 Ontario s Digital Health Assets CCO Response October 2016 EXECUTIVE SUMMARY Since 2004, CCO has played an expanding role in Ontario s healthcare system, using digital assets (data, information and technology)

More information

REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust. Signed Administrative Approval On File

REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust. Signed Administrative Approval On File The Alexandra Hospital, Ingersoll PRIVACY POLICY SUBJECT-TITLE Privacy Policy REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust DATE Oct 11, 2005 Nov 8, 2005 POLICY CODE DATE OF ORIGIN

More information

REQUEST FOR PROPOSALS

REQUEST FOR PROPOSALS REQUEST FOR PROPOSALS Improving the Treatment of Opioid Use Disorders The Laura and John Arnold Foundation s (LJAF) core objective is to address our nation s most pressing and persistent challenges using

More information

EIT Raw Materials Call for KAVA Education projects Instructions and process description

EIT Raw Materials Call for KAVA Education projects Instructions and process description EIT Raw Materials Call for KAVA Education projects Instructions and process description September 2017 1. Purpose and scope of this document This document describes the process for preparation, submission,

More information

Our next phase of regulation A more targeted, responsive and collaborative approach

Our next phase of regulation A more targeted, responsive and collaborative approach Consultation Our next phase of regulation A more targeted, responsive and collaborative approach Cross-sector and NHS trusts December 2016 Contents Foreword...3 Introduction...4 1. Regulating new models

More information

Horizontal Monitoring

Horizontal Monitoring ing. D.R. Utermark RE is a senior manager at KPMG Health. utermark.dennis@kpmg.nl E. Tsjapanova MSc is a senior consultant at KPMG Health. tsjapanova.eva@kpmg.nl KPMG is involved in the introduction of

More information