Access the full text.
Sign up today, get DeepDyve free for 14 days.
K. Emam, Elizabeth Jonker, Luk Arbuckle, B. Malin (2011)
A Systematic Review of Re-Identification Attacks on Health DataPLoS ONE, 6
F. Cate (2010)
Protecting Privacy in Health Research: The Limits of Individual ChoiceCalifornia Law Review, 98
Lack of Genuine Privacy Interest Doomed Vermont Drug Marketing Law
S. Nass, Laura Levit, L. Gostin (2009)
Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research. Washington, DC: National Academies Press
(2008)
Robust de-anonymization of large datasets
N Singer (2011)
Data privacy, put to the testNew York Times
Title 42 Section 17954(c)
Paul Ohm (2009)
Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization
(2011)
Scary-stuff:-FICO- scoring-millions-of-Americans-on-medication-compliance
C. Safran, M. Bloomrosen, W. Hammond, S. Labkoff, S. Markel-Fox, P. Tang, D. Detmer (2007)
White Paper: Toward a National Framework for the Secondary Use of Health Data: An American Medical Informatics Association White PaperJournal of the American Medical Informatics Association : JAMIA, 14 1
K. Emam (2011)
Methods for the de-identification of electronic health records for genomic researchGenome Medicine, 3
(2012)
PAGE fraction trail=6 6 of 6 McGraw D
M. Rothstein (2010)
Is Deidentification Sufficient to Protect Health Privacy in Research?The American Journal of Bioethics, 10
Encouraging the Use of, and Rethinking Protections for, De-Identified (and
Workshop on the HIPAA Privacy Rule's De-Identification Standard
(2012)
com. http://www.creditcards.com/credit-card-news/fico-score- medication-adherence-1270
(2011)
Data privacy, put to the test Congressman Ed Markey. http://markey.house.gov/press-release/july-8-2011- resolution-disapproval-supreme-court-decision-sorrell-v-ims-health-case
(2011)
Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy
J. Rogowski, Lynn Karoly (2010)
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Administrative SimplificationPractice Management Consultant
L. Sweeney (1997)
Guaranteeing anonymity when sharing medical data, the Datafly SystemProceedings : a conference of the American Medical Informatics Association. AMIA Fall Symposium
R Gellman (2010)
The deidentification dilemma: a Legislative and contractual proposal. Fordham Intellectual PropertyMedia & Entertainment Law Journal, 21
(2012)
The Illusory Privacy Problem in Sorrell v. IMS Health. 2011. Technology Policy Institute
Massimo Barbaro (2006)
A Face Is Exposed for AOL Searcher No
Tresa Undem (2010)
Consumers and Health Information Technology: A National Survey
House Report (2013)
Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital EconomyJ. Priv. Confidentiality, 4
(2009)
Transforming Healthcare Through Secondary Use of Health Data
David Oberhelman (2013)
Stanford Encyclopedia of Philosophy, 15
D. McGraw, J. Dempsey, Leslie Harris, J. Goldman (2009)
Privacy as an enabler, not an impediment: building trust into health information exchange.Health affairs, 28 2
(2012)
42. ctwatchdog.com. http://ctwatchdog.com/health/medical-privacy-issue-ficomedication-adherence-score-coming
K. Benitez, B. Malin (2010)
Evaluating re-identification risks with respect to the HIPAA privacy ruleJournal of the American Medical Informatics Association : JAMIA, 17 2
R. Herold (2001)
Standards for privacy of individually identifiable health information. Office of the Assistant Secretary for Planning and Evaluation, DHHS. Final rule.Federal register, 65 250
The Public and Doctors Overwhelmingly Agree on Health IT Priorities to Improve Patient care
(2012)
Department of Health and Human Services. Health Insurance Portability and Accountability Act of 1996 Public Law 104e91. Sections 1171-1172
R. Gellman (2010)
The Deidentification Dilemma: A Legislative and Contractual ProposalFordham Intellectual Property, Media & Entertainment Law Journal, 21
(2011)
http://www.scotusblog.com/casefiles/cases/sorrell-v-ims-health-inc
Code of Federal Regulations Title 45 Section 164.514(b)
Harder Than You Think: A Case Study of Re-identification Risk of HIPAA-Compliant Records
New FICO Analytis Predict Likelihood of Patient Adherence to Prescription Medication
Esther Hing, Gail Jensen (1999)
Health Insurance Portability and Accountability Act of 1996: lessons from the States.Medical care, 37 7
K. Emam, F. Dankar, Romeo Issa, Elizabeth Jonker, Daniel Amyot, E. Cogo, J. Corriveau, Mark Walker, Sadrul Chowdhury, R. Vaillancourt, T. Roffey, J. Bottomley (2009)
A globally optimal k-anonymity method for the de-identification of health data.Journal of the American Medical Informatics Association : JAMIA, 16 5
Hhs Rights (2002)
Standards for privacy of individually identifiable health information. Final rule.Federal register, 67 157
(2012)
National Partnership for Women & Families. Making IT Meaningful: How Consumers Value and Trust Health IT
M Barbara, T Zeller (2006)
A face is exposed for AOL searcher no. 4417749New York Times
Code Title 42 Section 1171(6) Office of Law Revision Counsel of the U.S. House of Representatives. 12. Code of Federal Regulations Title 45 Section 164.514(a) (Emphasis Added)
AbstractObjectives The aim of this paper is to summarize concerns with the de-identification standard and methodologies established under the Health Insurance Portability and Accountability Act (HIPAA) regulations, and report some potential policies to address those concerns that were discussed at a recent workshop attended by industry, consumer, academic and research stakeholders.Target audience The target audience includes researchers, industry stakeholders, policy makers and consumer advocates concerned about preserving the ability to use HIPAA de-identified data for a range of important secondary uses.Scope HIPAA sets forth methodologies for de-identifying health data; once such data are de-identified, they are no longer subject to HIPAA regulations and can be used for any purpose. Concerns have been raised about the sufficiency of HIPAA de-identification methodologies, the lack of legal accountability for unauthorized re-identification of de-identified data, and insufficient public transparency about de-identified data uses. Although there is little published evidence of the re-identification of properly de-identified datasets, such concerns appear to be increasing. This article discusses policy proposals intended to address de-identification concerns while maintaining de-identification as an effective tool for protecting privacy and preserving the ability to leverage health data for secondary purposes.
Journal of the American Medical Informatics Association – Oxford University Press
Published: Jan 1, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.