From the course: Data Governance for the Healthcare Industry
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
De-identification techniques and breach management
From the course: Data Governance for the Healthcare Industry
De-identification techniques and breach management
- [Instructor] Healthcare organizations face two big challenges when protecting patient data, how to share medical data safely for research and improvement initiatives, and how to handle situations if data is exposed. These challenges represent opposite sides of the same privacy coin. One is about preventing problems before sharing data by removing identifying formation, and the other is about responding after problem happens by managing data breaches. In this video, we'll explore how governance frameworks address both challenges to create a comprehensive approach to healthcare data protection. Let's begin with de-identification, the process of transforming sensitive health information into protected, usable datasets. There are two main ways to do this that are approved by HIPAA. The Safe Harbor method allows healthcare organizations to remove 18 specific identifiers from protected health information to ensure patient privacy. Those identifiers can be names, addresses, and so on. In…