BS EN ISO 25237:2017
$215.11
Health informatics. Pseudonymization
Published By | Publication Date | Number of Pages |
BSI | 2017 | 74 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | European foreword |
7 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
14 | 4 Abbreviated terms |
15 | 5 Requirements for privacy protection of identities in healthcare 5.1 Objectives of privacy protection 5.2 General |
16 | 5.3 De-identification as a process to reduce risk 5.3.1 General 5.3.2 Pseudonymization |
17 | 5.3.3 Anonymization 5.3.4 Direct and indirect identifiers 5.4 Privacy protection of entities 5.4.1 Personal data versus de-identified data |
19 | 5.4.2 Concept of pseudonymization |
21 | 5.5 Real world pseudonymization 5.5.1 Rationale |
22 | 5.5.2 Levels of assurance of privacy protection |
24 | 5.6 Categories of data subject 5.6.1 General 5.6.2 Subject of care 5.6.3 Health professionals and organizations 5.6.4 Device data |
25 | 5.7 Classification data 5.7.1 Payload data 5.7.2 Observational data 5.7.3 Pseudonymized data 5.7.4 Anonymized data 5.8 Research data 5.8.1 General |
26 | 5.8.2 Generation of research data 5.8.3 Secondary use of personal health information 5.9 Identifying data 5.9.1 General 5.9.2 Healthcare identifiers |
27 | 5.10 Data of victims of violence and publicly known persons 5.10.1 General 5.10.2 Genetic information 5.10.3 Trusted service 5.10.4 Need for re-identification of pseudonymized data |
28 | 5.10.5 Pseudonymization service characteristics 6 Protecting privacy through pseudonymization 6.1 Conceptual model of the problem areas |
29 | 6.2 Direct and indirect identifiability of personal information 6.2.1 General 6.2.2 Person identifying variables 6.2.3 Aggregation variables |
30 | 6.2.4 Outlier variables 6.2.5 Structured data variables |
31 | 6.2.6 Non-structured data variables 6.2.7 Inference risk assessment |
32 | 6.2.8 Privacy and security 7 Re-identification process 7.1 General 7.2 Part of normal procedures 7.3 Exception |
33 | 7.4 Technical feasibility |
34 | Annex A (informative) Healthcare pseudonymization scenarios |
47 | Annex B (informative) Requirements for privacy risk analysis |
57 | Annex C (informative) Pseudonymization process (methods and implementation) |
63 | Annex D (informative) Specification of methods and implementation |
64 | Annex E (informative) Policy framework for operation of pseudonymization services (methods and implementation) |
68 | Annex F (informative) Genetic information |
69 | Bibliography |