入侵HIPAA:避免在销售您的可识别医疗信息时受到监督的“最佳实践”。

Journal of law and health Pub Date : 2020-01-01
Riyad A Omar
{"title":"入侵HIPAA:避免在销售您的可识别医疗信息时受到监督的“最佳实践”。","authors":"Riyad A Omar","doi":"","DOIUrl":null,"url":null,"abstract":"<p><p>In light of the confusion invited by applying the label \"de-identified\" to information that can be used to identify patients, it is paramount that regulators, compliance professionals, patient advocates and the general public understand the significant differences between the standards applied by HIPAA and those applied by permissive \"de-identification guidelines.\" This Article discusses those differences in detail. The discussion proceeds in four Parts. Part II (HIPAA's Heartbeat: Why HIPAA Protects Identifiable Patient Information) examines Congress's motivations for defining individually identifiable health information broadly, which included to stop the harms patients endured prior to 1996 arising from the commercial sale of their medical records. Part III (Taking the \"I\" Out of Identifiable Information: HIPAA's Requirements for De-Identified Health Information) discusses HIPAA's requirements for de-identification that were never intended to create a loophole for identifiable patient information to escape HIPAA's protections. Part IV (Anatomy of a Hack: Methods for Labeling Identifiable information \"De-Identified\") examines the goals, methods, and results of permissive \"de-identification guidelines\" and compares them to HIPAA's requirements. Part V (Protecting Un-Protected Health Information) evaluates the suitability of permissive \"de-identification guidelines,\" concluding that the vulnerabilities inherent in their current articulation render them ineffective as a data protection standard. It also discusses ways in which compliance professionals, regulators, and advocates can foster accountability and transparency in the utilization of health information that can be used to identify patients.</p>","PeriodicalId":73804,"journal":{"name":"Journal of law and health","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Hacking HIPAA: \\\"Best Practices\\\" for Avoiding Oversight in the Sale of Your Identifiable Medical Information.\",\"authors\":\"Riyad A Omar\",\"doi\":\"\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>In light of the confusion invited by applying the label \\\"de-identified\\\" to information that can be used to identify patients, it is paramount that regulators, compliance professionals, patient advocates and the general public understand the significant differences between the standards applied by HIPAA and those applied by permissive \\\"de-identification guidelines.\\\" This Article discusses those differences in detail. The discussion proceeds in four Parts. Part II (HIPAA's Heartbeat: Why HIPAA Protects Identifiable Patient Information) examines Congress's motivations for defining individually identifiable health information broadly, which included to stop the harms patients endured prior to 1996 arising from the commercial sale of their medical records. Part III (Taking the \\\"I\\\" Out of Identifiable Information: HIPAA's Requirements for De-Identified Health Information) discusses HIPAA's requirements for de-identification that were never intended to create a loophole for identifiable patient information to escape HIPAA's protections. Part IV (Anatomy of a Hack: Methods for Labeling Identifiable information \\\"De-Identified\\\") examines the goals, methods, and results of permissive \\\"de-identification guidelines\\\" and compares them to HIPAA's requirements. Part V (Protecting Un-Protected Health Information) evaluates the suitability of permissive \\\"de-identification guidelines,\\\" concluding that the vulnerabilities inherent in their current articulation render them ineffective as a data protection standard. It also discusses ways in which compliance professionals, regulators, and advocates can foster accountability and transparency in the utilization of health information that can be used to identify patients.</p>\",\"PeriodicalId\":73804,\"journal\":{\"name\":\"Journal of law and health\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of law and health\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of law and health","FirstCategoryId":"1085","ListUrlMain":"","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

鉴于将“去识别”标签应用于可用于识别患者的信息所引起的混乱,监管机构、合规专业人员、患者倡导者和公众理解HIPAA应用的标准与宽松的“去识别指南”应用的标准之间的重大差异是至关重要的。本文将详细讨论这些差异。本文的讨论分为四个部分。第二部分(HIPAA的心跳:为什么HIPAA保护可识别的患者信息)审查了国会广泛定义个人可识别的健康信息的动机,其中包括阻止1996年之前因其医疗记录的商业销售而遭受的伤害。第三部分(从可识别信息中去掉“I”:HIPAA对去识别健康信息的要求)讨论了HIPAA对去识别的要求,这些要求从未打算为可识别的患者信息创造漏洞,以逃避HIPAA的保护。第四部分(黑客剖析:标记可识别信息“去识别”的方法)检查了允许的“去识别指南”的目标、方法和结果,并将它们与HIPAA的要求进行了比较。第五部分(保护未受保护的健康信息)评估了许可性"去识别准则"的适用性,得出结论认为,其当前表述中固有的漏洞使其作为数据保护标准无效。它还讨论了合规专业人员、监管机构和倡导者如何在使用可用于识别患者的健康信息方面促进问责制和透明度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Hacking HIPAA: "Best Practices" for Avoiding Oversight in the Sale of Your Identifiable Medical Information.

In light of the confusion invited by applying the label "de-identified" to information that can be used to identify patients, it is paramount that regulators, compliance professionals, patient advocates and the general public understand the significant differences between the standards applied by HIPAA and those applied by permissive "de-identification guidelines." This Article discusses those differences in detail. The discussion proceeds in four Parts. Part II (HIPAA's Heartbeat: Why HIPAA Protects Identifiable Patient Information) examines Congress's motivations for defining individually identifiable health information broadly, which included to stop the harms patients endured prior to 1996 arising from the commercial sale of their medical records. Part III (Taking the "I" Out of Identifiable Information: HIPAA's Requirements for De-Identified Health Information) discusses HIPAA's requirements for de-identification that were never intended to create a loophole for identifiable patient information to escape HIPAA's protections. Part IV (Anatomy of a Hack: Methods for Labeling Identifiable information "De-Identified") examines the goals, methods, and results of permissive "de-identification guidelines" and compares them to HIPAA's requirements. Part V (Protecting Un-Protected Health Information) evaluates the suitability of permissive "de-identification guidelines," concluding that the vulnerabilities inherent in their current articulation render them ineffective as a data protection standard. It also discusses ways in which compliance professionals, regulators, and advocates can foster accountability and transparency in the utilization of health information that can be used to identify patients.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Ninth Amendment: An Underutilized Protection for Reproductive Choice. Distorted Burden Shifting and Barred Mitigation: Being a Stubborn 234 Years Old Ironically Hasn't Helped the Supreme Court Mature. How Bodily Autonomy Can Fail Against Vaccination Mandates: The Few vs. the Many. When Governors Prioritize Individual Freedom over Public Health: Tort Liability for Government Failures. Without Due Process of Law: The Dobbs Decision and Its Cataclysmic Impact on the Substantive Due Process and Privacy Rights of Ohio Women.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1