• Corpus ID: 39604260

Secondary use of the EHR via pseudonymisation.

@article{Pommerening2004SecondaryUO,
  title={Secondary use of the EHR via pseudonymisation.},
  author={Klaus Pommerening and Michael Reng},
  journal={Studies in health technology and informatics},
  year={2004},
  volume={103},
  pages={
          441-6
        }
}
The Electronic Health Record (EHR) has many secondary uses, such as health economy and health care research, or disease specific clinical or epidemiological research. For these uses in general the patient identity is not needed, therefore the data must be anonymised or pseudonymised. Whereas for one-time use of the data this procedure is straightforward, long-term data accumulation or the necessity of re-identification require a more sophisticated approach. This paper describes possible model… 

Figures from this paper

Multi-centric Universal Pseudonymisation for Secondary Use of the EHR

TLDR
A pseudonymisation system is introduced which enables a multi-centric universal pseudonymisation, meaning that a patient's identity will result in the same pseudonym, regardless of which participating study center the patient data is collected.

Recognition and Pseudonymization of Personal Data in Paper-Based Health Records

TLDR
The MEDSEC system for the recognition and pseudonymization of personal data in paper-based health records is presented, which integrates unique methods for automatically identifying personal and medical data and automatically pseudonymizing the personal data.

Utilizing IHE-based Electronic Health Record systems for secondary use.

  • K. HolzerW. Gall
  • Medicine, Computer Science
    Methods of information in medicine
  • 2011
TLDR
An IHE-based architecture for cross-patient and cross-domain secondary use of EHR data is proposed and the re-use of existing electronic medical documents in EHRs for research and other fields of secondary application holds enormous potential for the future.

Pseudonymization for Secondary Use of Cloud Based Electronic Health Records

TLDR
A security solution for cloud based eHealth systems to facilitate storing and secondary use of EHR (electronic health records) records by utilizing a proposed pseudonym scheme and communication protocols to protect the privacy of patients.

Assuring integrity and confidentiality for pseudonymized health data

  • Bernhard RiedlV. Grascher
  • Computer Science, Medicine
    ECTI-CON2010: The 2010 ECTI International Confernce on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology
  • 2010
TLDR
The approach PIPE (Pseudonymization of Information for Privacy in e-Health) is focused on addressing the occurring security issues and provide a safe system for medical information.

Using Secondary Health Data in Research

TLDR
To ensure that the use of secondary data in medical research can continue to accelerate the pace of development in medicine, a global effort involving technological and ethical standardization needs to be developed.

Patient-Controlled Mechanism Using Pseudonymization Technique for Ensuring the Security and Privacy of Electronic Health Records

  • Bipin Kumar Rai
  • Computer Science, Medicine
    International Journal of Reliable and Quality E-Healthcare
  • 2022
TLDR
This paper has proposed a Patient Controlled mechanism using the pseudonymization technique for ensuring the security and privacy of Electronic Health records and is simple and efficiently ensures the privacy of patient data.

Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy

TLDR
This work introduces coalition graphs, a graphical representation of knowledge of personal information to study data minimisation, and shows how this representation allows identification of privacy issues in existing infrastructures.

Pseudonymization of Radiology Data for Research Purposes

TLDR
Various software architectures are explored to enable the implementation of an imaging research database that can be incremented in time and can be used to enable electronic health record (EHR) secondary usage such as public surveillance and research, while maintaining patient confidentiality.

Secure Access to Emergency Data in an e-Health Architecture

TLDR
This work provides a novel ad-hoc authentication mechanism for emergency data, which is based on the notion of pseudonyms, and guarantees appropriate security for personal data.
...

References

SHOWING 1-10 OF 12 REFERENCES

Security without identification: transaction systems to make big brother obsolete

The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.

Generische Lösungen der TMF zum Datenschutz für die Forschungsnetze der Medizin

  • Informatik , Biometrie und Epidemiologie
  • 2004

Pseudonyms for cancer

  • registry. Methods of Information in Medicine
  • 1996

Implementierung eines Pseudonymisierungsdienstes für versichertenbezogene Daten der gesetzli chen Krankenversicherung

  • Informatik, Biometrie und Epidemiologie
  • 2002

Die Landesbeauftragte für den Datenschutz in Nordrhein-Westfalen: 15

  • Datenschutzbericht
  • 1999

Implementierung eines Pseudonymisierungsdienstes für versichertenbezogene Daten der gesetzlichen Krankenversicherung

  • Informatik, Biometrie und Epidemiologie
  • 2002

Pseudonyme -ein Kompromiß zwischen Anonymisierung und Personenbezug

  • Medizinische Forschung -Ärztliches Handeln, 40. Jahrestagung der GMDS
  • 1995

Datenschutz bei elektronischen Rezepten und elektronischem Notfallausweis

  • Datenschutz bei elektronischen Rezepten und elektronischem Notfallausweis
  • 1994

Generische Lösungen der TMF zum Datenschutz für die Forschungsnetze der Medizin. Shaker-Verlag

  • Generische Lösungen der TMF zum Datenschutz für die Forschungsnetze der Medizin. Shaker-Verlag
  • 2004

Schunter: Datenschutzorientierte Abrechnung medizinischer Leistungen

  • Datenschutz und Datensicherheit
  • 1997