Corpus ID: 39604260

Secondary use of the EHR via pseudonymisation.

@article{Pommerening2004SecondaryUO,
  title={Secondary use of the EHR via pseudonymisation.},
  author={K. Pommerening and M. Reng},
  journal={Studies in health technology and informatics},
  year={2004},
  volume={103},
  pages={
          441-6
        }
}
The Electronic Health Record (EHR) has many secondary uses, such as health economy and health care research, or disease specific clinical or epidemiological research. For these uses in general the patient identity is not needed, therefore the data must be anonymised or pseudonymised. Whereas for one-time use of the data this procedure is straightforward, long-term data accumulation or the necessity of re-identification require a more sophisticated approach. This paper describes possible model… Expand
Multi-centric Universal Pseudonymisation for Secondary Use of the EHR
TLDR
A pseudonymisation system is introduced which enables a multi-centric universal pseudonymisation, meaning that a patient's identity will result in the same pseudonym, regardless of which participating study center the patient data is collected. Expand
Recognition and Pseudonymization of Personal Data in Paper-Based Health Records
TLDR
The MEDSEC system for the recognition and pseudonymization of personal data in paper-based health records is presented, which integrates unique methods for automatically identifying personal and medical data and automatically pseudonymizing the personal data. Expand
Utilizing IHE-based Electronic Health Record systems for secondary use.
  • K. Holzer, W. Gall
  • Computer Science, Medicine
  • Methods of information in medicine
  • 2011
TLDR
An IHE-based architecture for cross-patient and cross-domain secondary use of EHR data is proposed and the re-use of existing electronic medical documents in EHRs for research and other fields of secondary application holds enormous potential for the future. Expand
Pseudonymization for Secondary Use of Cloud Based Electronic Health Records
TLDR
A security solution for cloud based eHealth systems to facilitate storing and secondary use of EHR (electronic health records) records by utilizing a proposed pseudonym scheme and communication protocols to protect the privacy of patients. Expand
Assuring integrity and confidentiality for pseudonymized health data
  • Bernhard Riedl, V. Grascher
  • Computer Science
  • ECTI-CON2010: The 2010 ECTI International Confernce on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology
  • 2010
TLDR
The approach PIPE (Pseudonymization of Information for Privacy in e-Health) is focused on addressing the occurring security issues and provide a safe system for medical information. Expand
Using Secondary Health Data in Research
The use of data in medical research that was originally collected for different purposes, known as secondary data, is an effective way to conduct reliable and cost-effective studies so as to progressExpand
Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy
TLDR
This work introduces coalition graphs, a graphical representation of knowledge of personal information to study data minimisation, and shows how this representation allows identification of privacy issues in existing infrastructures. Expand
An evaluation of technologies for the pseudonymization of medical data
TLDR
This paper highlights research directions currently pursued for privacy protection in e-health and evaluates common pseudonymization approaches against legal and technical criteria to identify the gaps and support decision makers in deciding on privacy systems and researchers in identifying the gaps. Expand
Pseudonymization of Radiology Data for Research Purposes
TLDR
Various software architectures are explored to enable the implementation of an imaging research database that can be incremented in time and can be used to enable electronic health record (EHR) secondary usage such as public surveillance and research, while maintaining patient confidentiality. Expand
Secure Access to Emergency Data in an e-Health Architecture
TLDR
This work provides a novel ad-hoc authentication mechanism for emergency data, which is based on the notion of pseudonyms, and guarantees appropriate security for personal data. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 12 REFERENCES
Security without identification: transaction systems to make big brother obsolete
The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.
Generische Lösungen der TMF zum Datenschutz für die Forschungsnetze der Medizin
  • Informatik , Biometrie und Epidemiologie
  • 2004
Generische Lösungen der TMF zum Datenschutz für die Forschungsnetze der Medizin. Shaker-Verlag
  • Generische Lösungen der TMF zum Datenschutz für die Forschungsnetze der Medizin. Shaker-Verlag
  • 2004
Implementierung eines Pseudonymisierungsdienstes für versichertenbezogene Daten der gesetzli chen Krankenversicherung
  • Informatik, Biometrie und Epidemiologie
  • 2002
Implementierung eines Pseudonymisierungsdienstes für versichertenbezogene Daten der gesetzlichen Krankenversicherung
  • Informatik, Biometrie und Epidemiologie
  • 2002
Die Landesbeauftragte für den Datenschutz in Nordrhein-Westfalen: 15
  • Datenschutzbericht
  • 1999
Datenschutzorientierte Abrechnung medizinischer Leistungen
  • Datenschutz und Datensicherheit
  • 1997
Schunter: Datenschutzorientierte Abrechnung medizinischer Leistungen
  • Datenschutz und Datensicherheit
  • 1997
Michaelis: Pseudonyms for cancer registry
  • Methods of Information in Medicine
  • 1996
Pseudonyms for cancer
  • registry. Methods of Information in Medicine
  • 1996
...
1
2
...