RSI Security

Guide to Deidentified Patient Data Security

pen test

Under the Health Insurance Portability and Accountability Act (HIPAA), the protected health information (PHI) of patients needs to be secured at all times. This includes personal information, such as names, birthdays, medical conditions, treatments, account numbers, Social Security numbers, and tech-related information (e.g., IP addresses, device serial numbers). However, deidentified patient data is exempt from this rule.

 

Patient Data Security at a Glance

Although deidentified patient data isn’t subject to the same safeguards as PHI, it still needs to be protected from external threats. The information is still valuable to your organization and usable in ongoing research, including investigations into emerging medical conditions and analyses of patient demographics. Therefore, it’s critical to secure this information according to modern standards.

To protect deidentified patient data, you’ll need to know:

 

The Types of Healthcare Data

Current HIPAA guidelines maintain provisions for various types of data. This includes PHI, anonymized or deidentified patient data, and reidentified data.

 

Protected Health Information

According to HIPAA, there are 18 information identifiers that are used to constitute PHI. Although some could fit multiple categories, these datasets fall into one of three general groupings:

However, note that information regarding a patient’s state of residence is not considered a geographic identifier or PHI. 

 

Request a Free Consultation

 

Deidentified and Anonymized Patient Data

Information that has been properly deidentified is considered anonymized according to HIPAA guidelines. Since this deidentified patient data cannot be linked to an individual, it’s no longer considered PHI and can be stored, processed, or transmitted as necessary. 

 

Reidentified Patient Data

Just like data can be deidentified for the purpose of anonymization, it can also be reidentified. This usually results in a combination of direct and indirect identifiers, which are sometimes capable of linking specific datasets to certain patients. Data is usually reidentified through one or more of the following methods:

  1. Undoing an insufficient or ineffective attempt to de-identify patient information
  2. Reversing the pseudonyms that were originally used to scrub the patient data
  3. Linking, combing, and collating various datasets and connecting the dots

Any reidentified data immediately becomes subject to HIPAA’s PHI safeguards once again, as threats of unauthorized use or disclosure resume.

How To De-Identify Patient Data

The HIPAA Privacy Rule describes two methods for deidentifying patient data: expert determination following an assessment or scrubbing the 18 identifiers listed as PHI.

Either method can be used. 

 

Expert Determination

Covered entities can call on a qualified expert to determine whether or not a dataset is considered PHI. According to HIPAA, this must be a person with the appropriate level of knowledge and experience with modern scientific and statistical principles. 

The expert must also apply their knowledge to determine whether or not a dataset poses any risk of identifying an individual. If not, the data is effectively considered as deidentified patient data.

 

Safe Harbor

This method requires that all of the personal, geographical, and technological identifiers of an individual, or of their employers and relatives, are removed. This includes the 18 different information identifiers described by HIPAA, with the following exceptions: 

 

Protecting Deidentified Patient Data

While it’s not held to the same security standards as PHI, deidentified patient data should still be protected in many of the same ways.

 

Maintaining Security During Research

Anonymous data still needs to be protected during research. Common concerns include viruses and ransomware that could corrupt data or lock researchers out of their systems, competitor spying or sabotage, and having incomplete or inaccurate information released to the public. Apart from compromising data security, these issues also affect your public image and reputation.

When organizing studies and research that involves deidentified patient data, some organizations utilize a legally binding data sharing agreement (DSA). Also known as a data use agreement (DUA), this document clarifies the researcher’s role, their access privileges, and exactly how data should be used. Most DSAs expressly forbid data sharing and any attempts to identify individual patients.

 

Achieving Long-Term Data Security

Deidentified patient data that is stored or processed over prolonged periods should remain protected at all times. In this case, most of HIPAA’s recommendations of data protection will suffice, including those outlined in the HIPAA Security Rule.

The Security Rule covers the following regarding PHI protections:

Although these strategies are not required, and failure to implement them for anonymous data will not result in any repercussions from HIPAA, they still provide a solid framework when securing your deidentified patient data.

Transferring Data Securely

Organizations are not required to observe HIPAA’s data encryption guidelines when storing or transferring deidentified patient data. Still, doing so helps ensure data integrity while keeping your data away from any unintended recipients but it helps ensure data integrity while keeping your data away from any unintended recipients. 

Current HIPAA guidelines recommend several encryption methods: 

 

Understanding the Benefits of Deidentified Data

Organizations de-identify patient information for numerous reasons, including:

 

Examining the Risks of Deidentified Data

While there’s no denying that medical research poses a lesser threat to the public when using deidentified patient data, there are still some inherent privacy risks and concerns. 

 

Protecting All of Your Patient Data

Deidentified patient data can be stored, processed, and transmitted without having to observe the stringent data protection rules outlined in HIPAA.

For more information on deidentified, anonymized, or reidentified patient data, or to find out how to better protect your patients’ data, contact RSI Security today.

 

 

Exit mobile version