Health informatics - Pseudonymization
|Publication Date:||1 January 2017|
|ICS Code (IT applications in health care technology):||35.240.80|
This document contains principles and requirements for privacy protection using pseudonymization services for the protection of personal health information. This document is applicable to organizations who wish to undertake pseudonymization processes for themselves or to organizations who make a claim of trustworthiness for operations engaged in pseudonymization services.
- defines one basic concept for pseudonymization (see Clause 5),
- defines one basic methodology for pseudonymization services including organizational, as well as technical aspects (see Clause 6),
- specifies a policy framework and minimal requirements for controlled re-identification (see Clause 7),
- gives an overview of different use cases for pseudonymization that can be both reversible and irreversible (see Annex A),
- gives a guide to risk assessment for re-identification (see Annex B),
- provides an example of a system that uses de-identification (see Annex C),
- provides informative requirements to an interoperability to pseudonymization services (see Annex D), and
- specifies a policy framework and minimal requirements for trustworthy practices for the operations of a pseudonymization service (see Annex E).