Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Past year
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
Aug 22, 2024 · This page provides guidance about methods and approaches to achieve de-identification in accordance with the HIPAA Privacy Rule.
Jun 19, 2024 · Data de-identifying techniques include redaction, removal, pseudonymization, perturbation, and subsampling. Redaction involves obscuring sensitive information, ...
Apr 19, 2024 · Some techniques include pseudonymization, anonymization, and scrambling. While some techniques are better than others, they are all generally aiming to give you ...
Aug 19, 2024 · De-identification techniques · Suppression · Generalisation · Replacement · Top- and bottom-coding · Adding noise · Permutation. Permutation means swapping ...
Dec 12, 2023 · Our review identifies and categorises de-identification methods for free text data as rule-based methods, machine learning, deep learning and a combination of ...
Aug 15, 2024 · Data De-identification Methods · Names · Dates, except the year · Telephone numbers · Geographic data · Fax numbers · Social Security numbers · Email addresses ...
Sep 1, 2024 · Techniques like pseudonymization, data masking, and aggregation are commonly employed to reduce the risk of exposing personal information. While data de- ...
Feb 22, 2024 · HIPAA-compliant de-identification of Protected Health information is possible using two methods: the HIPAA Safe Harbor method and HIPAA Expert Determination.
Missing: techniques | Show results with:techniques
Oct 17, 2024 · Introduction to concepts and basic techniques for disclosure analysis and protection of personal and health identifiers in research data for public or ...
Nov 15, 2023 · Pseudonymization with secure hash. This de-identification technique replaces input value with a secure one-way hash generated using a data encryption key.