{"id":710827,"date":"2020-12-08T09:57:01","date_gmt":"2020-12-08T17:57:01","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-research-item&#038;p=710827"},"modified":"2020-12-08T09:57:01","modified_gmt":"2020-12-08T17:57:01","slug":"de-identifying-healthcare-data-for-research","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/de-identifying-healthcare-data-for-research\/","title":{"rendered":"De-Identifying Healthcare Data for Research"},"content":{"rendered":"<p>In order to meet HIPAA privacy guidelines for secondary use such as research and analytics, the healthcare data needs to be de-identified. HIPAA defines Protected Health Information (PHI) and proposes two methods for de-identifying data. FHIR Tools for anonymization, an open source tool developed by the HealthNext team, implements foundational capability for de-identifying FHIR data using different methods. This tool comes with a default configuration that is aligned with HIPAA safe harbor method of de-identification. In this talk we give a demo of the tool, discuss other common tools and techniques, and identify potential research opportunities in preparing healthcare data for secondary use.<\/p>\n<p><strong>Presented by:<\/strong><br \/>\nRanvijay Kumar, Senior Program Manager | Health Cloud & Data<\/p>\n<p><strong>Agenda<\/strong><\/p>\n<ul>\n<li>HIPAA guidance for de-identifying Protected Health Information<\/li>\n<li>Demo of FHIR Tools for Anonymization<\/li>\n<li>Discuss other tools and techniques<\/li>\n<li>Discuss opportunities for research<\/li>\n<li>Q&A<\/li>\n<\/ul>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.youtube.com\/playlist?list=PLD7HFcN7LXReDOD9tfbLHE0Cl20T_9ws9\" target=\"_blank\" rel=\"noopener noreferrer\">See all videos in this Health Data Series ><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In order to meet HIPAA privacy guidelines for secondary use such as research and analytics, the healthcare data needs to be de-identified. HIPAA defines Protected Health Information (PHI) and proposes two methods for de-identifying data. FHIR Tools for anonymization, an open source tool developed by the HealthNext team, implements foundational capability for de-identifying FHIR data [&hellip;]<\/p>\n","protected":false},"featured_media":710830,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_hide_image_in_river":0,"footnotes":""},"research-area":[13553,13558],"msr-video-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-session-type":[],"msr-impact-theme":[],"msr-pillar":[],"msr-episode":[],"msr-research-theme":[],"class_list":["post-710827","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-research-area-medical-health-genomics","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/h-VhEVlC3h0","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/710827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/710827\/revisions"}],"predecessor-version":[{"id":710833,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/710827\/revisions\/710833"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/710830"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=710827"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=710827"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=710827"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=710827"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=710827"},{"taxonomy":"msr-session-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-session-type?post=710827"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=710827"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=710827"},{"taxonomy":"msr-episode","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-episode?post=710827"},{"taxonomy":"msr-research-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-theme?post=710827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}