Data de-identification is the process of removing Personally Identifiable Data (PII) from any documents or other media that also contains that person's Protected Health Information (PHI). De-identification is the fastest and simplest way to ensure compliance and identification security on methods of communication that could be accessed by the public or outsiders.
And in an age where everything is stored online, data de-identification is becoming increasingly important.
But what do you need to know about de-identifying data? How do you actually de-identify data?
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule requires organizations to de-identify their data to remain in accordance with the law.
That’s why so many healthcare organizations invest a considerable amount of time and money into data de-identification.
However, as you’ll learn below, this capability is useful for more than just healthcare information.
When you think of data de-identification, you probably think of personal records: someone’s data is separated from their other data, usually protected health information. This prevents them from being personally identified.
That’s the case with a lot of data de-identification processes. However, it’s not the case with all of them.
The truth is, data de-identification can be useful for more than just personal data, including some of the following circumstances:
There are countless other examples where de-identified data can be useful.
In short, it’s a valuable way to protect more than just individual healthcare patients – it can be used across industries for all different types of benefits.
You know why data de-identification is important. But how do you actually de-identify data?
Up above, we mentioned that HIPAA requires one of two ways of de-identifying data for a covered entity (health care provider, health care clearinghouse or health plan) to perform, including Expert Determination and Safe Harbor.
Expert Determination involves applying statistical or scientific principles to the data. This ultimately leads to a very small risk that the anticipated recipient could identify the individual.
Safe Harbor, on the other hand, requires the removal of 18 types of identifiers (like all geographic subdivisions below the state level). With Safe Harbor, there’s no chance that the residual information can be used to identify the individual.
BIS offers a solution called Grooper that can help companies like yours with de-identifying information and data.
Grooper is an information processing platform that offers the following deidentification benefits for your business:
Grooper has the same functionality offered by legacy document capture platforms – but with new features that make it even more useful.