Abstract
The objective of this study was to develop a method to hide information in a portable electronic health record (PEHR). In compliance with HIPAA guidelines, a hiding function for personal identifiers in a PEHR was implemented by recognizing and hiding techniques. The method emphasizes the feasibility of embedding a hiding function in a PEHR. The hiding function could be executed to hide identifiers in offline mode. The present study showed that embedding the hiding function in a PEHR is a practical way not only satisfies data confidentiability needs, but also meets patient’s personal privacy requirements. The effects of executing the hiding function would be the same as through de-identification or anonymization process.
Similar content being viewed by others
References
Code of Federal Regulations (U.S.). Title 45(Part 164), (2002)
Batami, B., Patient data confidentiality and patient rights. Int. J. Med. Inform. 62:141–49, 2001 doi:10.1016/S1386-5056(00)00135-0.
Fowles, J. B., Kind, A. C., Craft, C., Kind, E. A., Mandel, J. L., and Adlis, S., Patients’ interest in reading their medical record: relation with clinical and sociodemographic characteristics and patients’ approach to health care. Arch. Intern. Med. 164:7793–800, 2004 doi:10.1001/archinte.164.7.793.
Berman, J. J., Concept-match medical data scrubbing. How pathology text can be used in research. Arch. Pathol. Lab. Med. 127:6680–686, 2003.
Douglass, M., Clifford, G. D., Reisner, A., Moody, G. B., and Mark, R. G., Computer-assisted de-identification of free text in the MIMIC II database. Comput. Cardiol. 31:341–344, 2004 doi:10.1109/CIC.2004.1442942.
Gupta, D., Saul, M., and Gilbertson, J., Evaluation of a deidentification (De-Id) software engine to share pathology reports and clinical documents for research. Am. J. Clin. Pathol. 121:2176–186, 2004 doi:10.1309/E6K33GBPE5C27FYU.
Beckwith, B. A., Mahaadevan, R., Balis, U. J., and Kuo, F., Development and evaluation of an open source software tool for deidentification of pathology reports. BMC Med. Inform. Decis. Mak. 6:12, 2006 doi:10.1186/1472-6947-6-12.
Szarvas, G., Farkas, R., and Busa-Fekete, R., State-of-the-art anonymization of medical records using an iterative machine learning framework. J. Am. Med. Inform. Assoc. 14:5574–580, 2007 doi:10.1197/j.jamia.M2441.
Wellner, B., Huyck, M., Mardis, S., Aberdeen, J., Morgan, A., Peshkin, L., Yeh, A., Hitzeman, J., and Hirschman, L., Rapidly retargetable approaches to de-identification in medical records. J. Am. Med. Inform. Assoc. 14:5564–573, 2007 doi:10.1197/jamia.M2435.
Uzuner, O., Luo, Y., and Szolovits, P., Evaluating the state-of-the-art in automatic de-identification. J. Am. Med. Inform. Assoc. 14:5550–563, 2007 doi:10.1197/jamia.M2444.
Healthcare Information Technology Standards Panel: HITSP Anonymize Component Ver.2.1, 2007, Available from: http://www.hitsp.org/
Weerasinghe, D., Rajarajan, M., Elmufti, K., and Rakocevic, V., Patient privacy protection using anonymous access control techniques. Methods Inf. Med. 47:3235–240, 2008.
Pommerening, K., and Reng, M., Secondary use of the electronic health record via pseudonymization. Stud. Health Technol. Inform. 103:441–446, 2004.
Noumeir, R., Lemay, A., and Lina, J. M., Pseudonymisation of radiology data for research purposes. J. Digit. Imaging. 20:3284–295, 2007 doi:10.1007/s10278-006-1051-4.
Neubauer, T., and Riedl, B., Improving patients privacy with pseudonymization. Stud. Health Technol. Inform. 136:691–696, 2008.
Pommerening, K., Miller, M., Schmidtmann, I., and Michaelis, J., Pseudonyms for cancer registries. Methods Inf. Med. 35:2112–121, 1996.
Healthcare Information Technology Standards Panel: HITSP Pseudonymize Transaction. Ver.2.1, 2007, Available from: http://www.hitsp.org/
IHE IT Infrastructure Technical Framework Supplement 2006-2007, Cross-Enterprise Document Media Interchange (XDM). Available from: http://www.ihe.net/Technical_Framework/
Seitz, L., Pierson, J. M., and Brunie, L., Encrypted storage of medical data on a grid. Methods Inf. Med. 44:2198–201, 2005.
Pangalos, G., Mavridis, I., Ilioudis, C., and Georgiadis, C., Developing a public key infrastructure for a secure regional e-health environment. Methods Inf. Med. 41:5414–418, 2002.
Brandner, R., Van Der Haak, M., Hartmann, M., Haux, R., and Schmucker, P., Electronic signature for medical documents—integration and evaluation of a public key infrastructure in hospitals. Methods Inf. Med. 41:4321–330, 2002.
Gass, P., Walton, E., Winlow, R., Sagardoyburu, M., Stubbs, P., Kean, D., Tillin, M., Bourhill, G., Yabuta, K., and Takatani, T., Privacy LCD technology for cellular phones. Sharp Tech. J. 95:45–49, 2007.
Friedlin, F. J., and McDonald, C. J., A software tool for removing patient identifying information from clinical documents. J. Am. Med. Inform. Assoc. 15:5601–610, 2008 doi:10.1197/jamia.M2702.
Neamatullah, I., Douglass, M. M., Lehman, L. W., Reisner, A., Villarroel, M., Long, W. J., Szolovits, P., Moody, G. B., Mark, R. G., and Clifford, G. D., Automated de-identification of free-text medical records. BMC Med. Inform. Decis. Mak. 8:32, 2008 doi:10.1186/1472-6947-8-32.
Standard, A.I.I.M.: Implementation Guide for the Portable Document Format in Healthcare (PDF/H), AIIM, 2007; Available from : http://www.aiim.org/standards/article.aspx?ID=33284
Standard, A.S.T.M.: E31.28, E2369-05 Standard Specification for Continuity of Care Record (CCR), ASTM International, West Conshohocken, PA, USA, http://www.astm.org, 2005.
Dorr, D. A., Phillips, W. F., Phansalkar, S., Sims, S. A., and Hurdle, J. F., Assessing the difficulty and time cost of de-identification in clinical narratives. Methods Inf. Med. 45:3246–252, 2006.
Acknowledgements
This work was supported by a grant from the National Science Council, Taiwan (NSC 95-2221-E010-003).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Huang, LC., Chu, HC., Lien, CY. et al. Embedding a Hiding Function in a Portable Electronic Health Record for Privacy Preservation. J Med Syst 34, 313–320 (2010). https://doi.org/10.1007/s10916-008-9243-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10916-008-9243-8