Strategies for De-Identification and Anonymization of Electronic Health Record Data for Use in Multicenter Research Studies
|
|
|
- Virginia King
- 10 years ago
- Views:
Transcription
1 Strategies for De-Identification and Anonymization of Electronic Health Record Data for Use in Multicenter Research Studies Clete A. Kushida, M.D., Ph.D. Professor, Stanford University Medical Center
2 Overview De-Identification and Anonymization Strategies Why Are Such Strategies Important? Database Sources, Key Words, Search Strategy Case Examples (Text, Images, Biological Samples) Discussion o Are Current De-ID Strategies Effective? o Which Strategies Are Best? o How Essential is Anonymization? o Do De-ID Strategies Alone Meet the Needs of Multicenter Research Studies? o What Approaches Can Be Used on a Multicenter Level to Ensure Privacy? o Further Work
3 Definitions De-identification and anonymization are strategies that are used to remove patient identifiers in electronic health record (EHR) data. De-identification of EHR data is the removal or replacement of personal identifiers so that it would be difficult to reestablish a link between the individual and his or her data. Anonymization refers to the irreversible removal of the link between the individual and his or her medical record data to the degree that it would be virtually impossible to reestablish the link.
4 Why Are Such Strategies Important? HIPAA Privacy Rule regulations (2000) permits covered entities to use/disclose data that have been removed of patient identifiers without obtaining an authorization and without further restrictions on use/disclosure. There are 18 safe harbor data identifiers under the Rule that constitute the minimal set of removed identifiers. Use of data removed of patient identifiers is one of three options available to investigators desiring to use medical data in research, besides obtaining informed consent from their patients or a waiver of informed consent from their IRB.
5 Why Are Such Strategies Important? As the use of EHRs has progressively increased, concerns have been raised about their utility to fundamentally improve the quality of patient care and the threat of unauthorized disclosure of PHI either unintentionally or by identity theft. Additionally, biomedical research is becoming increasingly dependent on the access, sharing, and management of EHR among clinical and research centers, especially those involved in observational and multicenter research studies.
6 Database Sources For Review BIOSIS Previews (via Thomson Reuters Institute for Scientific Information [ISI] Web of Knowledge, 1926-present) CINAHL (Cumulative Index to Nursing and Allied Health Literature, via EBSCOhost, 1937-present) Inspec (via Thomson Reuters ISI Web of Knowledge, 1898-present) MEDLINE (Medical Literature Analysis and Retrieval System Online, 1950-present) SciVerse Scopus (1823-present) Web of Science (via Thomson Reuters ISI Web of Knowledge, 1898-present)
7 Key Words and Search Strategy Key Words: deidentify, de-identify, deidentification, de-identification, anonymize, anonymization, data scrubbing, and text scrubbing Articles were included if they were published up to June 30, 2011 and there was no restriction on earliest date of publication (i.e., earliest date obtained in search was 1996). Through the combined database search, 1798 prospective citations were identified
8 Search Strategy (cont.) The writing group chair conducted the review; however, five other members of the writing group independently reviewed the 120 full-text articles obtained after the abstracts review. Differences between the reviewers judgments regarding inclusion or exclusion of articles were resolved by discussion; consensus was required from all six reviewers. The full text of 120 articles were reviewed and resulted in a final sample of 45 articles that met inclusion criteria for review.
9 Flow Diagram of Search Results BIOSIS Previews N = 44 CINAHL N = 48 Inspec N = 420 MEDLINE N = 171 SciVerse Scopus N = 870 Web of Science N = 245 Exclusions Upon Citations Review N = 1532 Primary reasons for exclusion: Not relevant to topic Not relevant article type Duplicate citation Exclusions Upon Articles Review N = 75 Primary reasons for exclusion: Not relevant to topic De-identification or anonymization strategy lacked sufficient detail to understand or interpret it Combined Total Citations N = 1798 Abstracts Reviewed N = 267 Full-Text Articles Reviewed N = 94 Articles Meeting Criteria N = 45 Exclusions Upon Abstracts Review N = 173 Primary reasons for exclusion: Not relevant to topic Outside medical records domain Non-English language article Review of Additional Articles Extracted from References of Articles Obtained from Search N = 26
10 Case: De-Identification of Free Text Manual de-identification of PHI from free text in EHR can be tedious, costly, time-consuming, inaccurate, and unreliable. For example, resident clinicians can manually de-identify at a rate of about 18,000 words or 90 incidents of PHI per hour. The automated software package, deid, scans the medical notes line-byline, dividing them into individual words separated by whitespace deid identifies occurrences of PHI using dictionary-based look-ups and regular expressions deid replaces each PHI with a tag to indicate its corresponding category Neamatullah I, Douglass MM, Lehman LW, et al. Automated de-identification of free-text medical records. BMC Med Inform Decis Mak 2008;8:32.
11 Case: De-Identification of Free Text On a test corpus of 1,836 notes with 296,400 words, there was 90 instances of false negatives (missed PHI), or 27 per 100,000 word count, with a recall (sensitivity) of 94.3%. Only one full date and one age over 89 were missed. No patient names were missed. Neamatullah I, Douglass MM, Lehman LW, et al. Automated de-identification of free-text medical records. BMC Med Inform Decis Mak 2008;8:32.
12 Case: De-Identification of MR Images An automated defacing algorithm used models of non-brain structures to remove identifiable facial features from MR volumes of 342 T1- weighted datasets: o o o Did an effective job of removing facial features without sacrificing brain tissue (none removed) Could be performed relatively quickly (approximately 25 min on a dataset of 342) Did not interfere with subsequent data processing, and in some cases, improved the quality of subsequent automated skull-stripping by removing more non-brain tissue. Bischoff-Grethe A, Ozyurt IB, Busa E, et al. A technique for the deidentification of structural brain MR images. Hum Brain Mapp 2007;28:
13 Case: De-Identification of MR Images Bischoff-Grethe A, Ozyurt IB, Busa E, et al. A technique for the deidentification of structural brain MR images. Hum Brain Mapp 2007;28:
14 Case: De-Identification of Biosamples Furuta K, Yokozawa K, Takada T, et al. De-identification procedure and sample quality of the post-clinical test samples at the bio-repository of the National Cancer Center Hospital (NCCH) in Tokyo. Jpn J Clin Oncol 2011;41:
15 Case: De-Identification of Biosamples This repository contains approximately 250,000 samples with an average influx of 90,000 samples per year of which approximately 80% need to be de-identified. This process differs from data scrubbing patient identifiers on the physical sample since a tube transfer procedure is used for sample deidentification. This is a manual de-identification procedure that is subject to human error. Furuta K, Yokozawa K, Takada T, et al. De-identification procedure and sample quality of the post-clinical test samples at the bio-repository of the National Cancer Center Hospital (NCCH) in Tokyo. Jpn J Clin Oncol 2011;41:
16 Are Current De-ID Strategies Effective? Current de-identification strategies have impressive recall and precision rates. No existing system is perfect, and there is the possibility that certain PHI will not be de-identified. Limitations of many current systems include: o Inability to detect misspellings, typographical errors, and proper names that share characteristics with non-phi o Restrictions in managing only certain types of data; algorithms that are not designed to handle diverse PHI (e.g., hard-coded PHI in output files) o Difficulty in compensating for variation in nomenclature
17 Which Strategies Are Best? For heuristic, lexical, and pattern-based systems, studies evaluating these systems have reported good performance (especially precision) but experienced domain experts must spend significant time and effort. For statistical learning-based systems, they are able to be used out of the box with minimal redevelopment time and learn how to identify PHI from the data itself rather than relying on precompiled, manually-constructed sets of data.
18 Which Strategies Are Best? (cont.) For both images and biological samples, there are too few studies with a paucity of quantitative data to judge the best approach Biological samples have the added Common Rule anonymization requirements needed for IRB exemption that do not appear to be satisfactorily addressed by the current approaches.
19 How Essential is Anonymization? In theory, anonymization is important since it places the patient s or research participant s right to privacy as the top priority in any anticipated or unanticipated scenario, and dramatically minimizes the release of sensitive information that may discriminate or stigmatize the individual from a social or economic perspective. In practice, it still may be possible to identify an individual from supposedly anonymized data sets, especially with respect to rare diseases within a specific geographical area.
20 Do De-ID Strategies Alone Meet the Needs of Multicenter Research Studies? Besides the de-identification of individual documents, what can be done to ensure the privacy of data sets? What approaches can be used on a multicenter level to ensure patient or participant privacy?
21 What Approaches Can Be Used on a Multicenter Level to Ensure Privacy? De-identification and anonymization strategies are important, but are one component of an integrated data collection and management system. Some institutions use honest brokers, which collect and provide data to research investigators in a manner whereby it would not be reasonably possible for investigators to identify the participants directly or indirectly.
22 Further Work Management of identifiers for the protection of genetic information, particularly with respect to protecting the privacy of identities to which DNA sequences were derived. This area of genomic privacy is particularly challenging for the biomedical community, given the immense quantity of data that needs to be processed, stored, and shared, as well as the consequences that identifying genomic data may have on an individual s health, employment, and insurance status.
23 Acknowledgements Deborah A. Nichols, M.S., Stanford University Rik Jadrnicek, Microflow DBMS Inc. Ric Miller, Microflow DBMS Inc. James K. Walsh, Ph.D., Sleep Medicine and Research Center, Chesterfield, MO Kara Griffin, Sleep Medicine and Research Center, Chesterfield, MO Pamela R. Hyde, M.A., Stanford University AcademyHealth Gurvaneet Randhawa, M.D., MPH and AHRQ Funding was provided by a contract from AcademyHealth. Additional funding was provided by AHRQ 1R01HS1973 (Comparative Outcomes Management with Electronic Data Technology (COMET) Study).
A Method for Automatic De-identification of Medical Records
A Method for Automatic De-identification of Medical Records Arya Tafvizi MIT CSAIL Cambridge, MA 0239, USA [email protected] Maciej Pacula MIT CSAIL Cambridge, MA 0239, USA [email protected] Abstract
Implementing Honest Broker System(s) in Academic Medical Centers: The Pittsburgh Experience
Implementing Honest Broker System(s) in Academic Medical Centers: The Pittsburgh Experience Christopher Ryan, Ph.D., CIP IRB Director Professor of Psychiatry University of Pittsburgh [email protected] The
Biobanks: DNA and Research
f r o m b i r t h to death a n d b e n c h to clinic THE HASTINGS CENTER Bioethics Briefing Book for Journalists, Policymakers, and Campaigns Chapter 3 Biobanks: DNA and Research Karen J. Maschke, Biobanks:
RESEARCH INVOLVING DATA AND/OR BIOLOGICAL SPECIMENS
RESEARCH INVOLVING DATA AND/OR BIOLOGICAL SPECIMENS 1. Overview IRB approval and participant informed consent are required to collect biological specimens for research purposes. Similarly, IRB approval
A Commercial Approach to De-Identification Dan Wasserstrom, Founder and Chairman De-ID Data Corp, LLC
A Commercial Approach to De-Identification Dan Wasserstrom, Founder and Chairman De-ID Data Corp, LLC De-ID Data Corp, LLC Founded to: ENHANCE DATA ACCESS WHILE PROTECTING PATIENT PRIVACY Founders Problem
Automated Tool for Anonymization of Patient Records
Automated Tool for Anonymization of Patient Records Nikita Raaj MSc Computing and Management 2011/2012 The candidate confirms that the work submitted is their own and the appropriate credit has been given
Degrees of De-identification of Clinical Research Data
Vol. 7, No. 11, November 2011 Can You Handle the Truth? Degrees of De-identification of Clinical Research Data By Jeanne M. Mattern Two sets of U.S. government regulations govern the protection of personal
The Use of Patient Records (EHR) for Research
The Use of Patient Records (EHR) for Research Mary Devereaux, Ph.D. Director, Biomedical Ethics Seminars Assistant Director, Research Ethics Program & San Diego Research Ethics Consortium Abstract The
Issues with Tissues. Bertha delanda Celia Molvin/Kevin Murphy Research Compliance Office Stanford University
Issues with Tissues Bertha delanda Celia Molvin/Kevin Murphy Office Stanford University What are Tissues? Organic material removed from a living individual. Including biological samples For example, Blood
Application for an Off-Site Tissue Banking Waiver at a Non-Profit or Academic Institution
Application for an Off-Site Tissue Banking Waiver at a Non-Profit or Academic Institution INSTRUCTIONS This form may be filled in and saved using Adobe Reader version 7.0 or higher. The full version of
HIPAA Basics for Clinical Research
HIPAA Basics for Clinical Research Audio options: Built-in audio on your computer OR Separate audio dial-in: 415-930-5229 Toll-free: 1-877-309-2074 Access Code: 960-353-248 Audio PIN: Shown after joining
Combining structured data with machine learning to improve clinical text de-identification
Combining structured data with machine learning to improve clinical text de-identification DT Tran Scott Halgrim David Carrell Group Health Research Institute Clinical text contains Personally identifiable
Secondary Use of Healthcare Data for Public Health. Leslie Lenert, MD, MS FACMI Director, National Center for Public Health Informatics
Secondary Use of Healthcare Data for Public Health Leslie Lenert, MD, MS FACMI Director, National Center for Public Health Informatics NCPHI Overview Agenda Three disparate secondary uses of clinical data
How to De-identify Data. Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008
How to De-identify Data Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008 1 Outline The problem Brief history The solutions Examples with SAS and R code 2 Background The adoption
What is Covered under the Privacy Rule? Protected Health Information (PHI)
HIPAA & RESEARCH What is Covered under the Privacy Rule? Protected Health Information (PHI) Health information + Identifier = PHI Transmitted or maintained in any form (paper, electronic, forms, web-based,
Integrating Public and Private Medical Texts for Patient De-Identification with Apache ctakes
Integrating Public and Private Medical Texts for Patient De-Identification with Apache ctakes Presented By: Andrew McMurry & Britt Fitch (Apache ctakes committers) Co-authors: Guergana Savova, Ben Reis,
I. INTRODUCTION DEFINITIONS AND GENERAL PRINCIPLE
Final: Approved by Partners Professional and Institutional Conduct Committee 8/11/04 Policy on Transfers to Third Parties Of Tissues, Other Specimens, and Data Obtained by Partners-Affiliated Providers
The Ethics of Research with Stored Samples and Data
The Ethics of Research with Stored Samples and Data Sara Chandros Hull, Ph.D. Office of the Clinical Director, NHGRI and Department of Bioethics National Institutes of Health Disclaimers/Disclosures No
HIPAA: Open Research Issues Michael L. Blau, Esq. McDermott, Will & Emery
HIPAA: Open Research Issues Michael L. Blau, Esq. McDermott, Will & Emery Research A. General Rules. There are four pathways for covered entities ( CEs ) to obtain permission under the Health Insurance
The Big Data Bioinformatics System
The Big Data Bioinformatics System Introduction The purpose of this document is to describe a fictitious bioinformatics research system based in part on the design and implementation of a similar system
AHRQ S Perspective On Clinical Utility. Gurvaneet Randhawa, MD, MPH Medical Officer, Senior Advisor on Clinical Genomics and Personalized Medicine
AHRQ S Perspective On Clinical Utility Gurvaneet Randhawa, MD, MPH Medical Officer, Senior Advisor on Clinical Genomics and Personalized Medicine Outline Background AHRQ activities Background Large gaps
i2b2 Clinical Research Chart
i2b2 Clinical Research Chart Shawn Murphy MD, Ph.D. Griffin Weber MD, Ph.D. Michael Mendis Vivian Gainer MS Lori Phillips MS Rajesh Kuttan Wensong Pan MS Henry Chueh MD Susanne Churchill Ph.D. John Glaser
Societal benefits vs. privacy: what distributed secure multi-party computation enable? Research ehelse 2015 21-22 April Oslo
Privacy Societal benefits vs. privacy: what distributed secure multi-party computation enable? Research ehelse 2015 21-22 April Oslo Kassaye Yitbarek Yigzaw UiT The Arctic University of Norway Outline
Health Insurance Portability & Accountability Act (HIPAA) Compliance Application
Health Insurance Portability & Accountability Act (HIPAA) Compliance Application IRB Office 101 - Altru Psychiatry Center 860 S. Columbia Rd, Grand Forks, North Dakota 58201 Phone: (701) 780-6161 PROJECT
IRB REVIEW OF USE OF RESEARCH REPOSITORIES
IRB Review of Research Data Repositories at the Portland VA Medical Center IRB REVIEW OF USE OF RESEARCH REPOSITORIES 1. PURPOSE: To set policies and procedures for appropriate establishment, review, approval,
How Can Institutions Foster OMICS Research While Protecting Patients?
IOM Workshop on the Review of Omics-Based Tests for Predicting Patient Outcomes in Clinical Trials How Can Institutions Foster OMICS Research While Protecting Patients? E. Albert Reece, MD, PhD, MBA Vice
What is Covered by HIPAA at VCU?
What is Covered by HIPAA at VCU? The Privacy Rule was designed to protect private health information from incidental disclosures. The regulations specifically apply to health care providers, health plans,
Use of Electronic Health Records in Clinical Research: Core Research Data Element Exchange Detailed Use Case April 23 rd, 2009
Use of Electronic Health Records in Clinical Research: Core Research Data Element Exchange Detailed Use Case April 23 rd, 2009 Table of Contents 1.0 Preface...4 2.0 Introduction and Scope...6 3.0 Use Case
Genomics and Health Data Standards: Lessons from the Past and Present for a Genome-enabled Future
Genomics and Health Data Standards: Lessons from the Past and Present for a Genome-enabled Future Daniel Masys, MD Professor and Chair Department of Biomedical Informatics Professor of Medicine Vanderbilt
Policy Brief: Protecting Privacy in Cloud-Based Genomic Research
Policy Brief: Protecting Privacy in Cloud-Based Genomic Research Version 1.0 July 21 st, 2015 Suggested Citation: Adrian Thorogood, Howard Simkevitz, Mark Phillips, Edward S Dove & Yann Joly, Policy Brief:
De-identification Koans. ICTR Data Managers Darren Lacey January 15, 2013
De-identification Koans ICTR Data Managers Darren Lacey January 15, 2013 Disclaimer There are several efforts addressing this issue in whole or part Over the next year or so, I believe that the conversation
Agenda. Today s session will look at the following... Ovid Open Access What is it? The Content What are the sources behind Ovid Open Access?
Slide 1 Agenda Today s session will look at the following... Ovid Open Access What is it? The Content What are the sources behind Ovid Open Access? A Trainer s View Some hidden benefits of Ovid Open Access
Memorandum. Factual Background
Memorandum TO: FROM: SUBJECT: Chris Ianelli and Jill Mullan, ispecimen, Inc. Kristen Rosati and Ana Christian, Polsinelli, PC ispecimen Regulatory Compliance DATE: January 26, 2014 You have asked us to
National Nursing Informatics Deep Dive Program
National Nursing Informatics Deep Dive Program What is Nursing Informatics and Why is it Important? Connie White Delaney, PhD, RN, FAAN, FACMI Dean and Professor, School of Nursing Director, Clinical and
HIPAA-Compliant Research Access to PHI
HIPAA-Compliant Research Access to PHI HIPAA permits the access, disclosure and use of PHI from a HIPAA Covered Entity s or HIPAA Covered Unit s treatment, payment or health care operations records for
Medical Informatics An Overview Saudi Board For Community Medicine
Medical Informatics An Overview Saudi Board For Community Medicine Ahmed AlBarrak PhD Medical Informatics Associate Professor of Health Informatics, Family & Community Med, Chairman, Medical Informatics,
Data Privacy and Biomedicine Syllabus - Page 1 of 6
Data Privacy and Biomedicine Syllabus - Page 1 of 6 Course: Data Privacy in Biomedicine (BMIF-380 / CS-396) Instructor: Bradley Malin, Ph.D. ([email protected]) Semester: Spring 2015 Time: Mondays
#Aim2Innovate. Share session insights and questions socially. Genomics, Precision Medicine and the EHR 6/17/2015
Genomics, Precision Medicine and the EHR Making Genomics part of everyday practice Andrew Ury, M.D. CEO and founder, ActX, Inc. June 17, 2015 DISCLAIMER: The views and opinions expressed in this presentation
From Fishing to Attracting Chicks
The Greater Plains Collaborative: a PCORNet Clinical Data Research Network s Strategies for Creating an Interoperable Architecture From Fishing to Attracting Chicks Russ Waitman, PhD Associate Professor,
SESSION DEPENDENT DE-IDENTIFICATION OF ELECTRONIC MEDICAL RECORDS
SESSION DEPENDENT DE-IDENTIFICATION OF ELECTRONIC MEDICAL RECORDS A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Bachelor of Science with Honors Research Distinction in Electrical
Abstract. It s peace of mind knowing that we ve done everything that is possible to meet industry standards for de-identification. Dr.
Abstract In this presentation I will discuss the adoption of the Privacy Analytics Risk Assessment Tool (PARAT) by the Institute for Clinical Evaluative Sciences (ICES), for the Ontario Cancer Data Linkage
If you are signing for a minor child, you refers to your child throughout the consent document.
CONSENT TO PARTICIPATE IN A CLINICAL RESEARCH STUDY Adult Patient or Parent, for Minor Patient INSTITUTE: National Cancer Institute PRINCIPAL INVESTIGATOR: Raffit Hassan, M.D. STUDY TITLE: Tissue Procurement
Winthrop-University Hospital
Winthrop-University Hospital Use of Patient Information in the Conduct of Research Activities In accordance with 45 CFR 164.512(i), 164.512(a-c) and in connection with the implementation of the HIPAA Compliance
Legal and Policy Challenges to Secondary Uses of Information from Electronic Clinical Health Records
Legal and Policy Challenges to Secondary Uses of Information from Electronic Clinical Health Records The Health IT for Actionable Knowledge project examines the experiences of six large health care systems
Clinical Study Reports Approach to Protection of Personal Data
Clinical Study Reports Approach to Protection of Personal Data Background TransCelerate BioPharma Inc. is a non-profit organization of biopharmaceutical companies focused on advancing innovation in research
Master of Bioethics Degree Program
Master of Bioethics Degree Program Offered as a full-time (one-year) or part-time (two-year) course of study This degree program, offered by the Center for Bioethics at Harvard Medical School, offers education,
Enhancing Functionality of EHRs for Genomic Research, Including E- Phenotying, Integrating Genomic Data, Transportable CDS, Privacy Threats
Enhancing Functionality of EHRs for Genomic Research, Including E- Phenotying, Integrating Genomic Data, Transportable CDS, Privacy Threats Genomic Medicine 8 meeting Alexa McCray Christopher G Chute Rex
THE HIPAA PRIVACY RULE AND THE NATIONAL HOSPITAL CARE SURVEY
THE HIPAA PRIVACY RULE AND THE NATIONAL HOSPITAL CARE SURVEY Table of Contents I. Overview... 3 II. Legal Authority for NHCS... 3 III. Requirements of the HIPAA Privacy Rule... 3 IV. Extra Safeguards and
Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman,
Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman, Department of Biomedical Informatics Vanderbilt University School
The De-identification of Personally Identifiable Information
The De-identification of Personally Identifiable Information Khaled El Emam (PhD) www.privacyanalytics.ca 855.686.4781 [email protected] 251 Laurier Avenue W, Suite 200 Ottawa, ON Canada K1P 5J6
HIPAA COMPLIANCE INFORMATION. HIPAA Policy
HIPAA COMPLIANCE INFORMATION HIPAA Policy Use of Protected Health Information for Research Policy University of North Texas Health Science Center at Fort Worth Applicability: All University of North Texas
NOTICE OF PRIVACY PRACTICES
THE PHYSICIAN PRACTICE, P.A. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW
A Comparison of Hemorrhagic and Ischemic Strokes among Blacks and Whites:
A Comparison of Hemorrhagic and Ischemic Strokes among Blacks and Whites: A Population-Based Study That Will Demonstrate Issues Surrounding EHR Access and Research Brett Kissela, MD, MS Professor Vice-Chair
Standard Operating Procedures for Research Involving Human Subjects
Section I: Introduction v07/2015 Standard Operating Procedures Indiana University and its affiliates are dedicated to protecting the rights and welfare of human participants recruited to participate in
Connecting Basic Research and Healthcare Big Data
Elsevier Health Analytics WHS 2015 Big Data in Health Connecting Basic Research and Healthcare Big Data Olaf Lodbrok Managing Director Elsevier Health Analytics [email protected] t +49 89 5383 600
Research Involving Human Biological Materials: Ethical Issues and Policy Guidance Executive Summary
Research Involving Human Biological Materials: Ethical Issues and Policy Guidance Executive Summary Introduction Biomedical researchers have long studied human biological materials such as cells collected
IRB Policy for Security and Integrity of Human Research Data
IRB Policy for Security and Integrity of Human Research Data Kathleen Hay Human Subjects Protection Office Terri Shkuda Research Informatics & Computing, Information Technology Overview of Presentation
EMR Systems and the Conduct of Clinical Research. Daniel E Ford, MD, MPH Vice Dean for Clinical Investigation Johns Hopkins School of Medicine
EMR Systems and the Conduct of Clinical Research Daniel E Ford, MD, MPH Vice Dean for Clinical Investigation Johns Hopkins School of Medicine Clinical Research Environment Research protocols are becoming
Guidance on Withdrawal of Subjects from Research: Data Retention and Other Related Issues
Office for Human Research Protections (OHRP) Department of Health and Human Services (HHS) Guidance on Withdrawal of Subjects from Research: Data Retention and Other Related Issues This guidance represents
(2) The neurological surgeon shall not participate in any activity, which is not in the best interest of the patient.
AANS Code of Ethics a) General Statement of Purpose The American Association of Neurological Surgeons has established a Code of Ethics for neurological surgeons as guidelines in medical, social, and professional
PPInterFinder A Web Server for Mining Human Protein Protein Interaction
PPInterFinder A Web Server for Mining Human Protein Protein Interaction Kalpana Raja, Suresh Subramani, Jeyakumar Natarajan Data Mining and Text Mining Laboratory, Department of Bioinformatics, Bharathiar
Digital Health: Catapulting Personalised Medicine Forward STRATIFIED MEDICINE
Digital Health: Catapulting Personalised Medicine Forward STRATIFIED MEDICINE CRUK Stratified Medicine Initiative Somatic mutation testing for prediction of treatment response in patients with solid tumours:
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
HIPAA Compliance Strategies for Pharmaceutical Manufacturers,
HIPAA Compliance Strategies for Pharmaceutical Manufacturers, PBMs and Pharmacies Jean-Paul Hepp,, Ph.D. Director, Global Privacy HIPAA Colloquium Harvard MA; August 22, 2002 1 Agenda Privacy ~ Definitions
ADVANCING MEASUREMENT OF PATIENT- CENTERED OUTCOMES AND QUALITY METRICS WITH ELECTRONIC HEALTH RECORDS
ADVANCING MEASUREMENT OF PATIENT- CENTERED OUTCOMES AND QUALITY METRICS WITH ELECTRONIC HEALTH RECORDS Tina Hernandez-Boussard, PhD, MPH, MS Director, Surgical Health Services Research Unit Assistant Professor
NIH Genomic Data Sharing (GDS) Policy Guidance Memo #2 1
MEMORANDUM TO: Principal Investigators and Research Staff DATE: 2/22/15 FROM: Anne Klibanski, MD, Partners Chief Academic Officer (CAO) Paul Anderson, MD, PhD, BWH CAO Harry Orf, PhD, MGH Sr. Vice President-Research
