POLICY. Create a governance process to manage requests to extract de- identified data from the Information Exchange (IE).

Similar documents
Introduction/Instructions

HIPAA and HIPAA Compliance with PHI/PII in Research

HIPAA and Research Contracts JILL RAINES, ASSISTANT GENERAL COUNSEL AND UNIVERSITY PRIVACY OFFICIAL

EXAMPLE 3-JOINT PRIVACY AND SECURITY CHECKLIST

EXAMPLE 2-JOINT PRIVACY AND SECURITY CHECKLIST

University of Mississippi Medical Center Data Use Agreement Protected Health Information

Universal Patient Key

Security Overview. Joseph Balberde North Country Community Mental Health Information Technology Director

Privacy Preserving Data Mining: An approach to safely share and use sensible medical data

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014

Best Practices. Contents. Meridian Technologies 5210 Belfort Rd, Suite 400 Jacksonville, FL Meridiantechnologies.net

HIPAA 101: What All Doctors NEED To Know

HIPAA and Social Media and other PHI Safeguards. Presented by the UAMS HIPAA Office August 2016 William Dobbins

ZIPpy Safe Harbor De-Identification Macros

HIPAA Federal Security Rule H I P A A

Overview of Datavant's De-Identification and Linking Technology for Structured Data

After. you scanned. Apply. 4. When the

Attachment B Newtopia Wellness Program and Genetic Testing. The Health Risk Assessment also invites individuals to undergo genetic testing.

Mobile security: Tips and tricks for securing your iphone, Android and other mobile devices

Data Governance & Classification Policy A Data Classification and Data Types

Health Analytic Group. Research Data Management

University of Wisconsin-Madison Policy and Procedure

HIDE: Privacy Preserving Medical Data Publishing. James Gardner Department of Mathematics and Computer Science Emory University

TIES Usage Policies. for University of Pittsburgh. Authors. University of Pittsburgh

ENCRYPTED . Copyright UT Health 1

Abstract & Implementation

Basic User Guide Created by: REDCap Admins 1 P a g e Last Modified: 10/10/2017

Privacy and Security for the Medical Student. HIPAA Compliance Audit and Compliance Services Mount Sinai Health System

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By:

An introduction to the basics

Banner Health Information Security and Privacy Training Team. Morgan Raimo Paul Lockwood

Privacy and Security Update: What Clinical Researchers Must Know

TB Surveillance & Control

If this is your first time submitting a protocol for review, see FAQs for information to consider beforehand.

Privacy by Design: Product Development Guidelines for Engineers & Product Managers. Purpose:

HIPAA & RESEARCH DATA SECURITY FOR BU RESEARCHERS CHARLES RIVER CAMPUS. November 14, 2017

icare s Provider Portal Guide

Dealing with Sensitive Data: Helping You Protect You

Dealing with Sensitive Data: Helping You Protect You

Beam Technologies Inc. Privacy Policy

Module 2: Health Information Exchange Services

Objectives. Overview of Data Management Tools. Review of available database and data management tools and their capabilities

Covisint DocSite Enterprise

Patient Right Access to PHI Understanding Recent OCR Guidance. Sondra Hornsey, CHC, CHPC HIPAA Privacy Officer, Washington University March 31, 2016

RETAIL PRODUCER PORTAL

Health Information Privacy Education in Healthcare Organizations

TB Testing. User s Manual

Subject Area Data Element Examples Earliest Date Patient Demographics Race, primary language, mortality 2000 Encounters

Administrative Manual

AHC IE Data Shelter User Guide

Georgia Low THC Oil Registry Physicians Request for Card Users Guide

Admission Process: Module 1.3

ONLINE PRE-CERTIFCATION PORTAL ONLINE PRE-CERTIFCATION PORTAL

Institutional Review Board. Application for Research Using Humans

Provider User Guides

i2b2 User Guide University of Minnesota Clinical and Translational Science Institute

Texas Home Living. Provider User Guide. HHSC Enterprise IT Project Office. March 2006

Cite: CTSA NIH Grant UL1- RR024982

EHR Connectivity Integration Specification

Provider Secure Portal User Manual

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

[Utility Name] Identity Theft Prevention Program

Red Flags Program. Purpose

Information Classification & Protection Policy

Bluestone Bridge Family User Guide Desktop-Version 2.0

IRBManager Quick Start Guide INITIAL APPLICATION - OVERVIEW

Student Information System User Guide

HIPAA ( ) HIPAA 2017 Compliancy Group, LLC

Provider Portal User Guide. For the Provider Portal External Use

Patient Registration

Table of Contents. Page 1 of 51

Rhode Island Medicaid Provider Enrollment User Guide. Executive Office of Health and Human Services Medicaid

DEPAUW UNIVERSITY DATA CLASSIFICATION POLICY AND HANDLING RECOMMENDATIONS ( )

Compliance & HIPAA Annual Education

Quoting Instructions for Connexion Group Quote

Guidelines for Completing the Residential Claim Form

HL7 v2.5 Inbound OMP (Medications) Specification Version 1.0

SHARES 837P Companion Guide

PROVIDER WEBSITE SITE ADMINISTRATOR GUIDE » PATIENT INQUIRY» CLAIM CENTER» FIND A DOCTOR» CLAIMS EDITING SYSTEM (CES)

New Beginnings Long-Term Treatment Program

U.S. Private-sector Privacy Certification

Protected Environment at CHPC

Protected Environment at CHPC

User Guide. Version 3.0. Revision Date: 11-Feb Esoterix, Inc., All Rights Reserved

Vendor Inquiry and Reports Munis Version 11.2

Information Technology Update

Universal Health Record Patient Access v17.3 User Guide

Service Locator: Create/Update an Illinois worknet Partner Site August 2017 v8 FINAL

Interoperability. Doug Fridsma, MD PhD President & CEO, AMIA

Integrated MS-DRG Grouper & Calculator Printable How To Guide

University Hospitals UH Personal Health Record User Guide

Mayo Clinic CareLink Quick Start Guide. May 5, 2018

Applying E-Consent to Studies. Presenters: Haemar Kin, MHA, Melissa Scotti, PhD, Lara Lechtenberg, MPH

Last four digits of the Social Security Number (SSN) match probability increases with submission of a full ID number

Pennsylvania Certification by Endorsement

SnapSite Online Quick Start Guide

PRIVACY STATEMENT. Effective Date 11/01/17.

Identity Theft Prevention Program. Effective beginning August 1, 2009

Completing the CMS-2728 Form

SECTION 2: PROGRAM IDENTIFICATION

Transcription:

Academic Health Center Office of Biomedical Health Informatics POLICY Extraction of De- Identifiable Data from the Information Exchange Approved Proposal Purpose Create a governance process to manage requests to extract de- identified data from the Information Exchange (IE). Background Several use cases have been identified that require the extraction of de- identified data from the IE. Those cases are categorized as follows: 1) extraction required to use computational power or applications not available within the IE, or 2) extraction required to share with other data (either on a local or national basis). To create efficiencies and better serve our PIs, we propose a process to govern these requests that would not require approval by the Executive Leadership Committee for each individual request. The process would be limited to allow extraction of de- identified data only for the use cases described above. Process Requirements 1. Extraction Requirements Requester must be an IE Authorized User (must have x500 id, have completed HIPAA training, and have IRB approval or waiver of approval). The extraction must be required to 1) use computational power or applications not available in the IE, or 2) share with other data. If the extraction is for any other purpose, 1

the request must be forwarded to the Executive Leadership Committee for approval on an individual basis. Data will be de- identified according to the AHC IS process. This process meets requirements under HIPAA for de- identification of data. See attached for details of this process. 2. Evaluation and Oversight Requests for data extractions will be tracked as part of the overall data request process. Information tracked includes all data fields entered for the request, as well as total number of requests, categories of request (computation, data sharing), and number of requests fulfilled. Reporting on data extractions will be available to the data stewards of Fairview, UMP and UMN on demand through AHC- IS. 3. Data Request Form Modifications The current request form to request data will be modified to support this process. Expected changes to the request form will likely include adding fields to support additional information on: 1) the need for the extraction of de- identified data (pull- downs will likely be added for needs related to computational power, other applications and sharing with other data, along with a free form response field to provide additional information or to describe another need) 2) how the data will be handled after extraction, including who will have access to the data, where the data will be stored, how it will be secured, and when it will be disposed of 2

AHC IE De- Identification Process This document outlines the approach taken by AHC IE developers for data de- - - identification of clinical data sets. According to HHS Guidance, de- - - identification can be obtained through either Expert Determination or through Safe Harbor by suppressing the 18 HIPAA identifiers. http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/de- identification/guidance.html#standard. AHC IE has chosen to use the Safe Harbor definition and will suppress all 18 HIPAA identifiers: 1. Names (see Names) 2. All geographical subdivisions smaller than a state, including street address, city, county, precinct, zip code (see Zip Codes.), and their equivalent geographical codes. 3. All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date and date of death. (see Dates) 4. Telephone Numbers 5. Email addresses 6. Fax numbers 7. SSNs 8. MRNs 9. Health plan beneficiary numbers 10. Account numbers 11. Certificate/License numbers 12. Vehicle identifiers and serial numbers, including license plate numbers 13. Device identifiers and serial numbers 14. URLs 15. IP addresses 16. Biometric identifiers, including finger and voice prints 17. Full- - - face photographs and any comparable images 3

Names 18. Any other unique identifying number, characteristic, or code, unless otherwise permitted by the Privacy Rule for re- - - identification Only names of the individuals associated with the corresponding health information (i.e., the subjects of the records) and of their relatives, employers, and household members will be suppressed. There is no explicit requirement to remove the names of providers or workforce members of the covered entity or business associate. http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/de- - - identification/guidance.html#supress Zip Codes We will supply the first three digits of a patient s zip code. However, to produce a de- identified data set utilizing the safe harbor method, all three digit zip codes with a population of 20,000 or fewer persons must have the zip code changed to 000. According to 2010 Census data, the following three- - - digit zip codes must be set to 000: 036, 059, 102, 202, 203, 204, 205, 369, 556, 692, 753, 772, 821, 823, 878, 879, 884, and 893. http://www.census.gov/geo/maps- - - data/data/gazetteer2010.html Pseudo identifiers Pseudo identifiers are generated for each unique patient and service record. This is done so the de- identified data can be linked back to the identifiable patient information if needed and allowed. The pseudo IDs are randomly generated for each request/patient/visit. The relationship to the real patient ID and visit ID are stored in a database table only accessible by AHC IE developers (table 1). Table 1 - - - Example REQUEST_ID ID_TYPE SRC_ID NEW_ID REQ23 MRN 000000123 REQ23- - - 8989 REQ23 VISIT 333329200 REQ23- - - 930094 REQ24 MRN 000000123 REQ24- - - 1092 REQ24 VISIT 333329200 REQ24- - - 739221 Dates 4

If birth date, death date, or any service related dates (e.g. admit date, discharge date, appointment date, order date, result date, diagnosis date) are requested, each date will be offset by +/- 30 days. This offset, or seed, is randomly generated for each patient within the request. All dates are shifted by the same seed so relative time is maintained for the patient throughout the data set. The date shift will only be applied to the date, not the timestamp. Timestamps maintain their original values. The date shift seed is stored within a database table only accessible by AHC IE developers. Table 2 - - - Example REQUEST_ID PAT_ID DATE_SHIFT_SEED REQ23 REQ23- - - 8989-4 REQ23 REQ23- - - 3112 11 REQ24 REQ24- - - 1092 22 REQ24 REQ24- - - 9039-30 Birth date AHC IE developers will flag all patients who are of the age 89 (and over) at the point in time the original query is executed (+ 30 days). All of those patients will then be applied the same birthdate which will be - 89 years from the date the query is executed. Available Clinical Data Clinical data values such as vital signs, labs, medications, procedures, and clinic/hospital location are available within a de- identified dataset. However, the AHC IE does not have the software in place that would be needed to de- identify free text such as clinical notes and patient social history notes. Therefore, until such a system is in place, we will not provide free text clinical data as part of de- - identified datasets. Delivery The most common format for the data output is Excel spreadsheets. The spreadsheet will be delivered to the end user(s) via the AHC IE Data Shelter. A copy of the original data set will be maintained within an AHC IE file share that is only accessible by AHC IE developers and system administrators. Final output must contain more than 10 patient records to be delivered. 5