Research Commons
      • Browse 
        • Communities & Collections
        • Titles
        • Authors
        • By Issue Date
        • Subjects
        • Types
        • Series
      • Help 
        • About
        • Collection Policy
        • OA Mandate Guidelines
        • Guidelines FAQ
        • Contact Us
      • My Account 
        • Sign In
        • Register
      View Item 
      •   Research Commons
      • University of Waikato Research
      • Computing and Mathematical Sciences
      • Computing and Mathematical Sciences Papers
      • View Item
      •   Research Commons
      • University of Waikato Research
      • Computing and Mathematical Sciences
      • Computing and Mathematical Sciences Papers
      • View Item
      JavaScript is disabled for your browser. Some features of this site may not work without it.

      Research using electronic health records: not all de-identified datasets are created equal

      Yogarajan, Vithya; Ragupathy, Rajan
      Thumbnail
      Files
      Letter to the editor HC19010.pdf
      Published version, 411.5Kb
      DOI
       10.1071/hc19010
      Find in your library  
      Citation
      Export citation
      Yogarajan, V., & Ragupathy, R. (2019). Research using electronic health records: not all de-identified datasets are created equal. Journal of Primary Health Care, 11(1), 14–15. https://doi.org/10.1071/hc19010
      Permanent Research Commons link: https://hdl.handle.net/10289/12455
      Abstract
      We read the article Research using electronic health records: balancing confidentiality and public good by Wallis et al. with great interest. The authors note general practices need to trust de-identification processes when releasing patient records.¹ Patients have also expressed concerns about de-identification practices.² De-identification encompasses a wide range of practices, and there are no universally accepted standards.²,³ We propose here a three-step scheme for judging de-identified health records: (1) the de-identification standards used (2) the performance of the de-identification system and (3) additional security measures taken to prevent re-identification. Such a scheme may be useful to ethics committees, researchers planning a project and health providers deciding whether to participate.
      Date
      2019
      Type
      Journal Article
      Publisher
      CSIRO Publishing
      Rights
      This is an open access article licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
      Collections
      • Computing and Mathematical Sciences Papers [1452]
      Show full item record  

      Usage

      Downloads, last 12 months
      79
       
       
       

      Usage Statistics

      For this itemFor all of Research Commons

      The University of Waikato - Te Whare Wānanga o WaikatoFeedback and RequestsCopyright and Legal Statement