<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8">
</head>
<body bgcolor="#FFFFFF" text="#000000">
Team,<br>
<br>
Please refer to the following regarding <span style="background:
white none repeat scroll 0% 0%;">pseudonymizatio</span>n and
de-identification in healthcare:<br>
<ul>
<li><a
href="https://www.iso.org/obp/ui/#iso:std:iso:ts:25237:ed-1:v1:en">ISO/TS
25237:2008 <span style="background: white none repeat scroll
0% 0%;">Health informatics—Pseudonymization</span></a><span
style="background: white none repeat scroll 0% 0%;"> (summary
web page)</span></li>
<li><span style="background: white none repeat scroll 0% 0%;"><a
href="http://www.ihe.net/uploadedFiles/Documents/ITI/IHE_ITI_Handbook_De-Identification_Rev1.1_2014-06-06.pdf">IHE
IT Infrastructure Handbook- De-Identification</a> (full
document, PDF, harmonized with ISO/TS 25237)</span></li>
<ul>
<li><a
href="http://www.ihe.net/uploadedFiles/Documents/ITI/IHE_ITI_Handbook_De-Identification-Mapping_Rev1.1_2014-06-06.xlsx"
title="Algorithm Mapping Spreadsheet (for use with
De-Identification Handbook)">Algorithm Mapping Spreadsheet </a>(for
use with IHE De-Identification Handbook)</li>
</ul>
</ul>
The technical implementation of pseudonymization and
re-identification is outside of our use case, other than to mention
that is is done.<br>
<br>
Glen<br>
<br>
<div class="moz-signature">-- <br>
<p><b>Glen F. Marshall</b><br>
Consultant<br>
Security Risk Solutions, Inc.<br>
698 Fishermans Bend<br>
Mount Pleasant, SC 29464<br>
Tel: (610) 644-2452<br>
Mobile: (610) 613-3084<br>
<a class="moz-txt-link-abbreviated" href="mailto:gfm@securityrs.com">gfm@securityrs.com</a><br>
<a class="moz-txt-link-abbreviated" href="http://www.SecurityRiskSolutions.com">www.SecurityRiskSolutions.com</a></p>
</div>
</body>
</html>