ImageVerifierCode 换一换
格式:PDF , 页数:69 ,大小:4.39MB ,
资源ID:682694      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-682694.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(DIN EN ISO 25237-2017 Health informatics - Pseudonymization (ISO 25237 2017) German version EN ISO 25237 2017《健康信息学 拟匿名化(ISO 25237-2017) 德文版本EN ISO 25237-2017》.pdf)为本站会员(twoload295)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

DIN EN ISO 25237-2017 Health informatics - Pseudonymization (ISO 25237 2017) German version EN ISO 25237 2017《健康信息学 拟匿名化(ISO 25237-2017) 德文版本EN ISO 25237-2017》.pdf

1、May 2017 English price group 26No part of this translation may be reproduced without prior permission ofDIN Deutsches Institut fr Normung e. V., Berlin. Beuth Verlag GmbH, 10772 Berlin, Germany,has the exclusive right of sale for German Standards (DIN-Normen).ICS 35.240.80!%eAt“2663081www.din.deDIN

2、EN ISO 25237Health informatics Pseudonymization (ISO 25237:2017);English version EN ISO 25237:2017,English translation of DIN EN ISO 25237:2017-05Medizinische Informatik Pseudonymisierung (ISO 25237:2017);Englische Fassung EN ISO 25237:2017,Englische bersetzung von DIN EN ISO 25237:2017-05Informatiq

3、ue de sant Pseudonymisation (ISO 25237:2017);Version anglaise EN ISO 25237:2017,Traduction anglaise de DIN EN ISO 25237:2017-05www.beuth.deDocument comprises 69 pagesDTranslation by DIN-Sprachendienst.In case of doubt, the German-language original shall be considered authoritative.05.17 DIN EN ISO 2

4、5237:2017-05 2 A comma is used as the decimal marker. National foreword This document (EN ISO 25237:2017) has been prepared by Technical Committee ISO/TC 215 “Health informatics” (Secretariat: ANSI, USA) with the active participation of German experts in collaboration with Technical Committee CEN/TC

5、 251 “Health informatics” (Secretariat: NEN, Netherlands). The responsible German body involved in its preparation was DIN-Normenausschuss Medizin (DIN Standards Committee Medicine), Working Committee NA 063-07-04 AA “Security”. The DIN Standards corresponding to the International Standards referred

6、 to in this document method for the transformation of data (3.14) in order to hide its information content, prevent its undetected modification and/or prevent its unauthorized use3.13cryptographic key managementkey managementgeneration, storage, distribution, deletion, archiving and application of k

7、eys (3.31) in accordance with a security policy (3.46)SOURCE: ISO 7498-2:1989, 3.3.333.14datareinterpretable representation of information (3.29) in a formalized manner suitable for communication, interpretation or processingNote 1 to entry: Data can be processed by humans or by automatic means.SOUR

8、CE: ISO/IEC 2382:2015, 21212723.15data integrityproperty that data (3.14) has not been altered or destroyed in an unauthorized mannerSOURCE: ISO 7498-2:1989, 3.3.213.16data linkingmatching and combining data (3.14) from multiple databases3.17data protectiontechnical and social regimen for negotiatin

9、g, managing and ensuring informational privacy (3.39), and security3.18data subjectperson to whom data (3.14) refer3.19decryptionprocess of converting encrypted data (3.14) back into its original form so it can be understood3.20de-identificationgeneral term for any process of reducing the associatio

10、n between a set of identifying data (3.14) and the data subject (3.18)3.21directly identifying datadata (3.14) that directly identifies a single individualNote 1 to entry: Direct identifiers are those data that can be used to identify a person without additional information or with cross-linking thr

11、ough other information that is in the public domain.DIN EN ISO 25237:2017-05 EN ISO 25237:2017 (E)9 3.22disclosuredivulging of, or provision of access to, data (3.14)Note 1 to entry: Whether the recipient actually looks at the data, takes them into knowledge or retains them, is irrelevant to whether

12、 disclosure has occurred.3.23encryptionprocess of converting information (3.29) or data (3.14) into a cipher or code3.24healthcare identifiersubject of care identifieridentifier (3.27) of a person for primary use by a healthcare system3.25identifiable personone who can be identified, directly or ind

13、irectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identitySOURCE: Directive 95/46/EC3.26identificationprocess of using claimed or observed attributes of an entity to single out the e

14、ntity among other entities in a set of identitiesNote 1 to entry: The identification of an entity within a certain context enables another entity to distinguish between the entities with which it interacts.3.27identifierinformation (3.29) used to claim an identity, before a potential corroboration b

15、y a corresponding authenticatorSOURCE: ENV 13608-1:2000, 3.443.28indirectly identifying datadata (3.14) that can identify a single person only when used together with other indirectly identifying dataNote 1 to entry: Indirect identifiers can reduce the population to which the person belongs, possibl

16、y down to one if used in combination.EXAMPLE Postcode, sex, age, date of birth.3.29informationknowledge concerning objects that within a certain context has a particular meaningSOURCE: ISO/IEC 2382:2015, 2121271, modified.3.30irreversibilitysituation when, for any passage from identifiable to pseudo

17、nymous, it is computationally unfeasible to trace back to the original identifier (3.27) from the pseudonym (3.43)DIN EN ISO 25237:2017-05 EN ISO 25237:2017 (E) 10 3.31keysequence of symbols which controls the operations of encryption (3.23) and decryption (3.19)SOURCE: ISO 7498-2:1989, 3.3.323.32li

18、nkage of information objectsprocess allowing a logical association to be established between different information objects3.33longitudinal or lifetime personal health recordpermanent, coordinated record of significant information, in chronological sequenceNote 1 to entry: It may include all historic

19、al data collected or be retrieved as a user designated synopsis of significant demographic, genetic, clinical and environmental facts and events maintained within an automated system.SOURCE: ISO/TR 21089:2004, 3.61, modified3.34natural personreal human being as opposed to a legal person which may be

20、 a private or public organization3.35person identificationprocess for establishing an association between an information object and a physical person3.36personal identifierinformation with the purpose of uniquely identifying a person within a given context3.37personal datainformation relating to an

21、identified or identifiable natural person (3.34) (“data subject”)SOURCE: Directive 95/46/EC3.38primary use of personal datauses and disclosures (3.22) that are intended for the data (3.14) collected3.39privacyfreedom from intrusion into the private life or affairs of an individual when that intrusio

22、n results from undue or illegal gathering and use of data (3.14) about that individualSOURCE: ISO/IEC 2382:2015, 21262633.40processing of personal dataoperation or set of operations that is performed upon personal data (3.37), whether or not by automatic means, such as collection, recording, organiz

23、ation, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure or destructionSOURCE: Directive 95/46/ECDIN EN ISO 25237:2017-05 EN ISO 25237:2017 (E)11 3.41processornatural o

24、r legal person, public authority, agency or any other body that processes personal data (3.37) on behalf of the controller (3.10)Note 1 to entry: See Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of

25、personal data and on the free movement of such data.3.42pseudonymizationparticular type of de-identification (3.20) that both removes the association with a data subject (3.18) and adds an association between a particular set of characteristics relating to the data subject and one or more pseudonyms

26、 (3.43)3.43pseudonympersonal identifier (3.36) that is different from the normally used personal identifier and is used with pseudonymized data to provide dataset coherence linking all the information about a subject, without disclosing the real world person identity.Note 1 to entry: This may be eit

27、her derived from the normally used personal identifier in a reversible or irreversible way or be totally unrelated.Note 2 to entry: Pseudonym is usually restricted to mean an identifier that does not allow the direct derivation of the normal personal identifier. Such pseudonymous information is thus

28、 functionally anonymous. A trusted third party may be able to obtain the normal personal identifier from the pseudonym.3.44recipientnatural or legal person, public authority, agency or any other body to whom data (3.14) are disclosed3.45secondary use of personal datauses and disclosures (3.22) that

29、are different than the initial intended use for the data (3.14) collected3.46security policyplan or course of action adopted for providing computer securitySOURCE: ISO/IEC 2382:2015, 21262463.47trusted third partysecurity authority, or its agent, trusted by other entities with respect to security-re

30、lated activitiesSOURCE: ISO/IEC 18014-1:2008, 3.204 Abbreviated termsDICOM Digital Imaging and Communication in MedicineHIPA A Health Insurance Portability and Accountability ActHIS Health Information SystemHIV Human Immunodeficiency VirusIP Internet ProtocolVoV Victim of Violence useDIN EN ISO 2523

31、7:2017-05 EN ISO 25237:2017 (E) 12 5 Requirements for privacy protection of identities in healthcare5.1 Objectives of privacy protectionThe objective of privacy protection as part of the confidentiality objective of security is to prevent the unauthorized or unwanted disclosure of information about

32、a person which may further influence legal, organizational and financial risk factors. Privacy protection is a subdomain of generic privacy protection that, by definition, includes other privacy sensitive entities such as organizations. As privacy is the best regulated and pervasive one, this concep

33、tual model focuses on privacy. Protective solutions designed for privacy can also be transposed for the privacy protection of other entities. This may be useful in countries where the privacy of entities or organizations is regulated by law.There are two objectives in the protection of personal data

34、; one that is the protection of personal data in interaction with on-line applications (e.g. web browsing) and at the other is the protection of collected personal data in databases. This document will restrict itself to the latter objective.Data can be extracted from databases. The objective is to

35、reduce the risk that the identities of the data subjects are disclosed. Researchers work with “cases”, longitudinal histories of patients collected in time and/or from different sources. For the aggregation of various data elements into the cases, it is, however, necessary to use a technique that en

36、ables aggregations without endangering the privacy of the data subjects whose data are being aggregated. This can be achieved by pseudonymization of the data.De-identification is used to reduce privacy risks in a wide variety of situations.Extreme de-identification is used for educational materials

37、that will be made widely public, yet should convey enough detail to be useful for medical education purposes (there is an IHE profile for automation assistance for performing this kind of de-identification. Much of the process is customized to the individual patient and educational purpose).Public h

38、ealth uses de-identified databases to track and understand diseases.Clinical trials use de-identification both to protect privacy and to avoid subconscious bias by removing other information such as whether the patient received a placebo or an experimental drug.Slight de-identification is used in ma

39、ny clinical reviews, where the reviewers are kept ignorant of the treating physician, hospital, patient, etc. both to reduce privacy risks and to remove subconscious biases. This kind of de-identification only prevents incidental disclosure to reviewers. An intentional effort will easily discover th

40、e patient identity, etc.When undertaking production of workload statistics or workload analysis within hospitals or of treatments provided against contracts with commissioners or purchasers of health care services, it is necessary to be able to separate individual patients without the need to know w

41、ho the individual patients are. This is an example of the use of de-identification within a business setting.The process of risk stratification (of re-hospitalization, for example) can be undertaken by using records from primary and secondary care services for patients. The records are de-identified

42、 for the analysis, but where the patients that are indicated as being of high risk, these patients can be re-identified by an appropriate clinician to enable follow-up interventions. For details on the healthcare pseudonymizaton, see Annex A.5.2 GeneralDe-identification is the general term for any p

43、rocess of reducing the association between a set of identifying data and the data subject with one or more intended use of the resulting data-set. Pseudonymization is a subcategory of de-identification. The pseudonym is the means by which pseudonymized data are linked to the same person or informati

44、on systems without revealing the identity of the person. De-identification inherently can limit the utility of the resulting data. Pseudonymization can be performed with or without the possibility of re-identifying the subject of the data (reversible or irreversible pseudonymization). There are seve

45、ral use case scenarios in healthcare for pseudonymization with particular applicability in increasing electronic processing of patient data, DIN EN ISO 25237:2017-05 EN ISO 25237:2017 (E)13 together with increasing patient expectations for privacy protection. Several examples of these are provided i

46、n Annex A.It is important to note that as long as there are any pseudonymized data, there is some risk of unauthorized re-identification. This is not unlike encryption, in that brute force can crack encryption, but the objective is to make it so difficult that the cost is prohibitive. There is less

47、experience with de-identification than encryption so the risks are not as well understood.5.3 De-identification as a process to reduce risk5.3.1 GeneralThe de-identification process should consider the security and privacy controls that will manage the resulting data-set. It is rare to lower the ris

48、k so much that the data-set needs no ongoing security controls.Figure 1 Visualization of the de-identification processFigure 1 is an informative diagram of a visualization of this de-identification process. This shows that the topmost concept is de-identification, as a process. This process utilizes sub-processes: pseudonymization and/or anonymization. These sub-processes use various too

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1