When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Pseudonymization - Wikipedia

    en.wikipedia.org/wiki/Pseudonymization

    For example, given prior knowledge of a few attendance dates it is easy to identify someone's data in a pseudonymized dataset by selecting only those people with that pattern of dates. This is an example of an inference attack. The weakness of pre-GDPR pseudonymized data to inference attacks is commonly overlooked.

  3. De-identification - Wikipedia

    en.wikipedia.org/wiki/De-identification

    De-identification is the process used to prevent someone's personal identity from being revealed. For example, data produced during human subject research might be de-identified to preserve the privacy of research participants. Biological data may be de-identified in order to comply with HIPAA regulations that define and stipulate patient ...

  4. Donabedian model - Wikipedia

    en.wikipedia.org/wiki/Donabedian_model

    Donabedian developed his quality of care framework to be flexible enough for application in diverse healthcare settings and among various levels within a delivery system. At its most basic level, the framework can be used to modify structures and processes within a healthcare delivery unit, such as a small group practice or ambulatory care ...

  5. Data re-identification - Wikipedia

    en.wikipedia.org/wiki/Data_re-identification

    The two researchers de-anonymized some of the data by comparing it with non-anonymous IMDb (Internet Movie Database) users' movie ratings. Very little information from the database, it was found, was needed to identify the subscriber. [3] In the resulting research paper, there were startling revelations of how easy it is to re-identify Netflix ...

  6. Case report form - Wikipedia

    en.wikipedia.org/wiki/Case_report_form

    Case report forms contain data obtained during the patient's participation in the clinical trial. Before being sent to the sponsor, this data is usually de-identified (not traceable to the patient) by removing the patient's name, medical record number, etc., and giving the patient a unique study number.

  7. Protected health information - Wikipedia

    en.wikipedia.org/wiki/Protected_health_information

    Names; All geographical identifiers smaller than a state, except for the initial three digits of a zip code if, according to the current publicly available data from the U.S. Bureau of the Census: the geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; the initial three digits of a zip code for all such geographic units ...

  8. 4. Qualifications and Experience

    images.huffingtonpost.com/2013-04-08-ERM_cut.pdf

    provides full-service NEPA 4. Qualifications and Experience Throughout the U.S., ERM support to private sector clients, federal agencies, and state

  9. Clinical Care Classification System - Wikipedia

    en.wikipedia.org/wiki/Clinical_Care...

    The Clinical Care Classification (CCC) System is a standardized, coded nursing terminology that identifies the discrete elements of nursing practice. The CCC provides a unique framework and coding structure. Used for documenting the plan of care; following the nursing process in all health care settings. [1]