Show simple item record

Is Sharing De‐identified Data Legal? The State of Public Health Confidentiality Laws and Their Interplay with Statistical Disclosure Limitation Techniques

dc.contributor.authorRichardson, Victoren_US
dc.contributor.authorMilam, Sallieen_US
dc.contributor.authorChrysler, Deniseen_US
dc.date.accessioned2015-05-04T20:35:46Z
dc.date.available2016-05-10T20:26:28Zen
dc.date.issued2015-03en_US
dc.identifier.citationRichardson, Victor; Milam, Sallie; Chrysler, Denise (2015). "Is Sharing De‐identified Data Legal? The State of Public Health Confidentiality Laws and Their Interplay with Statistical Disclosure Limitation Techniques." The Journal of Law, Medicine & Ethics 43(s1): 83-86.en_US
dc.identifier.issn1073-1105en_US
dc.identifier.issn1748-720Xen_US
dc.identifier.urihttps://hdl.handle.net/2027.42/111074
dc.publisherSpringeren_US
dc.publisherWiley Periodicals, Inc.en_US
dc.titleIs Sharing De‐identified Data Legal? The State of Public Health Confidentiality Laws and Their Interplay with Statistical Disclosure Limitation Techniquesen_US
dc.typeArticleen_US
dc.rights.robotsIndexNoFollowen_US
dc.subject.hlbsecondlevelLaw and Legal Studiesen_US
dc.subject.hlbsecondlevelMedicine (General)
dc.subject.hlbtoplevelGovernment, Politics and Lawen_US
dc.subject.hlbtoplevelHealth Sciences
dc.description.peerreviewedPeer Revieweden_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/111074/1/jlme12224.pdf
dc.identifier.doi10.1111/jlme.12224en_US
dc.identifier.sourceThe Journal of Law, Medicine & Ethicsen_US
dc.identifier.citedreferenceSouthern Illinoisan v. Illinois Dep't of Public Health, 844 N.E.2d 1 (Ill. 2006 ).en_US
dc.identifier.citedreferenceSee, e.g., American Statistical Association: Committee on Privacy and Confidentiality, Key Terms/Definitions ( 2011 ), available at < http://community.amstat.org/CPC/AboutUs/Key-TermsDefinitions > (last visited February 5, 2015).en_US
dc.identifier.citedreferenceV. Ciriani et al., “ Microdata Protection,” in Ting Yu and Sushil Jajodia, eds., Secure Data Management in Decentralized Systems ( Springer, 2007 ): at 291 – 321, available at < http://spdp.di.unimi.it/papers/microdata.pdf > (last visited February 5, 2015).en_US
dc.identifier.citedreferenceGuidance Regarding Methods for De‐identificaiton of Protected Health Information in Accordance with the Health Insurance Portability and Accountability (HIPAA) Privacy Rule, Department of Health and Human Services: Understanding HIPAA, available at < http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/De-identification/guidance.html > (last visited February 5, 2015) [hereinafter cited as De‐identification in Accordance with HIPAA].en_US
dc.identifier.citedreferenceCenter for Disease Control and Prevention, “ HIPAA Privacy Rule and Public Health: Guidance from CDC and the U.S. Department of Health and Human Services,” April 11, 2003, at < http://www.cdc.gov/mmwr/preview/mmwrhtml/m2e411a1.htm > (last visited February 5, 2015).en_US
dc.identifier.citedreferenceA. Cavoukian and K. E. Emam, Dispelling the Myths Surrounding De‐identification: Anonymization Remains a Strong Tool for Protecting Privacy (June 16, 2011 ), Discussion Papers, Information and Privacy Commissioner of Ontario, available at < http://www.ipc.on.ca/images/Resources/anonymization.pdf > (last visited February 5, 2015).en_US
dc.identifier.citedreferenceDe‐identification in Accordance with HIPAA, supra note 5; Ciriani et al., supra note 4.en_US
dc.identifier.citedreferenceId. (De‐identification in Accordance with HIPAA).en_US
dc.identifier.citedreferenceSee Ohm, supra note 2.en_US
dc.identifier.citedreferenceL. Sweeney, Simple Demographics Often Identify People Uniquely, Data Privacy, Carnegie Mellon University, Working Paper 3, Pittsburgh ( 2000 ), available at < http://dataprivacylab.org/projects/identifiability/paper1.pdf > (last visited February 5, 2015).en_US
dc.identifier.citedreferenceP. Golle, Revisiting the Uniqueness of Simple Demographics in the US Population, paper presentation at the 5th ACM Workshop on Privacy in Electronic Society, ACM, New York, New York, United States, 2006, available at < http://crypto.stanford.edu/~pgolle/papers/census.pdf > (last visited February 5, 2015 ).en_US
dc.identifier.citedreferenceSee Cavoukian, supra note 7.en_US
dc.identifier.citedreferenceSee Sweeney, supra note 11.en_US
dc.identifier.citedreferenceNational Committee on Vital and Health Statistics, Enhanced Protections for Uses of Health Data: A Stewardship Framework for ‘Secondary Uses’ of Electronically Collected and Transmitted Health Data, Report to the Secretary of the U.S. Department of Health and Human Services (December, 19, 2007 ), available at < http://www.ncvhs.hhs.gov/071221lt.pdf > (last visited February 5, 2015).en_US
dc.identifier.citedreferenceSee Cavoukian and Emam, supra note 7.en_US
dc.identifier.citedreferenceMarine Shale Processors, Inc. v. State of Louisiana Dep't of Health, 572 So. 2d 280 (La. App. 1 Cir. 1990 ).en_US
dc.identifier.citedreferenceWilliams Law Firm v. Board of Supervisors, 878 So. 2d 557 (La. App. 1 Cir. 2004 ).en_US
dc.identifier.citedreferenceJ. M. Ware, “ Public Health Departments and State Patient Confidentiality Laws Map, Law Atlas: The Policy Surveillance Portal,” available at < http://lawatlas.org/query?dataset=public-health-departments-and-state-patient-confidentiality-laws#.VEqz-vnF98F > (last visited February 5, 2015 ).en_US
dc.identifier.citedreferenceSee, e.g., P. Ohm, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization,” University California Los Angeles Law Review 57, no. 6 ( 2010 ): 1701 – 1777.en_US
dc.owningcollnameInterdisciplinary and Peer-Reviewed


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.