Is Sharing De‐identified Data Legal? The State of Public Health Confidentiality Laws and Their Interplay with Statistical Disclosure Limitation Techniques
dc.contributor.author | Richardson, Victor | en_US |
dc.contributor.author | Milam, Sallie | en_US |
dc.contributor.author | Chrysler, Denise | en_US |
dc.date.accessioned | 2015-05-04T20:35:46Z | |
dc.date.available | 2016-05-10T20:26:28Z | en |
dc.date.issued | 2015-03 | en_US |
dc.identifier.citation | Richardson, Victor; Milam, Sallie; Chrysler, Denise (2015). "Is Sharing De‐identified Data Legal? The State of Public Health Confidentiality Laws and Their Interplay with Statistical Disclosure Limitation Techniques." The Journal of Law, Medicine & Ethics 43(s1): 83-86. | en_US |
dc.identifier.issn | 1073-1105 | en_US |
dc.identifier.issn | 1748-720X | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/111074 | |
dc.publisher | Springer | en_US |
dc.publisher | Wiley Periodicals, Inc. | en_US |
dc.title | Is Sharing De‐identified Data Legal? The State of Public Health Confidentiality Laws and Their Interplay with Statistical Disclosure Limitation Techniques | en_US |
dc.type | Article | en_US |
dc.rights.robots | IndexNoFollow | en_US |
dc.subject.hlbsecondlevel | Law and Legal Studies | en_US |
dc.subject.hlbsecondlevel | Medicine (General) | |
dc.subject.hlbtoplevel | Government, Politics and Law | en_US |
dc.subject.hlbtoplevel | Health Sciences | |
dc.description.peerreviewed | Peer Reviewed | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/111074/1/jlme12224.pdf | |
dc.identifier.doi | 10.1111/jlme.12224 | en_US |
dc.identifier.source | The Journal of Law, Medicine & Ethics | en_US |
dc.identifier.citedreference | Southern Illinoisan v. Illinois Dep't of Public Health, 844 N.E.2d 1 (Ill. 2006 ). | en_US |
dc.identifier.citedreference | See, e.g., American Statistical Association: Committee on Privacy and Confidentiality, Key Terms/Definitions ( 2011 ), available at < http://community.amstat.org/CPC/AboutUs/Key-TermsDefinitions > (last visited February 5, 2015). | en_US |
dc.identifier.citedreference | V. Ciriani et al., “ Microdata Protection,” in Ting Yu and Sushil Jajodia, eds., Secure Data Management in Decentralized Systems ( Springer, 2007 ): at 291 – 321, available at < http://spdp.di.unimi.it/papers/microdata.pdf > (last visited February 5, 2015). | en_US |
dc.identifier.citedreference | Guidance Regarding Methods for De‐identificaiton of Protected Health Information in Accordance with the Health Insurance Portability and Accountability (HIPAA) Privacy Rule, Department of Health and Human Services: Understanding HIPAA, available at < http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/De-identification/guidance.html > (last visited February 5, 2015) [hereinafter cited as De‐identification in Accordance with HIPAA]. | en_US |
dc.identifier.citedreference | Center for Disease Control and Prevention, “ HIPAA Privacy Rule and Public Health: Guidance from CDC and the U.S. Department of Health and Human Services,” April 11, 2003, at < http://www.cdc.gov/mmwr/preview/mmwrhtml/m2e411a1.htm > (last visited February 5, 2015). | en_US |
dc.identifier.citedreference | A. Cavoukian and K. E. Emam, Dispelling the Myths Surrounding De‐identification: Anonymization Remains a Strong Tool for Protecting Privacy (June 16, 2011 ), Discussion Papers, Information and Privacy Commissioner of Ontario, available at < http://www.ipc.on.ca/images/Resources/anonymization.pdf > (last visited February 5, 2015). | en_US |
dc.identifier.citedreference | De‐identification in Accordance with HIPAA, supra note 5; Ciriani et al., supra note 4. | en_US |
dc.identifier.citedreference | Id. (De‐identification in Accordance with HIPAA). | en_US |
dc.identifier.citedreference | See Ohm, supra note 2. | en_US |
dc.identifier.citedreference | L. Sweeney, Simple Demographics Often Identify People Uniquely, Data Privacy, Carnegie Mellon University, Working Paper 3, Pittsburgh ( 2000 ), available at < http://dataprivacylab.org/projects/identifiability/paper1.pdf > (last visited February 5, 2015). | en_US |
dc.identifier.citedreference | P. Golle, Revisiting the Uniqueness of Simple Demographics in the US Population, paper presentation at the 5th ACM Workshop on Privacy in Electronic Society, ACM, New York, New York, United States, 2006, available at < http://crypto.stanford.edu/~pgolle/papers/census.pdf > (last visited February 5, 2015 ). | en_US |
dc.identifier.citedreference | See Cavoukian, supra note 7. | en_US |
dc.identifier.citedreference | See Sweeney, supra note 11. | en_US |
dc.identifier.citedreference | National Committee on Vital and Health Statistics, Enhanced Protections for Uses of Health Data: A Stewardship Framework for ‘Secondary Uses’ of Electronically Collected and Transmitted Health Data, Report to the Secretary of the U.S. Department of Health and Human Services (December, 19, 2007 ), available at < http://www.ncvhs.hhs.gov/071221lt.pdf > (last visited February 5, 2015). | en_US |
dc.identifier.citedreference | See Cavoukian and Emam, supra note 7. | en_US |
dc.identifier.citedreference | Marine Shale Processors, Inc. v. State of Louisiana Dep't of Health, 572 So. 2d 280 (La. App. 1 Cir. 1990 ). | en_US |
dc.identifier.citedreference | Williams Law Firm v. Board of Supervisors, 878 So. 2d 557 (La. App. 1 Cir. 2004 ). | en_US |
dc.identifier.citedreference | J. M. Ware, “ Public Health Departments and State Patient Confidentiality Laws Map, Law Atlas: The Policy Surveillance Portal,” available at < http://lawatlas.org/query?dataset=public-health-departments-and-state-patient-confidentiality-laws#.VEqz-vnF98F > (last visited February 5, 2015 ). | en_US |
dc.identifier.citedreference | See, e.g., P. Ohm, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization,” University California Los Angeles Law Review 57, no. 6 ( 2010 ): 1701 – 1777. | en_US |
dc.owningcollname | Interdisciplinary and Peer-Reviewed |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.