Security Basics (Part Two) INFORMATION SECURITY IDENTIFIERS

Posted by Thomas Davon on

In information security, the Stanford Data Classification Guidelines is what is used to classify information as either having no risk at all, or having a low risk or having a high risk. The guidelines highlight health information as having a high risk. According to the guidelines, the Protected Health Information (PHI) is a High-Risk Data which must be protected against any form of risk. According to the guidelines, a PHI is any information relating to the past, present or future of an individual and can be used to identify the individual.

Such information must be treated with utmost privacy. It is should be encrypted and stored in encrypted devices. 

When a data is used for research purposes, the law permits that a Protected Health Information (PHI) can be used if it is used anonymously. When certain personal details are omitted from the data, it can be used since it has no means of using it to identify an individual.

In order to anonymize a PHI, you must remove the 18 different identifiers from the information. These identifiers are what makes the information Protected Health Information. Once they have been removed, the information can no longer be traced to any individual. 

The identifiers include:

  1. Names
  2. Full face photographic images and any comparable images
  3. Biometric identifiers such as finger and voice prints
  4. Geographic subdivisions smaller than a state
  5. All elements of dates directly related to an individual.
  6. Telephone numbers and Fax numbers
  7. Account numbers
  8. Medical record numbers
  9. Electronic mail addresses (Email address)
  10. Social security numbers
  11. Health plan beneficiary numbers
  12. Certificate/license numbers
  13. Vehicle identifiers and serial numbers such as license plate numbers
  14. Device identifiers and serial numbers
  15. Web Universal Resource Locators (URLs)
  16. Internet Protocol (IP) address numbers
Any other unique identifying number, characteristic, or code.

0 comments

Leave a comment

Please note, comments must be approved before they are published