DD ISO/TS 25237:2008
Current
The latest, up-to-date edition.
Health informatics. Pseudonymization
Hardcopy , PDF
English
31-01-2009
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols (and abbreviated terms)
5 Requirements for privacy protection of identities in healthcare
5.1 A conceptual model for pseudonymization of personal data
5.2 Categories of data subject
5.3 Classification of data
5.4 Trusted services
5.5 Need for re-identification of pseudonymized data
5.6 Pseudonymization service characteristics
6 Pseudonymization process (methods and implementation)
6.1 Design criteria
6.2 Entities in the model
6.3 Workflow in the model
6.4 Preparation of data
6.5 Processing steps in the workflow
6.6 Protecting privacy protection through pseudonymization
7 Re-identification process (methods and implementation)
8 Specification of interoperability of interfaces (methods and
implementation)
9 Policy framework for operation of pseudonymization services
(methods and implementation)
9.1 General
9.2 Privacy policy
9.3 Trustworthy practices for operations
9.4 Implementation of trustworthy practices for re-identification
Annex A (informative) - Healthcare pseudonymization scenarios
Annex B (informative) - Requirements for privacy risk assessment
design
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.