PogoWasRight.org

Menu
  • About
  • Privacy
Menu

De-Identifcation of Data: Breaking Down HIPAA Rules

Posted on April 3, 2015June 30, 2025 by Dissent

Elizabeth Snell writes:

The de-identification of data is an important part of healthcare technology, especially as the use of EHRs and HIEs becomes more prominent. The HIPAA Privacy Rule states that once data has been de-identified, covered entities can use or disclose it without any limitation. The information is no longer considered PHI, and does not fall under the same regulations and restrictions as PHI.

But why would a facility need to de-identify data? What are the potential benefits of the de-identification of data? HealthITSecurity.com decided to dissect this aspect of HIPAA regulations, and explain what the de-identifcation process entails and how covered entities could benefit from the practice.

Read more on HealthITSecurity.com.

No related posts.

Category: HealthcareLaws

Post navigation

← Snapchat reveals data-sharing with U.S. government
The FBI Has Its Own Secret Brand Of Malware →

Now more than ever

Search

Contact Me

Email: info@pogowasright.org

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

Categories

Recent Posts

  • How a Tax Subpoena in Ohio Tests European Privacy Law
  • Cambodia moves to enact comprehensive data privacy law
  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row

RSS Recent Posts on DataBreaches.net

  • Minnesota National Guard deployed; St. Paul declares state of emergency in response to cyberattack
  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
©2025 PogoWasRight.org. All rights reserved.
Menu
  • About
  • Privacy