De-identification of Medical Narrative Data

Slides:



Advertisements
Similar presentations
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
Advertisements

HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
National Cancer Institute Cancer Therapy Evaluation Program (CTEP) presents: How to Obtain Protected Health Information (PHI) from an Outside Healthcare.
HIPAA Understanding Medical Privacy in the Work Place © Copyright 2005 The Nugent Law Firm, P.C. All Rights Reserved.
HIPAA Health Insurance Portability and Accountability Act 1.
HIPAA Requirements for Patient Oriented Research
Informed Consent.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
Are you ready for HIPPO??? Welcome to HIPAA
Comm2315.wordpress.com.  On the Record – All statements are subject for use in the story. Everything a source says or s you is.
1 HIPAA, Researchers and the IRB: Part Two Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
HIPAA, Researchers and the IRB Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
1 D. Bekhouche/ Y. Pollet/ B. Grilheres/ X. Denis University of Salford, UK 06/24/2004 PSI Rouen Perception System Information 9 th International Conference.
1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the.
Health Insurance Portability and Accountability Act (HIPAA)
“Privacy Implications of RFID Technology in Health Care Settings” Marc Rotenberg President EPIC Dept. of Health & Human Services Washington, DC 11 January.
Extraction of Adverse Drug Effects from Clinical Records E. ARAMAKI* Ph.D., Y. MIURA **, M. TONOIKE ** Ph.D., T. OHKUMA ** Ph.D., H. MASHUICHI ** Ph.D.,K.WAKI.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
14 May Privacy Requirements Phoenix Ambulatory Blood Pressure Monitoring System © 2006 Christopher J. Adams Copying and distribution of this document.
HIPAA EFFECTS OF HEALTH CARE LEGISLATION. Evaluation of the influences of HIPAA  How it affected health care system  How it works as a law  Changes.
De-identifying Pathology Reports for Pathology Informatics
HIPAA – How Will the Regulations Impact Research?.
ISBER 2006 Regulations on residual tissue for research in Europe MedLawconsult.
Copyright © 2008 Delmar Learning. All rights reserved. Unit 8 Observation, Reporting, and Documentation.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the.
THE PHARMACY TECHNICIAN CHAPTER 2. SCOPE OF PRACTICE Specific responsibilities and tasks differ by setting –Job descriptions –Policy and procedure manuals.
Medical Manager Unit 9 ICBS 170. Medical Manager Electronic Data Interchange (EDI)  Ability to request, receive, transfer and integrate information electronically.
HIPAA LAWS.  Under the privacy rule, the patient must give consent to use his or her Protected Health Information.  Examples in which consent must be.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Identifying Entity Relationships in News Reports 27. January 2010 Martin Jačala, Jozef Tvarožek Faculty of Informatics and Information Technology Slovak.
Health Insurance portability and Accountability Act (HIPAA)‏
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
CH 10. Confidentiality A. Confidentiality about sensitive medical information is necessary to preserve the patient’s dignity. B. In order to receive payment.
Human Subjects Update E. Wethington, Chair, UCHS.
Aged and Disabled Waiver (ADW) Health Insurance Portability and Accountability Act (HIPAA) Training 2015 October 2015.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
FERPA & HIPAA: Maintaining Student Confidentiality.
Best-of-Breed Hybrid Methods for Text De-identification Yang H, Garibaldi JM. Automatic detection of protected health information from clinical narratives.
HIPAA 2017 JHSPH IRB Clarifications and Changes
HIPAA Privacy Rule Training
HIPAA PRIVACY & SECURITY TRAINING
To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the screen changes and you.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
Electronic Health Records (EHR)
Documentation and Reporting
The HIPAA Privacy Rule: Implications for Medical Research
CRF &SVM in Medication Extraction
Confidentiality and Interagency Sharing of Juvenile Information
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Lesson 4 – Strategies used to deal with challenging behaviours
O.
The HIPAA Privacy Rule and Research
Text Categorization Document classification categorizes documents into one or more classes which is useful in Information Retrieval (IR). IR is the task.
Keeping all your medical forms in one location
SNOMED-CT representation Radiologic report Admission Letter
Information Handling Research Student Induction Day
Health Insurance Portability and Accountability Act
HIPAA Overview.
The Health Insurance Portability and Accountability Act
HIPAA Privacy & Security: Medical Research Context
Issues in HIPAA Research Compliance
Nursing Introduction.
Office of the Vice President for Research Human Subjects Protection Program IRB Submission Process Module 4 - Health Insurance Portability and Accountability.
Presentation transcript:

De-identification of Medical Narrative Data Introduction De-identification In Natural Language Processing (NLP), de-identification is the process of masking or removing a certain number of identifiers (i.e. pieces of information which could directly or in combination reveal the identity of the subject). Commonly, the choice of identifiers to be removed is based on the list of 18 identifiers provided by the Health Insurance Portability and Accountability Act (HIPPA) of the American legislation. Why ? Privacy Protection Decreases the risk of re-identification Promote Research No need for consent or waiver of consent Previous work De-identification has been performed on medical free text for over 20 years with a growing capacity to de-identify various types of medical documents and an ability to process larger amounts of information. Initially performed by hand, de-identification has been automated using rule based systems and more recently machine-learning (or mixed) methods. De-identified information ≠ Anonymous information Methods Rule-based method Named Entity Recognition (NER) task De-identification of PHI via finite-state automata Replacement of de-identified PHI by surrogate information Tags on de-identified PHI: <patient>, <doctor>, <location>, <date> Examples of de-identified text Original text De-identified text Madame Foufi sera suivie à la consultation de diabétologie aux HUG du 08.2 au 09/02/2019. Madame Cartier <patient> sera suivie à la consultation de diabétologie aux Hôpitaux <location> du 30.02 au 30/02/2019 <date>. Mme Foufi a été transférée à la clinique de Joli-Mont le 06 janvier 2014. Mme Cartier <patient> a été transférée à la Clinique <location> le 30 février 2014 <date>. Results De-identified PHIs in 11’000 discharge summaries Results evaluation on 1’000 discharge summaries Dates Patients’ names Doctors’ names Locations Nurses’ names & nursing care services Telephone & fax numbers Addresses Health Insurance companies 29,221 27,357 4,685 7,907 483 83 5 3 Dates Patients’ names Doctors’ names Locations Overall performance Precision 0.9889 0.9970 1 0.9628 0.9907 Recall 0.9228 0.9916 0.9876 0.7872 0.9342 Conclusion Next steps Processing of time intervals De-identification, manual validation and evaluation on larger corpora Adapt de-identification rules to other languages (IT, GER) Remarks De-identification is a challenging task Our de-identification tool achieved a good performance Errors in discharge summaries affect the de-identification process Vasiliki FOUFI, PhD Christophe GAUDET-BLAVIGNAC, Bmed, Mmed, BSc CS Raphaël CHEVRIER, Bmed, Mmed Christian LOVIS, MD, MPH, FACMI