Insight to the Industry by www.rm-mi.net

 

12/20/2007

What is PHI or Personal Health Identifier

Filed under: — Justin Mead @ 10:49 am

HIPAA – PHI
LIST OF 18 IDENTIFIERS AND DEFINITION OF PHI

What is PHI?

Protected health information (PHI) is any information in the medical record or designated record set that can be used to identify an individual and that was created, used, or disclosed in the course of providing a health care service such as diagnosis or treatment. HIPAA regulations allow researchers to access and use PHI when necessary to conduct research. However, HIPAA only affects research that uses, creates, or discloses PHI that will be entered in to the medical record or will be used for healthcare services, such as treatment, payment or operations.

For example, PHI is used in research studies involving review of existing medical records for research information, such as retrospective chart review. Also, studies that create new medical information because a health care service is being performed as part of research, such as diagnosing a health condition or a new drug or device for treating a health condition, create PHI that will be entered into the medical record. For example, sponsored clinical trails that submit data to the U.S. Food and Drug Administration involve PHI and are therefore subject to HIPAA regulations.

List of 18 Identifiers

1. Names;
2. All geographical subdivisions smaller than a State, including street address, city, county, precinct, zip code, and their equivalent geocodes, except for the initial three digits of a zip code, if according to the current publicly available data from the Bureau of the Census: (1) The geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; and (2) The initial three digits of a zip code for all such geographic units containing 20,000 or fewer people is changed to 000.
3. All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older;
4. Phone numbers;
5. Fax numbers;
6. Electronic mail addresses;
7. Social Security numbers;
8. Medical record numbers;
9. Health plan beneficiary numbers;
10. Account numbers;
11. Certificate/license numbers;
12. Vehicle identifiers and serial numbers, including license plate numbers;
13. Device identifiers and serial numbers;
14. Web Universal Resource Locators (URLs);
15. Internet Protocol (IP) address numbers;
16. Biometric identifiers, including finger and voice prints;
17. Full face photographic images and any comparable images; and
18. Any other unique identifying number, characteristic, or code (note this does not mean the unique code assigned by the investigator to code the data)

There are also additional standards and criteria to protect individual’s privacy from re-identification. Any code used to replace the identifiers in datasets cannot be derived from any information related to the individual and the master codes, nor can the method to derive the codes be disclosed. For example, the unique code cannot include the last four digits (in sequence) of the social security number. Additionally, the researcher must not have actual knowledge that the research subject could be re-identified from the remaining identifiers in the PHI used in the research study. In other words, the information would still be considered identifiable is there was a way to identify the individual even though all of the 18 identifiers were removed.

What is not PHI?

In contrast, some research studies use data that is person-identifiable because it includes personal identifiers such as name, address. However, it is not considered to be PHI because the data are not associated with or derived from a healthcare service event (treatment, payment, operations, medical records), not entered into the medical records, nor will the subject/patient be informed of the results. Research health information that is kept only in the researcher’s records is not subject to HIPAA but is regulated by other human subjects protection regulations.

Examples of research health information not subject to HIPAA include such studies as the use of aggregate data, diagnostic tests that do not go into the medical record because they are part of a basic research study and the results will not be disclosed to the subject, and testing done without the PHI identifiers. Some genetic basic research can fall into this category such as the search for potential genetic markers, promoter control elements, and other exploratory genetic research. In contrast, genetic testing for a known disease that is considered to be part of diagnosis, treatment and health care would be considered to use PHI and therefore subject to HIPAA regulations.

Also note, health information by itself without the 18 identifiers is not considered to be PHI. For example, a dataset of vital signs by themselves do not constitute protected health information. However, if the vital signs dataset includes medical record numbers, then the entire dataset must be protected since it contains an identifier. PHI is anything that can be used to identify an individual such as private information, facial images, fingerprints, and voiceprints. These can be associated with medical records, biological specimens, biometrics, data sets, as well as direct identifiers of the research subjects in clinical trials.

The table below summarizes the characteristics of research data that would be
considered PHI and research data that would be considered RHI (Research Related Health Information).

Characteristic HIPAA
PHI
RHI

Individually
identifiable ie.,
meets
HIPAA definition of IIHI

Yes
yes

Used for
support clinical
decision
making for an
individual,
or for payment
or
operations

Yes
No

Associated
with healthcareservice event

Yes
No

Need-to-know,
minimum necessary access control

Yes
Yes

Separation
of person identifiable and non-person
identifiable
data elements
wherever
feasible

No
Yes

Individual
authorization
(consent)
for creation and
use of
data

Varies by use
Yes

Business
Partneragreements for disclosures

Yes
No

Logs and
audit trails of use and disclosure

Yes

Consistent
with current best

practice
for research records

Right to
request amendment of records

Yes
At discretion of investigator

Table source: http://cphs.berkeley.edu/content/hipaa/WhatIsandIsNotPHI.pdf


Warning: include(/var/www/siteblog/SiteBlog_bundle/wp-comments.php) [function.include]: failed to open stream: No such file or directory in /var/www/siteblog/blogs/insight.rm-mi.net/index.php on line 108

Warning: include() [function.include]: Failed opening '/var/www/siteblog/SiteBlog_bundle/wp-comments.php' for inclusion (include_path='.:/usr/share/php:/usr/share/pear') in /var/www/siteblog/blogs/insight.rm-mi.net/index.php on line 108

3/1/2005

defined

Filed under: — Justin Mead @ 11:35 am

Medical informatics

From Wikipedia, the free encyclopedia.
http://en.wikipedia.org/wiki/Medical_informatics


Electronic patient chart of a HIS
Electronic patient chart of a HIS

Medical Informatics is the name given to the application of information technology to healthcare. It is the:

"understanding, skills and tools that enable the sharing and use of information to deliver healthcare and promote health" (British Medical Informatics Society).

Medical informatics is often called health informatics or biomedical informatics, and forms part of the wider domain of eHealth. These later-generation terms reflect the substantive contribution of the citizen & non-medical professions to the generation and usage of healthcare data and related information. Additionally, medical informaticians are active in bioinformatics and other fields not strictly defined as health care.

Aspects of the field

A HIS's automatic immunization data entry in the patient's admission module.
Enlarge
A HIS’s automatic immunization data entry in the patient’s admission module.
http://en.wikipedia.org/wiki/Image:Immune_auto.jpg

These include:

  • architectures for electonic medical records and other health information systems used for billing, scheduling or research.
  • decision support systems in healthcare
  • messaging standards for the exchange of information between health care information systems (e.g. through the use of the HL7 data exchange standard) - these specifically define the means to exchange data, not the content
  • controlled medical vocabularies such as the Standardized Nomenclature of Medicine, Clinical Terms (SNOMED-CT) or Logical Observation Identifiers Names and Codes (LOINC) - used to allow a standard, accurate exchange of data content between systems and providers.
  • use of hand-held or portable devices to assist providers with data entry/retrieval or medical decision-making

More information at: http://en.wikipedia.org/wiki/Medical_informatics


Warning: include(/var/www/siteblog/SiteBlog_bundle/wp-comments.php) [function.include]: failed to open stream: No such file or directory in /var/www/siteblog/blogs/insight.rm-mi.net/index.php on line 108

Warning: include() [function.include]: Failed opening '/var/www/siteblog/SiteBlog_bundle/wp-comments.php' for inclusion (include_path='.:/usr/share/php:/usr/share/pear') in /var/www/siteblog/blogs/insight.rm-mi.net/index.php on line 108