{"id":349645,"date":"2024-10-20T00:37:52","date_gmt":"2024-10-20T00:37:52","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-252372017\/"},"modified":"2024-10-26T00:20:21","modified_gmt":"2024-10-26T00:20:21","slug":"bs-en-iso-252372017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-252372017\/","title":{"rendered":"BS EN ISO 25237:2017"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
4<\/td>\n | European foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5 Requirements for privacy protection of identities in healthcare 5.1 Objectives of privacy protection 5.2 General <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.3 De-identification as a process to reduce risk 5.3.1 General 5.3.2 Pseudonymization <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.3.3 Anonymization 5.3.4 Direct and indirect identifiers 5.4 Privacy protection of entities 5.4.1 Personal data versus de-identified data <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.4.2 Concept of pseudonymization <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.5 Real world pseudonymization 5.5.1 Rationale <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.5.2 Levels of assurance of privacy protection <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.6 Categories of data subject 5.6.1 General 5.6.2 Subject of care 5.6.3 Health professionals and organizations 5.6.4 Device data <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.7 Classification data 5.7.1 Payload data 5.7.2 Observational data 5.7.3 Pseudonymized data 5.7.4 Anonymized data 5.8 Research data 5.8.1 General <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.8.2 Generation of research data 5.8.3 Secondary use of personal health information 5.9 Identifying data 5.9.1 General 5.9.2 Healthcare identifiers <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.10 Data of victims of violence and publicly known persons 5.10.1 General 5.10.2 Genetic information 5.10.3 Trusted service 5.10.4 Need for re-identification of pseudonymized data <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.10.5 Pseudonymization service characteristics 6 Protecting privacy through pseudonymization 6.1 Conceptual model of the problem areas <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 6.2 Direct and indirect identifiability of personal information 6.2.1 General 6.2.2 Person identifying variables 6.2.3 Aggregation variables <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 6.2.4 Outlier variables 6.2.5 Structured data variables <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6.2.6 Non-structured data variables 6.2.7 Inference risk assessment <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.2.8 Privacy and security 7 Re-identification process 7.1 General 7.2 Part of normal procedures 7.3 Exception <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.4 Technical feasibility <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Annex\u00a0A (informative) Healthcare pseudonymization scenarios <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Annex\u00a0B (informative) Requirements for privacy risk analysis <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | Annex\u00a0C (informative) Pseudonymization process (methods and implementation) <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | Annex\u00a0D (informative) Specification of methods and implementation <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Annex\u00a0E (informative) Policy framework for operation of pseudonymization services (methods and implementation) <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | Annex\u00a0F (informative) Genetic information <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Health informatics. Pseudonymization<\/b><\/p>\n |