Information De-Identification in Healthcare
  • CODE : ROSS-0002
  • Duration : 75 Minutes
  • Level : Advance
  • Add To Calendar
  • Refer a Friend

Over the course Mr. Leo's career since 1980, he worked in Security and Privacy as a contractor for NASA at the Johnson Space Center from 1980 to 2002, in his final years in the role of Program Manager, Chief Security Architect and Chief Security Officer for Mission Operations for the Shuttle and Space Station programs. In 2002, he worked for the University of Texas-Galveston and Chief Information Security Officer and Director of IT for the Correctional Managed Care Division, establishing a complete security, privacy and compliance program for the organization. Upon departing there in 2006, he began a new career chapter as a security and privacy consultant entirely devoted to Healthcare compliance for his clients.

He is a Charter member of the EC-Council Certified Hacking Forensic Investigator (CHFI) Advisory Board, a global panel of experts working to establish professional standards and practices in data forensics and serves on scientific working groups at NIST in both Cloud Security and Forensics. He serves on The American Board of Forensic Engineering and Technology (ABFET) for The American College of Forensic Examiners Institute (ACFEI) and holds several certifications from ISC2 and ISACA. Mr. Leo has been accorded Fellow status for the American Board for Certification in Homeland Security (ABCHS).

Mr. Leo has provided Expert Witness services in several cases concerning compliance issues with regard to the impact of HIPAA on the subject matter and privacy violations.

The process of taking PHI from a fully identified form to various levels of a de-identified product is one that requires a practitioner to understand how the various pieces – the 18 demographic elements HIPAA defines and the health information itself they are associated with – fit together, how they provide identity assurance, and how the total can be reduced to product a deidentified product that can be used for other legitimate purposes, such as marketing, research, and secure transmission.

Areas Covered

The purpose and problems of using PHI; the allowed uses; the relationship of the various elements; how identifiability is established and how it is removed; the process of analyzing reidentification risk as assurance against it

Course Level - Intermediate-Advanced

Who Should Attend

Privacy officers, security officers, risk analysts, healthcare marketing staff, researchers, legal staff of provider organizations

Why Should You Attend

Employing high-fidelity information to treat patients is essential to ensure that the care given is aligned accurately with their needs. But what about those times when the information must be used for other legitimate purposes? The Office for Civil Rights, the enforcement arm of DHHS, provides some information on this subject, but very little practical guidance regarding how to go about preparing PHI for these other uses. This session will discuss the issues, the risks and the methods associated with this process and will shed brighter light on how to go about it – properly, safely and compliantly.

  • $160.00



Webinar Variants


contact us for your queries :

713-401-9995

support at grceducators.com



  • Contact
  • Membership
  • Subscribe
  • Secure Payment