KI Design developed in-house de-identification capacities to enable the secondary use of health data
In House Design
In House Design is a software. It is produced by a corporate entity for the purpose of using it within the organization. However, it becomes available for commercial use upon the sole discretion of the developing organization. The need to develop such software may arise depending on many circumstances which may be non-availability of the software in the market, potentiality or the ability of the corporation to develop such software or to customize a software based on the corporate organizations need.
Develop technical and business capacities for de-identification
KI Design supported a healthcare organization in the development of in-house de-identification capacities to facilitate collaborative research initiatives involving patient data. We provided privacy expertise, recommendations, and practical implementation tools to develop skills and knowledge for an effective de-identification program.
Based on our own hands-on experience implementing de-identification in a variety of contexts, we trained technical and programming staff to perform de-identified according to industry best practices. As the staff began de-identifying a requested data set, we walked them through the process of de-identifying data as well as risk evaluation of the de-identified data.
KiDesign trained business, privacy and security staff in a best-practice approach to evaluating the risk of de-identified design, using both risk measurement tools and regulatory standards. We support the staff through the process of risk assessment, documentation, and contractual signing. We helped the staff to understand from a business and functional perspective, risk evaluation tools and standards used in worldwide and shared with our clients to our practice-based methodology for evaluating the effectiveness of an organization’s risk management tools and strategies.
- Identified viable and cost-effective de-identification options
- Consulted management to develop an in-house training strategy
- Provided hands-on de-identification training for technical and programming staff
- Provided a threat and risk assessment aligned with regulatory standards
- Educated business, privacy and security staff about risk evaluation tools, standards, and principles
- Hands-on de-identification training for technical and programming staff
- Technical training in the use of risk evaluation tools
- Risk evaluation training for business, privacy and security staff
- Practice-based methodology for evaluating risk management effectiveness