Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2011 Dec;18 Suppl 1(Suppl 1):i103-8.
doi: 10.1136/amiajnl-2011-000316. Epub 2011 Oct 7.

Strategies for maintaining patient privacy in i2b2

Affiliations

Strategies for maintaining patient privacy in i2b2

Shawn N Murphy et al. J Am Med Inform Assoc. 2011 Dec.

Abstract

Background: The re-use of patient data from electronic healthcare record systems can provide tremendous benefits for clinical research, but measures to protect patient privacy while utilizing these records have many challenges. Some of these challenges arise from a misperception that the problem should be solved technically when actually the problem needs a holistic solution.

Objective: The authors' experience with informatics for integrating biology and the bedside (i2b2) use cases indicates that the privacy of the patient should be considered on three fronts: technical de-identification of the data, trust in the researcher and the research, and the security of the underlying technical platforms.

Methods: The security structure of i2b2 is implemented based on consideration of all three fronts. It has been supported with several use cases across the USA, resulting in five privacy categories of users that serve to protect the data while supporting the use cases.

Results: The i2b2 architecture is designed to provide consistency and faithfully implement these user privacy categories. These privacy categories help reflect the policy of both the Health Insurance Portability and Accountability Act and the provisions of the National Research Act of 1974, as embodied by current institutional review boards.

Conclusion: By implementing a holistic approach to patient privacy solutions, i2b2 is able to help close the gap between principle and practice.

PubMed Disclaimer

Conflict of interest statement

Competing interests: None.

References

    1. Willison DJ, Schwartz L, Abelson J, et al. Alternatives to project-specific consent for access to personal information for health research: what is the opinion of the Canadian public? J Am Med Inform Assoc 2007;14:706–12 - PMC - PubMed
    1. Damschroder LJ, Pritts JL, Neblo MA, et al. Patients, privacy and trust: patients' willingness to allow researchers to access their medical records. Soc Sci Med 2007;64:223–35 - PubMed
    1. Sweeney L. k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-based Syst 2002;10:557–70
    1. Fischetti M, Salazar JJ. Models and algorithms for the 2-dimensional cell suppression problem in statistical disclosure control. Math Program 1999;84:283–312
    1. Dreiseitl S, Vinterbo S, Ohno-Machado L. Disambiguation data: extracting information from anonymized sources. JAMIA 2001;Suppl 8:144–8 - PMC - PubMed

Publication types

MeSH terms