Comply and Prove It
HIPAA Data Compliance Services
Through field-level encryption and other anonymization functions in the IRI FieldShield and CellShield data masking products, or the IRI Voracity platform, you can de-identify protected health information (PHI) subject to HIPAA regulations, which include 45 CFR 164.312 and 170.210 (requiring encryption, hashing, etc.).
IRI software supports the HIPAA Safe Harbour standard directly by redacting or otherwise obfuscating key identifiers. And, through integrated re-ID risk scoring technology and data generalization technologies, you can determine re-identifiability risk and blur quasi-identifiers to comply with the Expert Determination Method standard, too.
PHI Re-ID Risk Scoring
Description: Use the risk scoring wizard in the same Eclipse™ IDE with FieldShield to apply peer-reviewed algorithms that score the likelihood of re-identification in prosecutor, journalist, and mraketer attack scenarios based on the uniqueness and separation values of quasi-identifiers in the data.
Description: Apply professional acumen in the use of, and judgement from, the IRI risk score report. Learn what an expert determination entails from a seasoned HIPAA re-ID risk statistician.
Description: Apply FieldShield "smart noise" and/or generalization functions to blur quasi-identifiers in the data so they are less unique (and score better), but can still be used for research and marketing.
Description: Gain a regulatory and litigational perspective on HIPAA compliance/certification in this context, and advice on insurance coverage and breach defense from an expert attorney in the field.