tag:blogger.com,1999:blog-733074358901582680.post6672024659468251816..comments2024-03-23T05:28:35.472-04:00Comments on Healthcare Standards: IHE IT Infrastructure Technical Framework Supplement and Handbook PublishedKeith W. Boonehttp://www.blogger.com/profile/16883038460949909300noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-733074358901582680.post-57566460578126146492014-03-15T15:35:49.927-04:002014-03-15T15:35:49.927-04:00Keith,
I'm interested in the subject of de-i...Keith, <br /><br />I'm interested in the subject of de-identification of CDAs. The material in this IHE document is a bit too "abstract" for my taste. It's a nice overview of many of the relevant considerations/concerns but it doesn't get down to the "cookbook" level for how to actually approach de-identification of CDAs.<br /><br />In Appendix B.2 on line ~870 there is a reference to a practical real-world example of CDA de-identification ("An example of a de-identification plan for a bio-surveillance is available at ftp://"). Unfortunately, the ftp address is empty! Any idea where to find that?Brian Z Weisshttps://www.blogger.com/profile/12345814827375852289noreply@blogger.com