Handbook of Applied Cryptography
Handbook of Applied Cryptography
Proceedings of the International Conference on Cryptography: Policy and Algorithms
CBMS '08 Proceedings of the 2008 21st IEEE International Symposium on Computer-Based Medical Systems
Coordinating e-health systems with TuCSoN semantic tuple centres
ACM SIGAPP Applied Computing Review
USAB'11 Proceedings of the 7th conference on Workgroup Human-Computer Interaction and Usability Engineering of the Austrian Computer Society: information Quality in e-Health
Medical (visual) information retrieval
PROMISE'12 Proceedings of the 2012 international conference on Information Retrieval Meets Information Visualization
Computer Methods and Programs in Biomedicine
Hi-index | 0.00 |
Secondary use of health data has a vital role in improving and advancing medical knowledge. While digital health records offer scope for facilitating the flow of data to secondary uses, it remains essential that steps are taken to respect wishes of the patient regarding secondary usage, and to ensure the privacy of the patient during secondary use scenarios. Consent, together with depersonalisation and its related concepts of anonymisation, pseudonymisation, and data minimisation are key methods used to provide this protection. This paper gives an overview of technical, practical, legal, and ethical aspects of secondary data use and discusses their implementation in the multi-institutional @neurIST research project.