Health Data Sharing Barriers and How to Overcome them:
Overcoming privacy and security.- If PHI is involved, apply high level encryption and two factor authentication methods; Covered Entities are to secure Business Associate Agreements (BAA) with Business Associates, and Business Associates with their Subcontractors; and use de-identification methods to de-identify the data when PHI is not needed to be present in the data.
Overcoming inaccuracies.-Scrub the data, structure the data, re-structure the data, and visualize the data.
Overcoming Interpretation of the data.-Specific data conveys specific information, based upon the context. Formulate your interpretation as follow: Based upon this data, it is reasonable to say that...
Comments