Codes & Standards - Purchase
ISO 25237:2017
Health informatics — Pseudonymization
SKU: iso_063553_161023
Published by ISO
Publication Year 2017
1 Edition
62 pages
Product Details
ISO 25237:2017 contains principles and requirements for privacy protection using pseudonymization services for the protection of personal health information. This document is applicable to organizations who wish to undertake pseudonymization processes for themselves or to organizations who make a claim of trustworthiness for operations engaged in pseudonymization services.
ISO 25237:2017
- defines one basic concept for pseudonymization (see Clause 5),
- defines one basic methodology for pseudonymization services including organizational, as well as technical aspects (see Clause 6),
- specifies a policy framework and minimal requirements for controlled re-identification (see Clause 7),
- gives an overview of different use cases for pseudonymization that can be both reversible and irreversible (see Annex A),
- gives a guide to risk assessment for re-identification (see Annex B),
- provides an example of a system that uses de-identification (see Annex C),
- provides informative requirements to an interoperability to pseudonymization services (see Annex D), and
- specifies a policy framework and minimal requirements for trustworthy practices for the operations of a pseudonymization service (see Annex E).
ISO 25237:2017
- defines one basic concept for pseudonymization (see Clause 5),
- defines one basic methodology for pseudonymization services including organizational, as well as technical aspects (see Clause 6),
- specifies a policy framework and minimal requirements for controlled re-identification (see Clause 7),
- gives an overview of different use cases for pseudonymization that can be both reversible and irreversible (see Annex A),
- gives a guide to risk assessment for re-identification (see Annex B),
- provides an example of a system that uses de-identification (see Annex C),
- provides informative requirements to an interoperability to pseudonymization services (see Annex D), and
- specifies a policy framework and minimal requirements for trustworthy practices for the operations of a pseudonymization service (see Annex E).