ࡱ> DFC'` bjbj 4&     H(2F F F F F ! ! ! '''''''$z)h+'! ! ! ! ! 'F F ( ! F F ' ! ' |gF : ]VW 7 '(0H(x,A x,$gx,g` ! ! ! ! ! ! ! '' ! ! ! H(! ! ! !    Protected Health Information (PHI): Individually identifiable health information transmitted or maintained in any form or medium, including oral, written, and electronic communications. Individually identifiable health information relates to an individuals health status or condition, furnishing health services to an individual or paying or administering health care benefits to an individual. Information is considered PHI where there is a reasonable basis to believe the information can be used to identify an individual. Heathcare professionals have a duty to protect the confidentiality and integrity of PHI as required by law and professional ethics. Whenever possible, de-identified PHI should be used. De-identified PHI is rendered anonymous when identifying characteristics are completely removed. PHI must be de-identified prior to disclosure to non-authorized users. De-Identification of PHI Guidelines: All personnel must strictly observe the following guidelines relating to the de-identification of PHI: De-identification requires the elimination not only of primary or obvious identifiers, such as the patients name, address, date of birth (DOB), and treating physician, but also of secondary identifiers through which a user could deduce the patients identity. For information to be de-identified the following identifiers of the individual (or of relatives, employers, or household member of the individual) must be removed: Names Address information smaller than a state, including street address, city, county, zip code (except if by combining all zip codes with the same initial three digits, there are more than 20,000 people) Names of relatives and employers All element of dates (except year), including DOB, admission date, discharge date, date of death; and all ages over 89 and all elements of dates including year indicative of such age except that such ages and elements may be aggregated into a single category of age 90 or older; Telephone numbers Fax numbers Email addresses Social Security Number (SSN) Electronic Medical Record number (EMR) Health beneficiary plan number Account numbers Certificate/License Number Vehicle identifiers, including license plate numbers Device ID and serial number Uniform Resource Locator (URL) Identifier Protocol (IP) addresses Biometric identifiers Full face photographic images and other comparable images Any other unique identifying number, characteristic, or code. Whenever possible, de-identified PHI should be used for quality assurance monitoring and routine utilization reporting. If de-identified PHI cannot be used, a limited data set should be used whenever possible. PHI used for research, including public health research, should be de-identified at the point of data collection for research protocols approved by the IRB, unless the participant voluntarily and expressly consents to the use of his/her personally identifiable information or an IRB waiver of authorization is obtained. If de-identified PHI cannot be used for research, a limited data set should be used whenever possible. If an authorized user wishes to encrypt PHI when creating de-identified information the authorized user must ensure that: The code or other means of record identification is not derived from or related to information about the individual and is not otherwise capable of being translated so as to identify the individual; and Anyone involved in the research project does not use or disclose the code or other means of record identification and does not disclose the mechanism to accomplish re-identification. "#%&FGST* + r s     ( * - k ! " j k q r s ŸŸŸŸŸŸŸŸŸšŸŸŸŸŸŸrŸh\5h\55OJQJ\^Jh\55>*OJQJ\^J!h\5h\55>*OJQJ\^JhE7OJQJ^Jh\55OJQJ\^Jh\5h\5OJQJ^Jh\5OJQJ^Jh\5h\5>*OJQJ]^Jh\5h\5OJQJ]^J$h\5h\55>*OJQJ\]^J,%&  r s  z$CSn & F 17$8$H$^1`gd\5 7$8$H$gd\5  B C U V ,-jkXY#tuVWab01yz  HISTABQR  h\55OJQJ\^Jh\5OJQJ^Jh\5h\5OJQJ^JRQbc  RS    gd9E & F 117$8$H$^1`gd\5 7$8$H$^gd\5 7$8$H$gd\5 & F 17$8$H$^1`gd\5gd9E  h\5h9ECJOJQJ^JaJ h\5hE7CJOJQJ^JaJ21h:p\5/ =!"#$% @@@ NormalCJ_HaJmH sH tH DAD Default Paragraph FontRiR  Table Normal4 l4a (k(No ListDZ@D 9E Plain TextCJOJQJ^JaJ&%&rsz$CSn  Q b c R S    000000000000000000000000000000000000000000000000   8@0(  B S  ?%&(+-{jkqqt u RFR/'Ll:':nROVbnRhZÄ, }VN8&^`B*CJOJQJaJo(phhH"8^`OJQJ^Jo(hHo8pp^p`OJQJo(hH8@ @ ^@ `OJQJo(hH8^`OJQJ^Jo(hHo8^`OJQJo(hH8^`OJQJo(hH8^`OJQJ^Jo(hHo8PP^P`OJQJo(hH^`OJPJQJ^Jo(-^`OJQJ^Jo(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHh88^8`OJPJQJ^Jo(-h^`OJQJ^Jo(hHoh  ^ `OJQJo(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh88^8`OJPJQJ^Jo(-h^`OJQJ^Jo(hHoh  ^ `OJQJo(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh&^`B*CJOJQJaJo(phhHh^`OJQJ^Jo(hHoh  ^ `OJQJo(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hH^`OJPJQJ^Jo(-^`OJQJ^Jo(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHR/', }OVb:':hluK .o W\ o+ 7 8 B; A E H Y sr 5{9Qp ,4^6u r uE7v:;evn  ;Ii\ 3 !!]S!("^?"## p#y#$R$ !%\$&y$&"'(2())s )K*b*g+<+S,-A-4N-R-?o-8.V.x//[0/JC=>*?O?W?cmAnA8BQBD6DXD8hD]E9E F>Tnڳ=*="ڱ7)ʱ)*۴`-=qڳT3ʱ+C]^W!^\^Pa^___ _R_`jQ`n`/a0a saHb qbujcucdde7d;dCdRda;edffMfS.h2:hiK(i4ikKkVk?wk~lxl#l?l1Zlrm:nTnanrnoxospq>?qGhqKrfxrzr sst$t-t5@u*vw }w x-xLxTx5qxjy7(y-y|0y^IyizKzTzoz7{,w{|iI|l|~C~C~-F~E[~f~h xM! C)i<dXt.:>g (c)[k7<1IXpw#MKU|}}.t>+"%d)6lxz @Oe*/RK6 S}(2`MECatH@L\' K;@LYL\tb$SOl2es5f5> J 8l#q!+8q*}#m&. Z>9<{v"cW 27j>DMFnVoOeo[*36NozXq0K\`} gL\RS)-TR7rA`v78|n&O;D1JMzAF><}P~{%bH_HKa~"|m{( %v {9fmM(Fx-uCWb.08 m'GI  *\5a' 4IWKnXv8 $S:d{xOx&u?RF_hw0k Si)_H3?5Q]`}b`bGlBFO 'LOlF/i" >E14Kpyc0|}0;V"oSy ( &$8gu$$-/mfs)-2TK#&xoCyPA9qxs1X u+I ~ @t@ @UnknownGz Times New Roman5Symbol3& z Arial?5 : Courier New;Wingdings"qhFFZֆ  !r4d2QHX??@ABERoot Entry FabVWGData 1Table,WordDocument4&SummaryInformation(3DocumentSummaryInformation8;CompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q