10 Best Practices for Re-identification Risk Determinations

10 Best Practices for Re-identification Risk Determinations

An article by Brian Rasquinha, Associate Director, Solution Architecture, Privacy Analytics

Re-identification Risk Determinations (RRDs) are assessments where an expert applies generally accepted statistical methods to determine how identifiable individuals are in a dataset. The expert will recommend necessary changes to de-identify or anonymize the data and may act as a Trusted Third Party (TTP) to apply those changes.

RRDs are aligned with the Expert Determination method under the Health Insurance Portability and Accountability Act (HIPAA) and assessments of identifiability under the General Data Protection Regulation (GDPR).

Experts performing these assessments pay a lot of attention to the statistical methods used. However, several non-technical factors can increase (or decrease!) the likelihood that a data privacy initiative is successful.

Privacy Analytics has been supporting clients and partners with RRDs since 2007. In that time, we’ve discovered several factors that can significantly impact your organization’s ability to reach its desired outcomes. Drawing from those, here is a summary of 10 best practices for RRDs:

  1. Partner with your de-identification or anonymization expert to build their familiarity with your data, use case, and stakeholders. A partnership can streamline ongoing assessments, helping improve the efficiency and effectiveness of continuing collaboration.
  2. Challenge your organizational assumptions around what types of data can or can’t be de-identified or anonymized and what the resulting data will look like. Technology and capabilities evolve rapidly, and increasingly complex data privacy projects like tokenization, unstructured text, or imaging data are now quite tractable.
  3. Plan for anticipated changes in data, data flows, end users, or environments – an RRD may be able to accommodate planned scenarios that aren’t yet in place. You can also consider setting up RRDs that can be adaptable or amendable to cover foreseen (or unforeseen!) changes in the scope of the de-identified or anonymized data sharing.
  4. Identify similar data-sharing scenarios, which can be opportunities to streamline the assessment of multiple scenarios under a single RRD. This can reduce effort, time, and cost in documenting de-identification or anonymization approaches.
  5. Assemble the right project team to support an RRD. The involvement of data experts, legal/governance representatives, and an end user ensures that the project is well-informed about the nature and provenance of the data, the regulatory and contractual requirements, and the ultimate needs of the de-identified or anonymized data.
  6. Understand where the data is going, as the likelihood of a re-identification attempt occurring and being successful is directly informed by the end user, destination environment, and co-located data assets therein.
  7. Know your business priorities, as RRDs can be tailored for speed, affordability, or flexibility. The appropriate balance of emphasis will be specific to the needs of your organization.
  8. Understand the needs of end users, who will ultimately derive value from the de-identified or anonymized data. The fields and data granularity necessary are driven by end-user needs, which can vary from case to case, so early alignment will help avoid expensive and time-consuming rework.
  9. Work with clean data where possible. While designing a pipeline for de-identified or anonymized data, positioning data cleanup upstream of the RRD will streamline the RRD process and ensure data quality. This can be either independently of RRD or as part of a TTP function bundled with an RRD to provide private and curated data output.
  10. Keep track of the RRD expiry to avoid being caught flat-footed and ensure there are no gaps in defensibility documentation.

These best practices can enable you to streamline the Re-identification Risk Determination process, reducing costs, increasing efficiency, and improving your return on investment in data privacy.

Contact an expert at Privacy Analytics to discuss Re-identification Risk Determinations and how the right approach can provide a smoother, higher-value experience for your organization.

Archiving / Destroying

Are you unleashing the full value of data you retain?

Your Challenges

Do you need help...

OUR SOLUTION

Value Retention

Client Success

Client: Comcast

Situation: California’s Consumer Privacy Act inspired Comcast to evolve the way in which they protect the privacy of customers who consent to share personal information with them.

Evaluating

Are you achieving intended outcomes from data?

Your Challenge

Do you need help...

OUR SOLUTION

Unbiased Results

Client Success

Client: Integrate.ai

Situation: Integrate.ai’s AI-powered tech helps clients improve their online experience by sharing signals about website visitor intent. They wanted to ensure privacy remained fully protected within the machine learning / AI context that produces these signals.

Accessing

Do the right people have the right data?

Your Challenges

Do you need help...

OUR SOLUTION

Usable and Reusable Data

Client Success

Client: Novartis

Situation: Novartis’ digital transformation in drug R&D drives their need to maximize value from vast stores of clinical study data for critical internal research enabled by their data42 platform.

 

Maintaining

Are you empowering people to safely leverage trusted data?

Your Challenges

Do you need help...

OUR SOLUTION

Security / compliance efficiency

CLIENT SUCCESS

Client: ASCO’s CancerLinQ

Situation: CancerLinQ™, a subsidiary of American Society of Clinical Oncology, is a rapid learning healthcare system that helps oncologists aggregate and analyze data on cancer patients to improve care. To achieve this goal, they must de-identify patient data provided by subscribing practices across the U.S.

 

Acquiring / Collecting

Are you acquiring the right data? Do you have appropriate consent?

Your Challenge

Do you need help...

OUR SOLUTIONS

Consent / Contracting strategy

Client Success

Client: IQVIA

Situation: Needed to ensure the primary market research process was fully compliant with internal policies and regulations such as GDPR. 

 

Planning

Are You Effectively Planning for Success?

Your Challenges

Do you need help...

OUR SOLUTION

Build privacy in by design

Client Success

Client: Nuance

Situation: Needed to enable AI-driven product innovation with a defensible governance program for the safe and responsible use
of voice-to-text data under Shrems II.

 

Join the next 5 Safes Data Privacy webinar

This course runs on the 2nd Wednesday of every month, at 11 a.m. ET (45 mins). Click the button to register and select the date that works best for you.