I.S. EN ISO 25237:2017
Current
The latest, up-to-date edition.
HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017)
Hardcopy , PDF
English
01-01-2017
For Harmonized Standards, check the EU site to confirm that the Standard is cited in the Official Journal.
Only cited Standards give presumption of conformance to New Approach Directives/Regulations.
National Foreword
European foreword
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated terms
5 Requirements for privacy protection of identities in
healthcare
6 Protecting privacy through pseudonymization
7 Re-identification process
Annex A (informative) - Healthcare pseudonymization scenarios
Annex B (informative) - Requirements for privacy risk analysis
Annex C (informative) - Pseudonymization process (methods and
implementation)
Annex D (informative) - Specification of methods and implementation
Annex E (informative) - Policy framework for operation of
pseudonymization services (methods and implementation)
Annex F (informative) - Genetic information
Bibliography
Provides principles and requirements for privacy protection using pseudonymization services for the protection of personal health information.
DocumentType |
Standard
|
Pages |
80
|
PublisherName |
National Standards Authority of Ireland
|
Status |
Current
|
Standards | Relationship |
ISO 25237:2017 | Identical |
EN ISO 25237:2017 | Identical |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ANSI X9.52 : 1998 | TRIPLE DATA ENCRYPTION ALGORITHM MODES OF OPERATION |
ISO/IEC 27033-1:2015 | Information technology Security techniques Network security Part 1: Overview and concepts |
ISO 12052:2017 | Health informatics — Digital imaging and communication in medicine (DICOM) including workflow and data management |
ISO/TS 22220:2011 | Health informatics — Identification of subjects of health care |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 2382-8:1998 | Information technology Vocabulary Part 8: Security |
ISO/IEC 2382:2015 | Information technology — Vocabulary |
ENV 13608-1:2000 | Health informatics - Security for healthcare communication - Part 1: Concepts and terminology |
ISO/TR 21089:2004 | Health informatics Trusted end-to-end information flows |
ISO/IEC 18014-1:2008 | Information technology Security techniques Time-stamping services Part 1: Framework |
ISO 27799:2016 | Health informatics Information security management in health using ISO/IEC 27002 |
ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.