Protected Health Information (PHI) is removed when used in marketing and research purposes. HIPPA includes no restriction on use or disclosure of de-identified information, however, there are regulations on specific procedures to protect PHI. Which method uses statistical principles and participant identification is very small.

- Expert Determination
- Omnibus Rule
- Safe Harbor
- Fair Information Practices


- Expert Determination

Computer Science & Information Technology

You might also like to view...

Write a class having a public pure virtual method. You need not put any other members in the class.

What will be an ideal response?

Computer Science & Information Technology

All of the following would be examples of ways to increase security on a network EXCEPT ________

A) installing bio metric equipment B) disabling e-mail C) setting up usernames and passwords D) giving only a few users permission to view sensitive files

Computer Science & Information Technology

The formula, =WEEKDAY(Monday), will return the value of 1.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When creating a password for a presentation, you must confirm it by entering it ____.

A. in all caps B. in encrypted format C. three times D. two times

Computer Science & Information Technology