Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

De-identified data

The HIPAA rules require someone to de-identify data by removing all 18 elements that could be used to identify the individual or the individual s relatives, employers, or household members. The authorized person also must ensure that the remaining information could not be used alone or in combination with other information to identify the individual who is the subject of the information. They may also use statistical methods to establish de-identification instead of removing all 18 identifiers. The authorized person may obtain certification by a person with appropriate knowledge of and experience with generally accepted statistical and scientific principles and methods for rendering information not individually identifiable so that there is a very small risk that the information could be used by the recipient to identify the subject of the information, alone or in combination with other reasonably available information. [Pg.253]

CCAE MarketScan Commercial Qaims and Encounters Represents privately insured population and captures administrative daims with patient-level de identified data from inpatient and outpatient visits and pharmacy daims of multiple insurance plans Total 46.5 m % male 49% Mean age 31.4 (18.1) Pt-years 97.6 m 2003-2009... [Pg.161]

The comparative database has been a tremendous lesomee for irrformation about patient safety culture in US hospitals. Hospital de-identified data from the database has been made available to researchers. In addition, hospital-identifiable data has been made available to researchers interested in linking patient safety culture to other measiues of quality and safety. Research proposals requesting identifiable data have to be approved by both AHRQ and hospitals that submit data to the database. [Pg.267]

PHI is considered to be de-identified when the following data elements have been removed ... [Pg.512]

Prior to group discussions, informed consent was obtained. Participants were told that the tape recordings would be destroyed after transcription and the data collected during the focus groups would be de-identified. [Pg.217]

The key to normal operations data is to collect it in a non jeopardy, de-identified manner. Non jeopardy is not immunity I say again - non jeopardy is not immunity The data collected are all in terms of the threat and air management stractme. Threats are external to the individual. Errors are internal, made by the individual. Individuals do not see or report most of the threats that they deal with because they deal with them daily. Example weather if it is 120 degrees on the ramp or if it is minus 20 with ice and snow, the bags still need to be loaded, the engine still needs to be fixed and the crew still needs to do a walk aroimd inspection. Most do not see the weather as a threat they see it as just another lousy day. Mistakes, slips, lapses, commissions, omissions, and other unintentional errors, on the other hand most likely go unreported due to fear of punishment or simply embarrassment. [Pg.15]

De-identified, confidential and safety-minded data collection CORS observation worksheets were designed to ensure that no identifying information is recorded, such as names, train numbers, or dates of observation. [Pg.181]

An application of correlation analysis is the detection of related chemical de.scriptors when analyzing chemical data, correlation analysis should be used as a first step to identify those descriptors which are interrelated. 1 f two descriptors are strongly correlated, i.e, the correlation coefficient of two descriptors exceeds a certain value, e.g., r > 0.90, one of the descriptors can be excluded from the data set. [Pg.445]

Returning now to Beckwith s data we shall consider them on the basis of our discussion of aryl radical formation by electron transfer (Secs. 8.6, 10.5, and 10.6). It may appear surprising in Table 10-9 that Meijs and Beckwith (1986) carried out chloro- and bromo-de-diazoniations only with cupric salts. The authors point out, however, that they identified tiny amounts of cuprous impurities, and that relatively large concentrations of CunHlg2 are necessary for the second step in Scheme 10-80. [Pg.270]

It is seen that however sophisticated the software might be, it would be virtually impossible to de-convolute the peak into the three components. The peaks shown in the diagram are discernible because the peaks themselves were assumed and the composite envelope calculated. The envelope, however, would provide no basic data there is no hint of an approximate position for any peak maximum and absolutely no indication of the peak width of any of the components. The use of the diode array detector, monitoring at different wavelengths, might help by identifying uniquely one or more of the... [Pg.276]

The multivariate statistical data analysis, using principal component analysis (PCA), of this historical data revealed three main contamination profiles. A first contamination profile was identified as mostly loaded with PAHs. A samples group which includes sampling sites R1 (Ebro river in Miranda de Ebro, La Rioja), T3 (Zadorra river in Villodas, Alava) and T9 (Arga river in Puente la Reina, Navarra), all located in the upper Ebro river basin and close to Pamplona and Vitoria cities,... [Pg.146]

As a result of slow (thermal) neutron irradiation, a sample composed of stable atoms of a variety of elements will produce several radioactive isotopes of these activated elements. For a nuclear reaction to be useful analytically in the delayed NAA mode the element of interest must be capable of undergoing a nuclear reaction of some sort, the product of which must be radioactively unstable. The daughter nucleus must have a half-life of the order of days or months (so that it can be conveniently measured), and it should emit a particle which has a characteristic energy and is free from interference from other particles which may be produced by other elements within the sample. The induced radioactivity is complex as it comprises a summation of all the active species present. Individual species are identified by computer-aided de-convolution of the data. Parry (1991 42-9) and Glascock (1998) summarize the relevant decay schemes, and Alfassi (1990 3) and Glascock (1991 Table 3) list y ray energy spectra and percentage abundances for a number of isotopes useful in NAA. [Pg.126]

In de novo three-dimensional structure determinations of proteins in solution by NMR spectroscopy, the key conformational data are upper distance limits derived from nuclear Overhauser effects (NOEs) [11, 14]. In order to extract distance constraints from a NOESY spectrum, its cross peaks have to be assigned, i.e. the pairs of hydrogen atoms that give rise to cross peaks have to be identified. The basis for the NOESY assignment... [Pg.52]


See other pages where De-identified data is mentioned: [Pg.437]    [Pg.205]    [Pg.437]    [Pg.205]    [Pg.52]    [Pg.217]    [Pg.541]    [Pg.258]    [Pg.380]    [Pg.52]    [Pg.54]    [Pg.273]    [Pg.325]    [Pg.274]    [Pg.30]    [Pg.172]    [Pg.339]    [Pg.138]    [Pg.224]    [Pg.46]    [Pg.207]    [Pg.219]    [Pg.613]    [Pg.92]    [Pg.21]    [Pg.78]    [Pg.199]    [Pg.178]    [Pg.44]    [Pg.86]    [Pg.132]    [Pg.135]    [Pg.41]    [Pg.549]    [Pg.262]    [Pg.408]    [Pg.36]    [Pg.53]    [Pg.233]   
See also in sourсe #XX -- [ Pg.254 ]




SEARCH



© 2024 chempedia.info