What can I expect from the HITRUST De-identification Methodology Training Course?

February 21, 2017
1069 Views

In this issue, our Ask a HITRUST Expert feature with Dr. Bryan Cline briefly addresses what students can expect from the HITRUST Data De-identification Methodology Training and Certification Course.

HITRUST rolled out a new data de-identification methodology training and certification program in 2016, and–after the first two classes—I’d like to offer a bit of advice for prospective students in 2017. The de-identification methodology training course should be viewed as a “prep course” similar to those for other professional certifications, i.e., it’s designed to review information and practices that a de-identification professional is expected to know (sometimes referred to as a “common body of knowledge”).

The course will help identify gaps in your knowledge of de-identification in general and contextual de-identification in particular, after which you should set aside sufficient study time to address those gaps before attempting the certification examination. Less experienced candidates will obviously need more study time than their more experienced colleagues, so please plan accordingly. Those individuals that have the requisite statistical background will receive the Certified De-Identification Professional (CDP) credential upon passing the exam and certifying relevant education and experience. Those candidates that do not have the requisite statistical background will receive the Certified De-Identification Associate (CDA) designation.

Dr. Bryan Cline is Vice President of Standards and Analytics at HITRUST. Twitter: @IA_Doctor

Share this with your friends...Share on Google+Tweet about this on TwitterShare on LinkedInEmail this to someone

You may be interested

Ensuring the Integrity of HITRUST CSF® Assessments
CISO Corner
shares551 views
CISO Corner
shares551 views

Ensuring the Integrity of HITRUST CSF® Assessments

Sandra Omielanczuk - Jan 29, 2019

By Ken Vander Wal, Chief Compliance Officer HITRUST® There is a common theme among many of our clients following their…

Improving Cloud Security with a Shared Responsibility Model
CISO Corner
shares804 views
CISO Corner
shares804 views

Improving Cloud Security with a Shared Responsibility Model

Sierra Reed - Jan 07, 2019

HITRUST streamlines the process to determine who’s responsible for what security controls among your service providers By Hector Rodriguez, Worldwide…

From Providers to Patients: Time to Protect the Entire Healthcare Supply Chain
Leadership
shares774 views
Leadership
shares774 views

From Providers to Patients: Time to Protect the Entire Healthcare Supply Chain

Lacy Deatrich - Dec 18, 2018

Written by Taylor Lehmann, Chief Information Security Officer, Wellforce The patient-care ecosystem is a complex mix of healthcare providers, payers…