What can I expect from the HITRUST De-identification Methodology Training Course?

February 21, 2017
1609 Views

In this issue, our Ask a HITRUST Expert feature with Dr. Bryan Cline briefly addresses what students can expect from the HITRUST Data De-identification Methodology Training and Certification Course.

HITRUST rolled out a new data de-identification methodology training and certification program in 2016, and–after the first two classes—I’d like to offer a bit of advice for prospective students in 2017. The de-identification methodology training course should be viewed as a “prep course” similar to those for other professional certifications, i.e., it’s designed to review information and practices that a de-identification professional is expected to know (sometimes referred to as a “common body of knowledge”).

The course will help identify gaps in your knowledge of de-identification in general and contextual de-identification in particular, after which you should set aside sufficient study time to address those gaps before attempting the certification examination. Less experienced candidates will obviously need more study time than their more experienced colleagues, so please plan accordingly. Those individuals that have the requisite statistical background will receive the Certified De-Identification Professional (CDP) credential upon passing the exam and certifying relevant education and experience. Those candidates that do not have the requisite statistical background will receive the Certified De-Identification Associate (CDA) designation.

Dr. Bryan Cline is Vice President of Standards and Analytics at HITRUST. Twitter: @IA_Doctor

Share this with your friends...Share on Google+Tweet about this on TwitterShare on LinkedInEmail this to someone

You may be interested

“Using Work of Others” Initiative from HITRUST Streamlines IT Security Control Assessments to Promote a Culture of Risk Management Collaboration
Compliance & Risk Management
shares135 views
Compliance & Risk Management
shares135 views

“Using Work of Others” Initiative from HITRUST Streamlines IT Security Control Assessments to Promote a Culture of Risk Management Collaboration

Lacy Deatrich - Sep 11, 2019

By Jeremy Huval, Vice President, Compliance & Internal Audit Completing HITRUST CSF Assessments will now require less time and fewer…

HITRUST® Submits Application to be an Accountability Agent for APEC Certification
Privacy
shares265 views
Privacy
shares265 views

HITRUST® Submits Application to be an Accountability Agent for APEC Certification

Lacy Deatrich - Aug 14, 2019

By Anne Kimbol, Chief Privacy Officer, HITRUST HITRUST has submitted its application to be recognized as an Accountability Agent under…

HITRUST Shared Responsibility Program Helps Organizations and Cloud Service Providers Collaborate to Protect Data in the Cloud
Compliance & Risk Management
shares116 views
Compliance & Risk Management
shares116 views

HITRUST Shared Responsibility Program Helps Organizations and Cloud Service Providers Collaborate to Protect Data in the Cloud

Lacy Deatrich - Jul 08, 2019

By Becky Swain, Director, Standards Development Your cloud provider is certified to comply with all the major regulations for protecting…