In this issue, our Ask a HITRUST Expert feature with Dr. Bryan Cline briefly addresses what students can expect from the HITRUST Data De-identification Methodology Training and Certification Course.
HITRUST rolled out a new data de-identification methodology training and certification program in 2016, and–after the first two classes—I’d like to offer a bit of advice for prospective students in 2017. The de-identification methodology training course should be viewed as a “prep course” similar to those for other professional certifications, i.e., it’s designed to review information and practices that a de-identification professional is expected to know (sometimes referred to as a “common body of knowledge”).
The course will help identify gaps in your knowledge of de-identification in general and contextual de-identification in particular, after which you should set aside sufficient study time to address those gaps before attempting the certification examination. Less experienced candidates will obviously need more study time than their more experienced colleagues, so please plan accordingly. Those individuals that have the requisite statistical background will receive the Certified De-Identification Professional (CDP) credential upon passing the exam and certifying relevant education and experience. Those candidates that do not have the requisite statistical background will receive the Certified De-Identification Associate (CDA) designation.
Dr. Bryan Cline is Vice President of Standards and Analytics at HITRUST. Twitter: @IA_Doctor
You may be interested
Ensuring the Integrity of HITRUST CSF® AssessmentsSandra Omielanczuk - Jan 29, 2019
By Ken Vander Wal, Chief Compliance Officer HITRUST® There is a common theme among many of our clients following their…
Improving Cloud Security with a Shared Responsibility ModelSierra Reed - Jan 07, 2019
HITRUST streamlines the process to determine who’s responsible for what security controls among your service providers By Hector Rodriguez, Worldwide…
From Providers to Patients: Time to Protect the Entire Healthcare Supply ChainLacy Deatrich - Dec 18, 2018
Written by Taylor Lehmann, Chief Information Security Officer, Wellforce The patient-care ecosystem is a complex mix of healthcare providers, payers…