The Anatomy of the HIPAA Privacy Rule: A Risk-Based Approach as a Remedy for Privacy-Preserving Data Sharing

  • Makoto IguchiEmail author
  • Taro Uematsu
  • Tatsuro Fujii
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11049)


This paper explores the effectiveness of a risk-based approach methodology in constructing systematic standards for privacy-conscious data sharing and disclosure. We consider the HIPAA (Health Insurance Portability and Accountability Act of 1996) Privacy Rule as an example and show that the data disclosure methods defined in the HIPAA Privacy Rule are well-constituted, by assessing the privacy risks of each disclosure method. We further explore factors that contribute to the success of the HIPAA Privacy Rule and discuss how we can leverage these factors as a reference for constructing privacy-conscious and systematic data disclosure rules and regulations in other domains.


  1. 1.
    ISO/IEC 27005:2011: Information technology - Security techniques - Information security risk management. Standard, International Organization for Standardization (ISO) (2011)Google Scholar
  2. 2.
    Ross, R.S.: Nist sp 800–30 rev. 1: Guide for conducting risk assessments. Technical report (2012).
  3. 3.
    Open Web Application Security Project (OWASP): Owasp risk rating methodology (2016).
  4. 4.
    Garfinkel, S.L.: Nistir 8053: De-identification of personal information. Technical report, October 2015.
  5. 5.
    Commission Nationale de l’Informatique et des Libertés (CNIL): Methodology for Privacy Risk Management, Translation of June 2012 edition (2012)Google Scholar
  6. 6.
    Information Commissioner’s Office (ICO): Conducting Privacy Impact Assessments Code of Practice (2014)Google Scholar
  7. 7.
    ISO/IEC 29134:2017: Information technology - Security techniques - Guidelines for privacy impact assessment. Standard, International Organization for Standardization (ISO) (2017)Google Scholar
  8. 8.
    Information and Privacy Commissioner of Ontario: De-identification Guidelines for Structured Data (2016)Google Scholar
  9. 9.
    El Emam, K., Arbuckle, L.: Anonymizing Health Data: Case Studies and Methods to Get You Started, 1st edn. O’Reilly Media, Inc. (2013)Google Scholar
  10. 10.
    Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 2008 IEEE Symposium on Security and Privacy (sp 2008), pp. 111–125, May 2008Google Scholar
  11. 11.
    Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 173–187, May 2009Google Scholar
  12. 12.
    de Montjoye, Y.A., Radaelli, L., Singh, V., Pentland, A.: Unique in the shopping mall: on the reidentifiability of credit card metadata. Science 347(6221), 536–539 (2015)CrossRefGoogle Scholar
  13. 13.
    Douriez, M., Doraiswamy, H., Freire, J., Silva, C.T.: Anonymizing nyc taxi data: Does it matter? In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 140–148, October 2016Google Scholar
  14. 14.
    European Commission Article 29 Data Protection Working Party: Opinion 05/2014 on Anonymisation Techniques (2014)Google Scholar
  15. 15.
    Mendes, R., Vilela, J.P.: Privacy-preserving data mining: methods, metrics, and applications. IEEE Access 5, 10562–10582 (2017)CrossRefGoogle Scholar
  16. 16.
    Elliot, M., Mackey, E., O’Hara, K., Tudor, C.: The Anonymisation Decision Making Framework. UKAN, United Kingdom (2016)Google Scholar
  17. 17.
    U.S. Department of Health & Human Services, Office for Civil Rights: Health information privacy (2015).
  18. 18.
    Chesanow, N.: Is hipaa creating more problems than it’s preventing? (2013).
  19. 19.
    U.S. Department of Health & Human Services, Office for Civil Rights: Guidance on hipaa & cloud computing (2017).
  20. 20.
    U.S. Department of Health & Human Services, Office for Civil Rights: Guidance regarding methods for de-identification of protected health information in accordance with the health insurance portability and accountability act (hipaa) privacy rule (2015).
  21. 21.
    Benitez, K., Malin, B.: Evaluating re-identification risks with respect to the hipaa privacy rule. J. Am. Med. Inf. Assoc. 17(2), 169–177 (2010)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.Kii CorporationTokyoJapan

Personalised recommendations