This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revision Both sides next revision | ||
data_compliance_and_wsi [2023/11/09 17:16] chris |
data_compliance_and_wsi [2023/11/09 17:17] chris |
||
---|---|---|---|
Line 11: | Line 11: | ||
Pathology societies have not implemented a definitive framework yet, and previous efforts to make WSI part of DICOM were not successful due to the complexity of WSI and differences in pathology clinical workflows. Despite the absence of reference literature from professional pathology societies, general guidelines and use cases have been published in recent years. Articles focused on how to lawfully and ethically process WSIs as patient data point to pseudonymization as a relevant strategy to ensure data compliance, and perhaps most importantly, as a strategy to avoid data breaches and its negative consequences for both patients and organizations. In fact pseudonymization is often part of basic but sound strategies when it comes to protect personal data in general, as explained by Thomas Zerdick (2021):\\ | Pathology societies have not implemented a definitive framework yet, and previous efforts to make WSI part of DICOM were not successful due to the complexity of WSI and differences in pathology clinical workflows. Despite the absence of reference literature from professional pathology societies, general guidelines and use cases have been published in recent years. Articles focused on how to lawfully and ethically process WSIs as patient data point to pseudonymization as a relevant strategy to ensure data compliance, and perhaps most importantly, as a strategy to avoid data breaches and its negative consequences for both patients and organizations. In fact pseudonymization is often part of basic but sound strategies when it comes to protect personal data in general, as explained by Thomas Zerdick (2021):\\ | ||
- | "If you do not need personal data, do not collect personal data (…) if you really need personal data, then start by pseudonymising this personal data."\\ | + | //"If you do not need personal data, do not collect personal data (…) if you really need personal data, then start by pseudonymising this personal data."// \\ |
**References**\\ | **References**\\ |