No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Data Privacy

Demystifying Data De-Identification for US Privacy Compliance

Making consumers’ digital identities disappear isn’t magic

by L. Hannah Ji-Otto, David Chen and Julie Kilgore
October 30, 2024
in Data Privacy, Featured
demystifying data de ID collage

De-identification is a valuable tool for protecting consumer privacy, but the process requires diligent compliance with multiple state and federal standards. L. Hannah Ji-Otto and Julie A. Kilgore, both of Baker Donelson, and legal adviser David Chen explore the various regulatory perspectives on data de-identification and their implications for businesses operating in the United States.

Businesses concerned about their data and technology use complying with privacy laws are focusing on de-identification, the process of altering information to safeguard individual identities.

The identifiability of data exists on a spectrum. On one end is directly identifiable data — e.g., Social Security numbers and email addresses. On the other end is non-personal data, such as the number of downloads for a specific app in a week. Shifting data along this spectrum through de-identification can potentially reduce a business’s privacy compliance obligations, given that deidentified data often enjoys exemptions under federal and state laws. However, ensuring that data de-identification meets these legal standards is a complex process.

Deidentifying PHI under HIPAA

HIPAA has long permitted de-identification of protected health information (PHI) by entities regulated under HIPAA to support secondary uses of data for comparative effectiveness studies, policy assessment and other life sciences research. The HIPAA privacy rule provides two methods for de-identification: expert determination and safe harbor.

Expert determination requires an expert to determine and document a very small risk that an anticipated recipient could use the information to identify the individual. Safe harbor requires the removal of 18 identifiers, with the de-identifying entity possessing no actual knowledge that the information could be used to identify the individual.

Whichever method is used, the privacy rule considers PHI de-identified if such information does not identify the subject of the PHI and there is no reasonable basis to believe that the information can be used to identify the individual. Notably, the U.S. Department of Health and Human Services’ Office for Civil Rights (OCR), which enforces HIPAA, acknowledges the potential for re-identification of properly deidentified data because the HIPAA de-identification standards and methods do not require a zero risk of identification. Once medical records have been appropriately deidentified, HIPAA poses no obstacle to the production of the records. However, depending on the retained information, this deidentified data may still fall under other regulatory or contractual obligations.

pitfall video game
Data Privacy

How Leaders Can Avoid Modern Data Pitfalls

by Bobby Balachandran
September 30, 2024

Mitigating risks of data is critical to getting the most out of new technology

Read moreDetails

FTC’s views on data de-identification

In the past decade, the FTC has consistently stressed effective de-identification of data. The FTC can enforce against unfair or deceptive acts or practices in commerce, including bringing actions against companies that fail to protect consumer data. Its rulings do not override HIPAA’s de-identification standard with respect to PHI.

Recently, the FTC has clarified its position on de-identification, adopting an approach like the California Consumer Privacy Act (CCPA) in defining “de-identification” in its actions against InMarket Media and X-Mode Social. The FTC alleged that both companies collected, aggregated and sold to third parties location-related information from consumers without their informed consent. Both companies settled, agreeing to delete certain offending location data. Interestingly, the FTC exempted “de-identified data” from this deletion requirement, suggesting that deidentified data is not the primary concern of the FTC.

In both instances, the FTC adopted the same definition of de-identified data as the CCPA. The FTC defines de-identified information as data that cannot reasonably be associated with or linked, either directly or indirectly, to a specific consumer. This depends on whether the de-identifying business meets four criteria: (i) it implements technical safeguards to prevent the re-identification of the consumer to whom the information pertains, (ii) it has business processes that specifically prohibit the re-identification of the information, (iii) it implements measures to prevent the inadvertent release of de-identified information and (iv) it makes no attempt to re-identify the information. 

It’s worth noting that the FTC does not regard data linked to a mobile advertising identifier or an individual’s home as de-identified data.

State privacy laws: The CCPA example

Most state privacy laws have varying exemptions for de-identified data. As of the latest update, 18 states have comprehensive data privacy laws. These laws don’t override or change HIPAA’s requirements for PHI. Technically, many de-identification methods can be easily reversed, making the practical effectiveness of these exemptions uncertain. There is minimal guidance from state regulators or legal precedents regarding the reidentification of de-identified data.

For example, the CCPA does not classify de-identified data as “personal information,” thus exempting it. There have been no direct enforcement actions in California regarding the de-identification of personal information. The California Privacy Protection Agency considers data minimization a foundational principle of the CCPA, applicable to all purposes for which a business collects, uses, retains, and shares consumers’ personal information.

De-identification could achieve a key balance — keeping the utility of collected data while adhering to the CCPA’s data minimization principle. To the extent that deidentified data can still provide insights to consumer behaviors, trends or patterns, removing unnecessary identifiers achieves business purposes without infringing on consumer privacy.

Practical considerations for U.S. businesses

Data de-identification provides a compelling strategy to derive value from collected data while complying with privacy laws, including the principle of data minimization. Federal and state regulators have developed more robust de-identification standards for consumer information compared to those set by HIPAA for PHI. This has complicated the process of shifting datasets across the identification spectrum, thereby enhancing the protection of individuals’ privacy rights.

As privacy laws expand and enforcement actions intensify, relying on a single de-identification standard may not suffice. For example, if a dataset is classified as PHI and is also subject to federal and state privacy laws, data deidentified under HIPAA might still fall under the jurisdiction of the FTC or state privacy regulations.

In conclusion, de-identification is a valuable tool for protecting privacy, but it requires diligent compliance with regulatory standards. Companies considering de-identification as a part of their privacy law compliance strategy should:

  1. Conduct an assessment of the jurisdiction of origin and the characteristics of the personal information to accurately determine the applicable de-identification standard(s).
  2. Implement de-identification techniques that are appropriate for the data type, considering available resources and industry best practices to ensure effective de-identification.
  3. Establish, enforce and update internal procedures and technical safeguards to prevent the re-identification of data.

Tags: California Consumer Privacy Act (CCPA)Data GovernanceHIPAA
Previous Post

The Long Shadow of a Cyber Breach

Next Post

More Than Half of Companies Admit to Bending on Compliance in the Face of Business Pressure

L. Hannah Ji-Otto, David Chen and Julie Kilgore

L. Hannah Ji-Otto, David Chen and Julie Kilgore

L. Hannah Ji-Otto, of counsel in Baker Donelson’s Nashville office, is an experienced privacy and security attorney who regularly advises domestic and international clients on all aspects of data security, privacy and technology transactions.
David Chen is legal director of product and privacy at a stealth mode, pre-IPO, food tech startup. He advises the company on domestic and international privacy and technology transactions matters.
Julie A. Kilgore, an associate in Baker Donelson’s Nashville office, is an experienced data licensing attorney who regularly handles complex technology transactions and advises clients on aspects of data use, privacy and security, primarily in the healthcare space.

Related Posts

doj building sign with flags

‘Reasonable Steps’: What the DOJ Expects From Your Bulk Data Transfer Compliance Program

by Alexandra P. Moylan, Alisa L. Chestler and Michael J. Halaiko
May 5, 2025

Sample provisions offer blueprint for compliant data brokerage with foreign entities

data security program concept cameras

Your Sensitive Data Is Now a National Security Matter: The DOJ’s New Data Security Program

by Randall Cook, Vince Mekles and Rachel Woloszynski
April 29, 2025

90-day implementation window closing on regulations affecting companies with genomic, biometric, health and other personal information

virginia state flag

Are You Ready for Virginia’s Sweeping Reproductive Health Privacy Law?

by Meghan O’Connor
April 29, 2025

Broadly defined ‘reproductive and sexual health information’ may affect any company doing business in the state

federal trade commission building

[Q&A] Big Tech & Free Speech Under the Microscope: FTC’s New Direction

by FTI Consulting
April 28, 2025

What compliance teams need to know about the changing approach to consumer protection and data privacy

Next Post
news roundup new

More Than Half of Companies Admit to Bending on Compliance in the Face of Business Pressure

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights