You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/healthcare-apis/deidentification/overview.md
+10-12Lines changed: 10 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,22 +52,22 @@ Consistent surrogation results enable organizations to retain relationships that
52
52
53
53
The de-identification service offers many benefits, including:
54
54
55
-
-**Expanded PHI coverage:** The service expands beyond the 18 HIPAA identifiers to provide stronger privacy protections and more fine-grained distinctions between entity types. It distinguishes between doctor and patient and covers [27 PHI entities that the service de-identifies](/rest/api/health-dataplane/deidentify-text/deidentify-text#phicategory).
56
-
-**PHI compliance:** The de-identification service is designed for PHI. The service uses machine learning to identify PHI entities, including HIPAA's 18 identifiers, by using the `TAG` operation. The redaction and surrogation operations replace these identified PHI values with a tag of the entity type or a surrogate or pseudonym. The service supports compliance requirements such as HIPAA and GDPR principles.
57
-
-**Security:** The de-identification service is a stateless service. Customer data stays within the customer's tenant.
58
-
-**Role-based access control:** Azure role-based access control enables you to manage how your organization's data is processed, stored, and accessed. You determine who has access to de-identify datasets based on roles that you define for your environment.
55
+
-**Expanded PHI coverage**: The service expands beyond the 18 HIPAA identifiers to provide stronger privacy protections and more fine-grained distinctions between entity types. It distinguishes between doctor and patient and covers [27 PHI entities that the service de-identifies](/rest/api/health-dataplane/deidentify-text/deidentify-text#phicategory).
56
+
-**PHI compliance**: The de-identification service is designed for PHI. The service uses machine learning to identify PHI entities, including HIPAA's 18 identifiers, by using the `TAG` operation. The redaction and surrogation operations replace these identified PHI values with a tag of the entity type or a surrogate or pseudonym. The service supports compliance requirements such as HIPAA and GDPR principles.
57
+
-**Security**: The de-identification service is a stateless service. Customer data stays within the customer's tenant.
58
+
-**Role-based access control (RBAC)**: Azure RBAC enables you to manage how your organization's data is processed, stored, and accessed. You determine who has access to de-identify datasets based on roles that you define for your environment.
59
59
60
60
## Easy API integration into your workflow
61
61
62
62

63
63
64
64
Integrating the Azure de-identification service into your environment is fast, flexible, and secure. The service is built to support health and life sciences workflows with minimal effort.
65
65
66
-
-**API-first design:** Determine whether you need real-time de-identification or asynchronous batch processing from Azure Blob Storage. The REST API and SDKs provide easy integration points to fit your system.
67
-
-**Quick setup:** Deploy the service in minutes by using the Azure portal, Azure Resource Manager templates, Bicep, or the Azure CLI. You can be up and running quickly without complex configuration.
68
-
-**Secure access:** Enable private endpoints by using Azure Private Link to keep data traffic off the public internet.
69
-
-**Fully managed identity support:** Use managed identities for secure, credential-free access to Azure Blob Storage.
70
-
-**Compliance-ready:** Operate the service within your Azure tenant and to adhere with HIPAA.
66
+
-**API-first design**: Determine whether you need real-time de-identification or asynchronous batch processing from Azure Blob Storage. The REST API and SDKs provide easy integration points to fit your system.
67
+
-**Quick setup**: Deploy the service in minutes by using the Azure portal, Azure Resource Manager templates, Bicep, or the Azure CLI. You can be up and running quickly without complex configuration.
68
+
-**Secure access**: Enable private endpoints by using Azure Private Link to keep data traffic off the public internet.
69
+
-**Fully managed identity support**: Use managed identities for secure, credential-free access to Azure Blob Storage.
70
+
-**Compliance-ready**: Operate the service within your Azure tenant and to adhere with HIPAA.
71
71
72
72
## Synchronous or asynchronous endpoints
73
73
@@ -85,9 +85,7 @@ The following service limits apply:
85
85
- Requests can't exceed 50 KB.
86
86
- Jobs can process no more than 10,000 documents.
87
87
- Each document processed by a job can't exceed 2 MB.
88
-
- Requests are throttled if you exceed 1 MB per 5 seconds or 100 requests per 5 seconds.<sup>1</sup>
89
-
90
-
<sup>1</sup> If your use case requires higher throughput, submit a support request for consideration.
88
+
- Requests are throttled if you exceed 1 MB per 5 seconds or 100 requests per 5 seconds. If your use case requires higher throughput, submit a support request for consideration.
Copy file name to clipboardExpand all lines: articles/healthcare-apis/deidentification/quickstart-asynchronous-python.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,20 +22,20 @@ When you choose to store documents in Azure Blob Storage, you're charged based o
22
22
23
23
## Prerequisites
24
24
25
-
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn)
26
-
* A de-identification service with system-assigned managed identity. [Deploy the de-identification service](quickstart.md)
25
+
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
26
+
* A de-identification service with a system-assigned managed identity. To create one, use the following steps. For more information, see [Deploy the de-identification service](quickstart.md).
27
27
28
-
1. In the top search bar, enter **De-identification**.
29
-
1. Select **De-identification Services** from the search results.
30
-
1. Select **Create**.
31
-
1. Fill in required subscription and instance details.
32
-
1. Select **Review + create**, and then select **Create**.
33
-
1. After deployment is finished, go to the resource and copy your service URL and subscription ID.
28
+
1. In the top search bar, enter **De-identification**.
29
+
1. Select **De-identification Services** from the search results.
30
+
1. Select **Create**.
31
+
1. Fill in required subscription and instance details.
32
+
1. Select **Review + create**, and then select **Create**.
33
+
1. After deployment is finished, go to the resource and copy your service URL and subscription ID.
34
34
35
-
> [!IMPORTANT]
36
-
> To use the Batch (asynchronous) API with the multilingual model, ensure that you have the DeID Batch Data Owner role assigned to your identity in **Access Control (IAM)**.
35
+
> [!IMPORTANT]
36
+
> To use the Batch (asynchronous) API with the multilingual model, ensure that you have the DeID Batch Data Owner role assigned to your identity in **Access Control (IAM)**.
37
37
38
-
Install the [Azure CLI](/cli/azure/install-azure-cli), and open your terminal of choice. In this tutorial, we use Azure PowerShell.
38
+
* Installation of the [Azure CLI](/cli/azure/install-azure-cli). After you install it, open your terminal of choice. In this tutorial, we use Azure PowerShell.
39
39
40
40
## Create a storage account and container
41
41
@@ -93,7 +93,7 @@ Next, you upload a document that contains synthetic protected health information
93
93
94
94
In this step, you grant role-based access to the container for the system-assigned managed identity of the de-identification service.
95
95
96
-
You grant the Storage Blob the Data Contributor role because the de-identification service reads the original document and writes the de-identified output documents.
96
+
You grant the Storage Blob Data Contributor role because the de-identification service reads the original document and writes the de-identified output documents.
97
97
98
98
Substitute the name of your de-identification service for the `<deid_service_name>` placeholder:
0 commit comments