Skip to content

Commit 1fb7e47

Browse files
committed
Merge branch 'de-identification-service-articles' of https://github.com/paulth1/azure-docs-pr into de-identification-service-articles
2 parents c2cfa54 + 665e794 commit 1fb7e47

4 files changed

Lines changed: 43 additions & 45 deletions

File tree

articles/healthcare-apis/deidentification/overview.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -52,22 +52,22 @@ Consistent surrogation results enable organizations to retain relationships that
5252

5353
The de-identification service offers many benefits, including:
5454

55-
- **Expanded PHI coverage:** The service expands beyond the 18 HIPAA identifiers to provide stronger privacy protections and more fine-grained distinctions between entity types. It distinguishes between doctor and patient and covers [27 PHI entities that the service de-identifies](/rest/api/health-dataplane/deidentify-text/deidentify-text#phicategory).
56-
- **PHI compliance:** The de-identification service is designed for PHI. The service uses machine learning to identify PHI entities, including HIPAA's 18 identifiers, by using the `TAG` operation. The redaction and surrogation operations replace these identified PHI values with a tag of the entity type or a surrogate or pseudonym. The service supports compliance requirements such as HIPAA and GDPR principles.
57-
- **Security:** The de-identification service is a stateless service. Customer data stays within the customer's tenant.
58-
- **Role-based access control:** Azure role-based access control enables you to manage how your organization's data is processed, stored, and accessed. You determine who has access to de-identify datasets based on roles that you define for your environment.
55+
- **Expanded PHI coverage**: The service expands beyond the 18 HIPAA identifiers to provide stronger privacy protections and more fine-grained distinctions between entity types. It distinguishes between doctor and patient and covers [27 PHI entities that the service de-identifies](/rest/api/health-dataplane/deidentify-text/deidentify-text#phicategory).
56+
- **PHI compliance**: The de-identification service is designed for PHI. The service uses machine learning to identify PHI entities, including HIPAA's 18 identifiers, by using the `TAG` operation. The redaction and surrogation operations replace these identified PHI values with a tag of the entity type or a surrogate or pseudonym. The service supports compliance requirements such as HIPAA and GDPR principles.
57+
- **Security**: The de-identification service is a stateless service. Customer data stays within the customer's tenant.
58+
- **Role-based access control (RBAC)**: Azure RBAC enables you to manage how your organization's data is processed, stored, and accessed. You determine who has access to de-identify datasets based on roles that you define for your environment.
5959

6060
## Easy API integration into your workflow
6161

6262
![Screenshot that shows the API integration workflow.](workflow.png)
6363

6464
Integrating the Azure de-identification service into your environment is fast, flexible, and secure. The service is built to support health and life sciences workflows with minimal effort.
6565

66-
- **API-first design:** Determine whether you need real-time de-identification or asynchronous batch processing from Azure Blob Storage. The REST API and SDKs provide easy integration points to fit your system.
67-
- **Quick setup:** Deploy the service in minutes by using the Azure portal, Azure Resource Manager templates, Bicep, or the Azure CLI. You can be up and running quickly without complex configuration.
68-
- **Secure access:** Enable private endpoints by using Azure Private Link to keep data traffic off the public internet.
69-
- **Fully managed identity support:** Use managed identities for secure, credential-free access to Azure Blob Storage.
70-
- **Compliance-ready:** Operate the service within your Azure tenant and to adhere with HIPAA.
66+
- **API-first design**: Determine whether you need real-time de-identification or asynchronous batch processing from Azure Blob Storage. The REST API and SDKs provide easy integration points to fit your system.
67+
- **Quick setup**: Deploy the service in minutes by using the Azure portal, Azure Resource Manager templates, Bicep, or the Azure CLI. You can be up and running quickly without complex configuration.
68+
- **Secure access**: Enable private endpoints by using Azure Private Link to keep data traffic off the public internet.
69+
- **Fully managed identity support**: Use managed identities for secure, credential-free access to Azure Blob Storage.
70+
- **Compliance-ready**: Operate the service within your Azure tenant and to adhere with HIPAA.
7171

7272
## Synchronous or asynchronous endpoints
7373

@@ -85,9 +85,7 @@ The following service limits apply:
8585
- Requests can't exceed 50 KB.
8686
- Jobs can process no more than 10,000 documents.
8787
- Each document processed by a job can't exceed 2 MB.
88-
- Requests are throttled if you exceed 1 MB per 5 seconds or 100 requests per 5 seconds.<sup>1</sup>
89-
90-
<sup>1</sup> If your use case requires higher throughput, submit a support request for consideration.
88+
- Requests are throttled if you exceed 1 MB per 5 seconds or 100 requests per 5 seconds. If your use case requires higher throughput, submit a support request for consideration.
9189

9290
## Pricing
9391

articles/healthcare-apis/deidentification/quickstart-asynchronous-python.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -22,20 +22,20 @@ When you choose to store documents in Azure Blob Storage, you're charged based o
2222

2323
## Prerequisites
2424

25-
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn)
26-
* A de-identification service with system-assigned managed identity. [Deploy the de-identification service](quickstart.md)
25+
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
26+
* A de-identification service with a system-assigned managed identity. To create one, use the following steps. For more information, see [Deploy the de-identification service](quickstart.md).
2727

28-
1. In the top search bar, enter **De-identification**.
29-
1. Select **De-identification Services** from the search results.
30-
1. Select **Create**.
31-
1. Fill in required subscription and instance details.
32-
1. Select **Review + create**, and then select **Create**.
33-
1. After deployment is finished, go to the resource and copy your service URL and subscription ID.
28+
1. In the top search bar, enter **De-identification**.
29+
1. Select **De-identification Services** from the search results.
30+
1. Select **Create**.
31+
1. Fill in required subscription and instance details.
32+
1. Select **Review + create**, and then select **Create**.
33+
1. After deployment is finished, go to the resource and copy your service URL and subscription ID.
3434

35-
> [!IMPORTANT]
36-
> To use the Batch (asynchronous) API with the multilingual model, ensure that you have the DeID Batch Data Owner role assigned to your identity in **Access Control (IAM)**.
35+
> [!IMPORTANT]
36+
> To use the Batch (asynchronous) API with the multilingual model, ensure that you have the DeID Batch Data Owner role assigned to your identity in **Access Control (IAM)**.
3737
38-
Install the [Azure CLI](/cli/azure/install-azure-cli), and open your terminal of choice. In this tutorial, we use Azure PowerShell.
38+
* Installation of the [Azure CLI](/cli/azure/install-azure-cli). After you install it, open your terminal of choice. In this tutorial, we use Azure PowerShell.
3939

4040
## Create a storage account and container
4141

@@ -93,7 +93,7 @@ Next, you upload a document that contains synthetic protected health information
9393
9494
In this step, you grant role-based access to the container for the system-assigned managed identity of the de-identification service.
9595
96-
You grant the Storage Blob the Data Contributor role because the de-identification service reads the original document and writes the de-identified output documents.
96+
You grant the Storage Blob Data Contributor role because the de-identification service reads the original document and writes the de-identified output documents.
9797
9898
Substitute the name of your de-identification service for the `<deid_service_name>` placeholder:
9999

articles/healthcare-apis/deidentification/quickstart-python.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Now that the resource is deployed, you need to assign yourself the following per
6262
1. Select **Add** and **Add role assignment.**
6363
1. Select **DeID Data Owner** and **DeID Real-Time Data User**, and then select **Members** on the top panel.
6464
1. Select **+ Select members** to open a panel. Search for your own name and choose **Select.**
65-
1. Back on the **Members** panel, select **Review + assign** at the bottom left.
65+
1. Back on the **Members** panel, select **Review + assign** at the lower left.
6666

6767
>[!TIP]
6868
>If you want to use both the synchronous and asynchronous (Batch) APIs, you need to also assign yourself the DeID Batch Data Owner role.

0 commit comments

Comments
 (0)