<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v24i3e30619</article-id>
      <article-id pub-id-type="pmid">35103610</article-id>
      <article-id pub-id-type="doi">10.2196/30619</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Viewpoint</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Viewpoint</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>The Disclosure of Personally Identifiable Information in Studies of Neighborhood Contexts and Patient Outcomes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Mavragani</surname>
            <given-names>Amaryllis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>James</surname>
            <given-names>Peter</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Kishore</surname>
            <given-names>Kamal</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Rundle</surname>
            <given-names>Andrew Graham</given-names>
          </name>
          <degrees>DrPH</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Epidemiology</institution>
            <institution>Mailman School of Public Health</institution>
            <institution>Columbia University</institution>
            <addr-line>722 west 168th street</addr-line>
            <addr-line>New York, NY, 10032</addr-line>
            <country>United States</country>
            <phone>1 2123057619</phone>
            <email>agr3@cumc.columbia.edu</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-0211-7707</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Bader</surname>
            <given-names>Michael David Miller</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6292-7790</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Mooney</surname>
            <given-names>Stephen John</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9092-938X</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Epidemiology</institution>
        <institution>Mailman School of Public Health</institution>
        <institution>Columbia University</institution>
        <addr-line>New York, NY</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Department of Sociology</institution>
        <institution>College of Arts and Sciences</institution>
        <institution>American University</institution>
        <addr-line>Washington, DC</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Department of Public Administration &#38; Policy</institution>
        <institution>School of Public Affairs</institution>
        <institution>American University</institution>
        <addr-line>Washington, DC</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Department of Epidemiology</institution>
        <institution>School of Public Health</institution>
        <institution>University of Washington</institution>
        <addr-line>Seattle, WA</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Andrew Graham Rundle <email>agr3@cumc.columbia.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>3</month>
        <year>2022</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>17</day>
        <month>3</month>
        <year>2022</year>
      </pub-date>
      <volume>24</volume>
      <issue>3</issue>
      <elocation-id>e30619</elocation-id>
      <history>
        <date date-type="received">
          <day>21</day>
          <month>5</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>28</day>
          <month>6</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>12</day>
          <month>8</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>22</day>
          <month>12</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Andrew Graham Rundle, Michael David Miller Bader, Stephen John Mooney. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 17.03.2022.</copyright-statement>
      <copyright-year>2022</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2022/3/e30619" xlink:type="simple"/>
      <abstract>
        <p>Clinical epidemiology and patient-oriented health care research that incorporates neighborhood-level data is becoming increasingly common. A key step in conducting this research is converting patient address data to longitude and latitude data, a process known as geocoding. Several commonly used approaches to geocoding (eg, ggmap or the tidygeocoder R package) send patient addresses over the internet to web-based third-party geocoding services. Here, we describe how these approaches to geocoding disclose patients’ personally identifiable information (PII) and how the subsequent publication of the research findings discloses the same patients’ protected health information (PHI). We explain how these disclosures can occur and recommend strategies to maintain patient privacy when studying neighborhood effects on patient outcomes.</p>
      </abstract>
      <kwd-group>
        <kwd>geocode</kwd>
        <kwd>patient privacy</kwd>
        <kwd>ethical conduct of research</kwd>
        <kwd>disclosure</kwd>
        <kwd>privacy</kwd>
        <kwd>security</kwd>
        <kwd>identification</kwd>
        <kwd>health information</kwd>
        <kwd>strategy</kwd>
        <kwd>outcome</kwd>
        <kwd>neighborhood</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Imagine if a clinical researcher were to disclose a list of patient addresses to a third party that was outside of their hospital or health system without a formal agreement with that third party to secure the data. Imagine they then publicly announced that they disclosed the addresses, that the addresses belonged to patients with a specific disease, and that those patients were being treated at a specific hospital. The researcher’s institutional review board (IRB) and Health Insurance Portability and Accountability Act (HIPAA) compliance office would be outraged at these violations of patient privacy. Yet, this sequence of events can happen inadvertently when studying how neighborhood conditions such as access to medical facilities or surrounding food environments affect clinical outcomes in certain patient populations.</p>
        <p>Clinical epidemiology and patient-oriented health care research incorporating neighborhood-level data is becoming progressively more common as the National Institutes of Health and professional and patient organizations are increasingly encouraging such research [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. For instance, the American Cancer Society has classified multilevel research on neighborhood-level social determinants of cancer survivorship as a priority recommendation for research [<xref ref-type="bibr" rid="ref2">2</xref>]. Here, we describe how inadvertent disclosures of personally identifiable information (PII) and protected health information (PHI) can occur when researchers study the effects of neighborhood contexts on clinical outcomes among patients and we describe ways to mitigate this risk. PII is information that can be used to identify individuals; street addresses are classified as PII [<xref ref-type="bibr" rid="ref3">3</xref>]. PHI includes information about a patient’s past or present health conditions, any treatment for those conditions, or any other provision of care. Under HIPAA, all geographical identifiers below the state level that were created, used, or disclosed during the provision of health care are also considered PHI [<xref ref-type="bibr" rid="ref4">4</xref>]. Patient residential addresses used during treatment, or even addresses already documented in the medical or billing records, meet the criteria for geographic PHI, as does the name of the hospital treating a patient.</p>
        <p>We describe the steps in the research process when PII and PHI can be disclosed when the study population is defined as patients with a specific disease or diseases, as is common in clinical studies. We then explain why many protocols do not protect patient privacy and conclude by offering suggestions for a workflow that avoids the issues we identify. We use a fictional example throughout this article to avoid compounding potential PII and PHI disclosure issues that have occurred in previously published research. The hypothetical study being referenced examines whether residential neighborhood poverty rates are associated with the risk of death among patients with COVID-19 who were treated at the Columbia University Irving Medical Center. Though fictional, the example draws on published studies and studies that we have peer reviewed for clinical and public health journals. <xref rid="figure1" ref-type="fig">Figure 1</xref> summarizes the disclosure risk associated with common approaches to geocoding patient addresses.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>A summary of the personally identifiable information and protected health information disclosure risk for common approaches to geocoding patient addresses.</p>
          </caption>
          <graphic xlink:href="jmir_v24i3e30619_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Privacy Pitfalls at Different Steps of Clinical Research</title>
        <sec>
          <title>Step 1: Disclosure of Patient Addresses</title>
          <p>The initial risk of disclosing PII and PHI occurs during a key step called geocoding. Geocoding is the process of converting a street address to longitude and latitude coordinates, which can then be linked to neighborhood-level data such as US census data. In our example of patients with COVID-19 who were treated at the Columbia University Irving Medical Center, the patients’ addresses would be geocoded as the first step in estimating poverty rates in each patient’s residential neighborhood.</p>
          <p>Several commonly used approaches to geocoding send addresses via the internet to third-party geocoding services. These approaches include manually entering addresses into websites such as Google Maps, uploading spreadsheets of addresses to geocoding websites, and using software packages such as the R (R Foundation for Statistical Computing) packages tidygeocoder, ggmap, and googleway; the Stata command geocode; and some options included with the SAS procedure GEOCODE. The tidygeocoder R package, for example, sends addresses to geocoding web services hosted by the US Census Bureau or by OpenStreetMap (or both), and ggmap and googleway send addresses to the Google Maps geocoder [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref6">6</xref>]. The R package ggmap provides easy access to the web-based Google Geocoding, Distance Matrix, and Directions application programming interface (API) services and is frequently used to geocode, map, and conduct spatial analyses of patient address data via Google Maps [<xref ref-type="bibr" rid="ref6">6</xref>]. The proliferation of easy-to-use software procedures for geocoding and spatial analysis increases the risk of inadvertent disclosures of PII. A similar situation occurs when web-based geospatial tools such as Google Street View are used to measure patient neighborhood environments [<xref ref-type="bibr" rid="ref7">7</xref>]. Revealing PII and PHI to third parties, such as those that host geocoding tools, violates typical human subjects research protocols approved by IRBs. The first 3 examples in the bottom panel of <xref rid="figure1" ref-type="fig">Figure 1</xref> show how these options are unsafe as they pass data to servers outside of the control of the researcher, to an entity not covered by a Business Associate Agreement (BAA), a contractual obligation between 2 companies to safely handle HIPAA-protected data.</p>
        </sec>
        <sec>
          <title>Step 2: Disclosure of the Identity of the Health Care System</title>
          <p>An additional layer of disclosure occurs when using web-based geocoding services because these services can link home address data that were submitted to the service to the institution from which the data originated. When researchers send geocoding requests, geocoding services capture the IP address of the computer requesting the service along with the patient home address to be geocoded. As a result, the disclosed addresses are linked to a particular health care or research institution. Furthermore, the unique API keys used for many services create a linked history of all geocoding requests submitted by a researcher. Finally, data stored in the researcher’s web browser cookies and search histories can also identify the researcher or clinician when they use some web-based geocoding services. Depending on which third-party service was used to geocode the residential addresses of the patients with COVID-19 in our example, the geocoding service provider would receive data on the identity of the institution originating the geocoding requests; they could also possibly receive data on the identity of the researcher and even information on the researcher’s recent focus on COVID-19 research. Thus, the combination of patient address data, researcher or clinician identity, and the identity of the health institution allows the third-party geocoding service to make inferences about the submitted addresses.</p>
        </sec>
        <sec>
          <title>Step 3: Disclosure of Patient Health Information</title>
          <p>Publishing research results in articles allows third parties to further contextualize the disclosed addresses. Publication itself can therefore reveal PHI that can be linked to PII [<xref ref-type="bibr" rid="ref3">3</xref>]. Publications describing the results of research about the effects of neighborhood contexts on outcomes in patient populations typically identify the geocoding service used, the number of addresses submitted to the service, the health system the patients belong to, and the health condition(s) used as criteria for including patients in the study [<xref ref-type="bibr" rid="ref8">8</xref>]. Publication of this study data provides sufficient information for the third party that geocoded the addresses to link patients’ individual identifiers to their health conditions and health providers [<xref ref-type="bibr" rid="ref3">3</xref>]. For example, researchers publishing the results of the hypothetical COVID-19 study would indicate how many patients were included in the study, the method used to geocode the sample (eg, tidygeocoder and OpenStreetMap), the number of addresses successfully geocoded, and the fact that the patients received treatment for COVID-19 at the Columbia University Irving Medical Center. The combination of server logs of addresses submitted for geocoding, the capture of the IP address of the institution that originated the geocoding requests, and the information in the published paper would be sufficient for the third-party geocoding service to identify the addresses as belonging to patients with COVID-19 who had been treated at the Columbia University Irving Medical Center.</p>
        </sec>
      </sec>
      <sec>
        <title>Inadequate Strategies to Protect Patient Privacy</title>
        <p>Some researchers recognize the risks associated with this type of study but use strategies that do not protect PII and PHI. One approach we have seen proposed is to submit patient addresses of interest to a geocoding service along with a pool of randomly selected addresses [<xref ref-type="bibr" rid="ref9">9</xref>]. An issue with this approach is that due to referral patterns and the geographies of hospital catchment areas, patient addresses are likely to cluster and may not be sufficiently hidden by pools of randomly selected addresses. In theory, if the pool is large enough (eg, every address in the health care system’s catchment or referral area), this approach to geocoding does not provide PII to the geocoding service provider. However, this approach has several flaws. First, the approach does not follow the National Institute of Standards and Technology recommendations to secure data by requiring an encryption key rather than relying on keeping the information itself hidden [<xref ref-type="bibr" rid="ref10">10</xref>]. Second, identifying an address list long enough to effectively obscure the patient addresses typically requires more computational skill and resources than simply geocoding the addresses securely in the first place. In our example of outcomes among patients with COVID-19, this approach might require identifying and submitting to the geocoding service every address in the Columbia University Irving Medical Center patient catchment area to fully obscure the study’s patient addresses.</p>
        <p>Another possibility may be to use a virtual private network (VPN) that obscures the identity of the computer sending the addresses to the third-party geocoding service, thus concealing the fact that the addresses are being sent from a medical system. However, VPNs can be difficult to set up securely and many commercial VPNs do in fact reveal the location of the user’s computer [<xref ref-type="bibr" rid="ref11">11</xref>]. Furthermore, even with a secure VPN, default settings on web browsers reveal a user’s location to the websites being visited. Thus, a researcher using a VPN to access a web-based geocoder still risks disclosing PII and PHI to the geocoder service provider. Moreover, even the successful implementation of a VPN only shifts the disclosure of the address information and researcher identity from the geocoding service provider to the VPN service provider. An onion router, such as Tor (The Onion Router), can add a layer of anonymity to ensure that the geocoding service provider cannot link the address data to a researcher, clinician, or institution [<xref ref-type="bibr" rid="ref12">12</xref>]. However, there have been cases of onion routers being compromised [<xref ref-type="bibr" rid="ref13">13</xref>]. The complexity of these solutions makes full compliance difficult, especially since simpler solutions exist.</p>
      </sec>
      <sec>
        <title>Appropriate Approaches to Geocoding Patient Data</title>
        <p>For researchers to be compliant with HIPAA and typical IRB regulations, patient addresses should be geocoded using desktop tools, such as ArcGIS, that store address information on local secured machines. QGIS offers a free open-source alternative to ArcGIS, though default geocode options use OpenStreetMap, so care must be taken to set up desktop options. Alternatively, researchers can use a geocoder designed for server hosting within a virtual machine on their local computer. For example, the open-source PostGIS geocoder can be hosted within a Docker container and accessed using R (see [<xref ref-type="bibr" rid="ref14">14</xref>] for an example). An alternative is for the hospital or health care system to negotiate a BAA with a third-party geocoding service [<xref ref-type="bibr" rid="ref4">4</xref>]. Under HIPAA, a business associate provides services, including data analysis, that involve the use or disclosure of individually identifiable health information to a covered entity [<xref ref-type="bibr" rid="ref4">4</xref>]. Although licenses for ArcGIS can be expensive (note that the various third-party services and R packages we have described are free), without a BAA, the use of third-party services to geocode patient addresses involves the inappropriate disclosure of PII and PHI. The time and administrative cost of establishing a BAA may be equivalent to, or more expensive, than an ArcGIS license.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>In summary, geocoding patient addresses using web-based services creates direct and large-scale disclosures of PII and PHI, and the proliferation of simple-to-use R packages for geocoding increases the risk of these inadvertent disclosures. Web-based geospatial tools are powerful and allow for efficient and rigorous research. However, researchers geocoding patient addresses must be aware of the risk of inadvertent disclosure of patient PII and PHI. Researchers should avoid web-based geocoders and use only secure desktop tools when geocoding patient information. Researchers may wish to disconnect computers from the internet while geocoding to ensure that no data are inadvertently passed to third parties.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">API</term>
          <def>
            <p>application programming interface</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">BAA</term>
          <def>
            <p>Business Associate Agreement</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">HIPAA</term>
          <def>
            <p>Health Insurance Portability and Accountability Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">IRB</term>
          <def>
            <p>Institutional Review Board</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">VPN</term>
          <def>
            <p>virtual private network</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">PHI</term>
          <def>
            <p>protected health information</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">PII</term>
          <def>
            <p>personally identifiable information</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">Tor</term>
          <def>
            <p>The Onion Router</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>AGR was supported by the Eunice Kennedy Shriver National Institute of Child Health and Human Development (grant P2CHD058486, awarded to the Columbia Population Research Center) and the National Institute of Diabetes and Digestive and Kidney Diseases (grant R01RDK127139). SM was supported by the National Library of Medicine (grant R00LM012868).</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Taplin</surname>
              <given-names>SH</given-names>
            </name>
            <name name-style="western">
              <surname>Anhang Price</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Edwards</surname>
              <given-names>HM</given-names>
            </name>
            <name name-style="western">
              <surname>Foster</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Breslau</surname>
              <given-names>ES</given-names>
            </name>
            <name name-style="western">
              <surname>Chollette</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Prabhu Das</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Clauser</surname>
              <given-names>SB</given-names>
            </name>
            <name name-style="western">
              <surname>Fennell</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Zapka</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Introduction: understanding and influencing multilevel factors across the cancer care continuum</article-title>
          <source>J Natl Cancer Inst Monogr</source>
          <year>2012</year>
          <month>05</month>
          <volume>2012</volume>
          <issue>44</issue>
          <fpage>2</fpage>
          <lpage>10</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22623590"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jncimonographs/lgs008</pub-id>
          <pub-id pub-id-type="medline">22623590</pub-id>
          <pub-id pub-id-type="pii">lgs008</pub-id>
          <pub-id pub-id-type="pmcid">PMC3482968</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alcaraz</surname>
              <given-names>KI</given-names>
            </name>
            <name name-style="western">
              <surname>Wiedt</surname>
              <given-names>TL</given-names>
            </name>
            <name name-style="western">
              <surname>Daniels</surname>
              <given-names>EC</given-names>
            </name>
            <name name-style="western">
              <surname>Yabroff</surname>
              <given-names>KR</given-names>
            </name>
            <name name-style="western">
              <surname>Guerra</surname>
              <given-names>CE</given-names>
            </name>
            <name name-style="western">
              <surname>Wender</surname>
              <given-names>RC</given-names>
            </name>
          </person-group>
          <article-title>Understanding and addressing social determinants to advance cancer health equity in the United States: a blueprint for practice, research, and policy</article-title>
          <source>CA Cancer J Clin</source>
          <year>2020</year>
          <month>01</month>
          <volume>70</volume>
          <issue>1</issue>
          <fpage>31</fpage>
          <lpage>46</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3322/caac.21586"/>
          </comment>
          <pub-id pub-id-type="doi">10.3322/caac.21586</pub-id>
          <pub-id pub-id-type="medline">31661164</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McCallister</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Grance</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Scarfone</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Guide to protecting the confidentiality of personally identifiable information (PII): recommendations of the National Institute of Standards and Technology</article-title>
          <source>National Institute of Standards and Technology</source>
          <year>2010</year>
          <access-date>2021-07-14</access-date>
          <publisher-loc>Gaithersburg, MD</publisher-loc>
          <publisher-name>US Department of Commerce</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=904990">https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=904990</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Office of Civil Rights</collab>
          </person-group>
          <article-title>Summary of the HIPAA privacy rule</article-title>
          <source>US Department of Health &#38; Human Services</source>
          <year>2013</year>
          <access-date>2021-07-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html">https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cambon</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hernangómez</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Belanger</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Possenriede</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>tidygeocoder: geocoding made easy</article-title>
          <source>The Comprehensive R Archive Network</source>
          <access-date>2021-02-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://cran.r-project.org/web/packages/tidygeocoder/index.html">https://cran.r-project.org/web/packages/tidygeocoder/index.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kahle</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Wickham</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>ggmap: spatial visualization with ggplot2</article-title>
          <source>The R Journal</source>
          <year>2013</year>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>144</fpage>
          <pub-id pub-id-type="doi">10.32614/rj-2013-014</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bader</surname>
              <given-names>MDM</given-names>
            </name>
            <name name-style="western">
              <surname>Mooney</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Rundle</surname>
              <given-names>AG</given-names>
            </name>
          </person-group>
          <article-title>Protecting personally identifiable information when using online geographic tools for public health research</article-title>
          <source>Am J Public Health</source>
          <year>2016</year>
          <month>02</month>
          <volume>106</volume>
          <issue>2</issue>
          <fpage>206</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.2105/AJPH.2015.302951</pub-id>
          <pub-id pub-id-type="medline">26794375</pub-id>
          <pub-id pub-id-type="pmcid">PMC4815822</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jia</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Remais</surname>
              <given-names>JV</given-names>
            </name>
            <name name-style="western">
              <surname>Stein</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Brownson</surname>
              <given-names>RC</given-names>
            </name>
            <name name-style="western">
              <surname>Lakerveld</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Amer</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Pearce</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kestens</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Kwan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lai</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Rundle</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Xiao</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Xue</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Cheng</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Panter</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kingham</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Jones</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>BT</given-names>
            </name>
            <name name-style="western">
              <surname>Shi</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Mavoa</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Toivonen</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Mwenda</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Verschuren</surname>
              <given-names>WMM</given-names>
            </name>
            <name name-style="western">
              <surname>Vermeulen</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>James</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Spatial lifecourse epidemiology reporting standards (ISLE-ReSt) statement</article-title>
          <source>Health Place</source>
          <year>2020</year>
          <month>01</month>
          <volume>61</volume>
          <fpage>102243</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1353-8292(19)30635-5"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.healthplace.2019.102243</pub-id>
          <pub-id pub-id-type="medline">32329723</pub-id>
          <pub-id pub-id-type="pii">S1353-8292(19)30635-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Petitcolas</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kuhn</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Information hiding-a survey</article-title>
          <source>Proc IEEE</source>
          <year>1999</year>
          <volume>87</volume>
          <issue>7</issue>
          <fpage>1062</fpage>
          <lpage>1078</lpage>
          <pub-id pub-id-type="doi">10.1109/5.771065</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Scarfone</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Jansen</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Tracey</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Guide to general server security:  recommendations of the National Institute of Standards and Technology</article-title>
          <source>National Institute of Standards and Technology</source>
          <year>2008</year>
          <access-date>2021-07-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-123.pdf">https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-123.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>DeBlasio</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Voelker</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Snoeren</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kanich</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Vallina-Rodriguez</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>An empirical analysis of the commercial VPN ecosystem</article-title>
          <source>Proceedings of the Internet Measurement Conference</source>
          <year>2018</year>
          <conf-name>Internet Measurement Conference</conf-name>
          <conf-date>October 31-November 2, 2018</conf-date>
          <conf-loc>Boston, MA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3278532.3278570</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reed</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Syverson</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Goldschlag</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Anonymous connections and onion routing</article-title>
          <source>IEEE J Select Areas Commun</source>
          <year>1998</year>
          <volume>16</volume>
          <issue>4</issue>
          <fpage>482</fpage>
          <lpage>494</lpage>
          <pub-id pub-id-type="doi">10.1109/49.668972</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zetter</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Rogue nodes turn Tor anonymizer into eavesdropper's paradise</article-title>
          <source>Wired</source>
          <year>2007</year>
          <access-date>2021-07-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.wired.com/2007/09/rogue-nodes-turn-tor-anonymizer-into-eavesdroppers-paradise/">https://www.wired.com/2007/09/rogue-nodes-turn-tor-anonymizer-into-eavesdroppers-paradise/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="web">
          <article-title>postgis-docker</article-title>
          <source>GitHub</source>
          <access-date>2022-03-02</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://github.com/uwrit/postgis-docker">https://github.com/uwrit/postgis-docker</ext-link>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
