Patient Identity Management Use Cases

Patient Identity Matching Toolkit: Module DRAFT 3 12/31/2024

Purpose

This module provides an overview of use cases for patient identity management (PIM) with the goal of enhancing understanding of the wide variety and key dimensions of PIM use cases and increasing appreciation for why defining use cases is important. It is intended to be representative of the range of PIM use cases and provides some specific examples, but it makes no attempt to list all possible use cases. To organize and classify the broad spectrum of possibilities, the module introduces a PIM use cases taxonomy based on three variables: 1) scope (single or multiple data sources); 2) context (care delivery, public health, or analytics); and 3) objective (deduplication, linkage, or both).

The module is intended for program implementers, health IT systems managers, developers, and other interested groups and individuals such as policymakers, researchers, and public officials. Those currently implementing use cases may use the module to determine where their example falls in the taxonomy and how it relates to other use cases, while others may use the module to consider new use cases to fit their needs. Some may use it to refine or expand their current use cases, including becoming more aware of typical patterns in characteristics such as data quality when implementing certain kinds of use cases. For still other users, the module can provide a context to inform conversations about the requirements of and resources allocated to these efforts. The developers of the module look forward to readers’ feedback about possible ways to utilize the taxonomy and other information presented here.

Learning Objectives

At the end of this module, readers will be able to:

1. Understand the purpose of use cases in PIM and the importance of defining them.

2. Distinguish between two broad types of PIM use cases based on scope.

3. Identify three typical contexts for PIM use cases.

4. Explain three possible objectives for PIM use cases.

5. Give examples of various kinds of PIM use cases.

6. Understand circumstances when a use case for privacy-preserving record linkage could be helpful.


Last updated