{"version":"1.0","provider_name":"IRI","provider_url":"https:\/\/beta.iri.com\/blog","author_name":"Uli Bethke","author_url":"https:\/\/beta.iri.com\/blog\/author\/ulibethke\/","title":"Process and Protect HL7 Data with Voracity - IRI","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"PV79afkGlx\"><a href=\"https:\/\/beta.iri.com\/blog\/data-transformation2\/process-and-protect-hl7-data-with-voracity\/\">Process and Protect HL7 Data with Voracity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/beta.iri.com\/blog\/data-transformation2\/process-and-protect-hl7-data-with-voracity\/embed\/#?secret=PV79afkGlx\" width=\"600\" height=\"338\" title=\"&#8220;Process and Protect HL7 Data with Voracity&#8221; &#8212; IRI\" data-secret=\"PV79afkGlx\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/06\/Final-result.png","thumbnail_width":1180,"thumbnail_height":786,"description":"Editors Note:\u00a0It is now possible to discover, deliver, and de-identify PHI in text-based HL7 files directly using the IRI DarkShield data masking product for unstructured files, which is also included in the IRI data management platform mentioned in the discussion below where the HL7 files are structured. This article shows how you can use IRIRead More"}