Encrypted or Restricted Variables

Encrypted Physician and Hospital Identifiers

The SEER registries require that the identity of providers (physicians and hospitals) be protected. Therefore, provider identifiers included in the SEER-Medicare claims are encrypted. This includes the Unique Physician Identification Number (UPIN), National Provider Identifier (NPI), the provider Taxpayer ID number (tax_num), and hospital provider number (hospital NPI). These numbers are encrypted in a similar manner across files and years making it possible to track the same hospital or physician in the SEER-Medicare data over time.

Investigators may want information about providers that requires linkage to other data sources by using unencrypted provider numbers; therefore, NCI has identified processes to facilitate such linkages.

Physician Identifiers

Many investigators want to link to data about physicians from the American Medical Association (AMA). However, given NCI no longer releases unencrypted physician identifiers, NCI has established methods to support such linkages. In order to link to the AMA data, investigators should complete the following steps:

  1. Identify the encrypted provider numbers from the Medicare data. Physicians' identifiers are the UPINs or NPIs found on the carrier and outpatient files.
  2. Send the encrypted provider numbers to NCI's information technology contractor, IMS Inc. Please e-mail the provider numbers to Bob Banks. IMS will unencrypt the provider numbers and send them to the AMA.
  3. AMA will return to IMS their data linked to the unencrypted provider number.
  4. IMS will re-encrypt the file and return to the investigator a file with encrypted provider numbers and the selected AMA variables.

Researchers who are seeking AMA data should direct any inquires to AMA's programming contractor, Medical Marketing Services, Inc.:

Kristy Vanderplow
Medical Marketing Services, Inc.
17550 N Perimeter Drive, Suite 110
Scottsdale, AZ 85255
Phone: 630-477-1555
Fax: 630-350-1896
k-vanderplow@mmslists.com

Hospital Identifiers

In order for NCI to release unencrypted hospital numbers, investigators must obtain permission from each of the SEER registries as described below.

Geographic Identifiers

The patient's county of residence is available on the SEER Cancer File (FIP codes) and in the Medicare files (SSA codes). To protect patient and provider identification, NCI encrypts other geographic variables including patient's census tract and ZIP code, physician ZIP code, and hospital ZIP code. Separate files that contain geographically-based (ZIP code and census tract level) socioeconomic information from the 1990 and 2000 Censuses and the 2008 – 2012 American Community Survey are provided and can be matched by the encrypted patient census tract and ZIP code to the claims files. Unencrypted ZIP codes and census tracts can only be released if the investigator obtains permission of each SEER cancer registry.

HRR-encrypted Zip Code Crosswalk

NCI can provide a zip code crosswalk file to facilitate the link to the Dartmouth Atlas of Health Care Hospital Referral Regions (HRRs) with the encrypted zip codes.

More geographic information available at Geographic Area Data.

Restricted Variables

Oncotype Dx

Genomic Health Inc (GHI), which is now part of Exact Sciences Corp., developed the Oncotype DX Breast Recurrence Score® assay (Assay), which is a commercial diagnostic test that predicts 10-year distant recurrence risk based on the expression of 21 genes. The resulting recurrence score is used to better weigh the harms and benefits of chemotherapy, thereby informing treatment decisions. The Assay data are linked to SEER data via a collaboration between NCI and GHI, with IMS acting as the third party, honest broker. The Assay variables that have been linked to SEER data include: Assay, Assay risk group, Assay reason no score, Assay test report date, and Assay months since diagnosis. Note: Per the agreement with GHI, NCI all approved applications requesting Oncotype Dx variables and any manuscripts or reports that result from the analyses of such data will be shared with GHI. These documents will be shared with GHI for informational purposed only; all approval decisions will be handled by NCI.

*NOTE: variation in multigene signature method have been observed (e.g., by geographic region and calendar year); this variation should be taken into consideration during study design and interpretation.

Alaska Native Tumor Registry Data

In addition to needing NCI approval, all requests for Alaska Native Tumor Registry Data, which includes incident cancer among Alaska Natives (Eskimo, Indian, Aleut), must be reviewed by the registry principal investigator and may require tribal review. The SEER-Medicare contact will forward proposals, on behalf of the requestor, to the Alaska registry, after receiving NCI approval.

Requests for unencrypted and/or restricted variables

If investigators determine that unencrypted and/or restricted variables are needed for their analysis, they must go through a special approval process. Investigators must submit their completed application form (DOCX, 46 KB) to the SEER-Medicare contact with a detailed justification for access to the unencrypted and/or restricted variable(s). A completed and signed request form (DOCX, 22 KB) and a list of people that will have access to these data must be included with the request. When the initial review is complete, the investigators must also obtain permission from each of the registries prior to release of unencrypted variables for that registry. If requesting Alaska Native Tumor Registry Data, investigators must also obtain permission from the Alaska Native Tumor Registry. The SEER-Medicare contact will provide investigators with contact information for the SEER registries. Investigators who are requesting unencrypted and/or restricted variables are encouraged to allow sufficient time to obtain the necessary approvals.

Note: Files with unencrypted variables cannot be stored with regular SEER-Medicare data. In order to combine multiple requests when purchasing data, all requests must have the same permissions for access to any unencrypted variable.

Last Updated: 16 Dec, 2022