Transcription of HITECH / HIPAA Best Practices Securing PHI Basics
{{id}} {{{paragraph}}}
HITECH / HIPAA best Practices Securing PHI Basics Topics Why secure PHI? Implications for the HIPAA Security Rule. Methods for Securing PHI and corresponding best Practices . 2. Why secure PHI? Breach Notification Section 13402(a) of the HITECH Act requires business associates and covered entities to report breaches of unsecured protected health information ( PHI ). 4. What is unsecured PHI? The term unsecured PHI means PHI that is not rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of a technology or methodology specified by the Secretary in the guidance issued under section 13402(h)(2) of Public Law 111 5 on the HHS Web site.
13 NIST Guidelines • NIST is responsible for developing standards and guidelines, including minimum requirements, for providing adequate information security for all ...
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}
Guidelines for Media Sanitization, 1117> MICROBIOLOGICAL BEST LABORATORY, 1117〉 Microbiological Best Laboratory, Media, Guidelines, Sanitation Practices Standard Operating, Sanitation Practices Standard Operating Procedures, Department of the Navy Information Security, Department of the Navy Information Security Program, Job Aid: Security Configuration Assessment of, Job Aid: Security Configuration Assessment of Information, Guideline for infection control in