Transcription of HITECH / HIPAA Best Practices Securing PHI Basics
{{id}} {{{paragraph}}}
HITECH / HIPAA best Practices Securing PHI Basics Topics Why secure PHI? Implications for the HIPAA Security Rule. Methods for Securing PHI and corresponding best Practices . 2. Why secure PHI? Breach Notification Section 13402(a) of the HITECH Act requires business associates and covered entities to report breaches of unsecured protected health information ( PHI ). 4. What is unsecured PHI? The term unsecured PHI means PHI that is not rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of a technology or methodology specified by the Secretary in the guidance issued under section 13402(h)(2) of Public Law 111 5 on the HHS Web site.
2 Topics • Why secure PHI? • Implications for the HIPAA Security Rule. • Methods for securing PHI and corresponding Best Practices.
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}