IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security

Security
View Sample PDF
Author(s): Roy Rada (University of Maryland Baltimore County, USA)
Copyright: 2008
Pages: 46
Source title: Information Systems and Healthcare Enterprises
Source Author(s)/Editor(s): Roy Rada (University of Maryland Baltimore County, USA)
DOI: 10.4018/978-1-59904-651-8.ch010

Purchase

View Security on the publisher's website for pricing and purchasing information.

Abstract

Privacy and security of health information is a global concern. However, this chapter will focus on approaches to security in the United States. In particular, the federal regulation of security in the form of the Security Rule will be studied. The HIPAA Security Rule details the system and administrative requirements that a covered entity must meet in order to assure that health information is safe from people without authorization for its access. By contrast, the Privacy Rule describes the requirements that govern the circumstances under which protected health information must be used or disclosed with and without patient involvement and when a patient may have access to his or her protected health information. The implementation of reasonable and appropriate security measures supports compliance with the Privacy Rule.

Related Content

. © 2024. 27 pages.
. © 2024. 10 pages.
. © 2024. 13 pages.
. © 2024. 6 pages.
. © 2024. 23 pages.
. © 2024. 14 pages.
. © 2024. 7 pages.
Body Bottom