The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Security
|
Author(s): Roy Rada (University of Maryland Baltimore County, USA)
Copyright: 2008
Pages: 46
Source title:
Information Systems and Healthcare Enterprises
Source Author(s)/Editor(s): Roy Rada (University of Maryland Baltimore County, USA)
DOI: 10.4018/978-1-59904-651-8.ch010
PurchaseView Security on the publisher's website for pricing and purchasing information.
|
Abstract
Privacy and security of health information is a global concern. However, this chapter will focus on approaches to security in the United States. In particular, the federal regulation of security in the form of the Security Rule will be studied. The HIPAA Security Rule details the system and administrative requirements that a covered entity must meet in order to assure that health information is safe from people without authorization for its access. By contrast, the Privacy Rule describes the requirements that govern the circumstances under which protected health information must be used or disclosed with and without patient involvement and when a patient may have access to his or her protected health information. The implementation of reasonable and appropriate security measures supports compliance with the Privacy Rule.
Related Content
.
© 2024.
27 pages.
|
.
© 2024.
10 pages.
|
.
© 2024.
13 pages.
|
.
© 2024.
6 pages.
|
.
© 2024.
23 pages.
|
.
© 2024.
14 pages.
|
.
© 2024.
7 pages.
|
|
|