Thursday, February 9, 2017

Word of the Day: HIPAA Security Rule

Word of the Day WhatIs.com
Daily updates on the latest technology terms |February 9, 2017
HIPAA Security Rule

The Security Standards for the Protection of Electronic Protected Health Information, commonly known as the HIPAA Security Rule, establishes national standards for securing patient data that is stored or transferred electronically.

The rule requires the placement of safeguards, both physical and electronic, to ensure the secure passage, maintenance and reception of protected health information (PHI). When addressing the risks and vulnerabilities associated with PHI and electronic protected health information (ePHI), there are three key questions health care organizations should ask.

  • Can you identify the sources of ePHI and PHI within your organization, including all PHI that you create, receive, maintain or transmit?
  • What are the external sources of PHI?
  • What are the human, natural, and environmental threats to information systems that contain EPHI and PHI?

Enforced by the Office for Civil Rights (OCR) within the U.S. Department of Health and Human Services (HHS), the HIPAA Security Rule aims to protect patient security while still allowing the health care industry to advance technologically.

Quote of the Day

"The HIPAA Security Rule mandates risk assessments, but many small medical practices fail to perform those assessments despite their availability online." - Reda Chouffani

 

Trending Terms

personal health information
Office for Civil Rights
Health and Human Services
HIPAA Privacy Rule
regulatory compliance

 
Learning Center

Five reasons small medical practices are vulnerable to cyberattacks
Small medical practices are often more vulnerable to cyberattacks due to limited security budgets and a failure to perform risk assessments.

Requirements for HIPAA compliance: The key channel partner challenges
Channel partners face a number of challenges when working with clients in the highly regulated healthcare market.

Should healthcare organizations follow the NIST guidelines for HIPAA?
NIST guidelines aren't legally necessary for HIPAA covered entities to comply with, but find out why it's still a good idea to follow them.

Wearable health technology and HIPAA: What is and isn't covered
With wearable health technology tracking a person's every move and heartbeat, some experts are concerned by what's not covered by HIPAA, while others don't see a threat.

HIPAA compliance services a double-edged sword
HIPAA compliance services can offer lucrative business opportunities to MSPs -- as long as they know what they're getting into.

Writing for Business

Risk analysis is a _________ component of the HIPAA Security Rule because it allows an entity to target its main security loopholes and deficiencies.
A. incisive
B. decisive

Answer

 

 

 

Stay In Touch
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

 

Visit the Word of the Day Archives and catch up on what you've missed!

 

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2016 TechTarget. All rights reserved.

No comments: