Ch10_Brodnik Workbook.docx - Chapter 10 HIPAA Security Rule Background This chapter introduces the HIPAA Security Rule which closely aligns with the

Ch10_Brodnik Workbook.docx - Chapter 10 HIPAA Security Rule...

This preview shows page 1 - 2 out of 3 pages.

Chapter 10: HIPAA Security Rule Background This chapter introduces the HIPAA Security Rule, which closely aligns with the Privacy Rule. Although the rules complement each other, the Privacy Rule governs the privacy of protected health information (PHI) regardless of the medium in which the information resides, whereas the Security Rule governs PHI that is transmitted by or maintained in some form of electronic media (that is, electronic protected health information, or ePHI). The chapter begins with a discussion of the purposes of the rule, its source of law, scope, and to whom the law applies. The chapter suggests a process for complying with the rule and outlines the five key components of the rule. The chapter also discusses changes to the Security Rule as a result of the Health Information Technology for Economic and Clinical Health (HITECH) provisions of the American Recovery and Reinvestment Act of 2009 (ARRA). It concludes with a discussion of the role of a security officer, how the rule is enforced, and the penalties for noncompliance of the rule.
Image of page 1

Want to read all 3 pages?

Image of page 2

Want to read all 3 pages?

You've reached the end of your free preview.

Want to read all 3 pages?

  • Spring '17
  • Julie Wulf-Plimpton
  • Computer Security, Ron, HIPAA Security Rule

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture