Chapter 10: HIPAA Security Rule
Background
This chapter introduces the HIPAA Security Rule, which closely aligns with the Privacy Rule. Although
the rules complement each other, the Privacy Rule governs the privacy of protected health information
(PHI) regardless of the medium in which the information resides, whereas the Security Rule governs PHI
that is transmitted by or maintained in some form of electronic media (that is, electronic protected health
information, or ePHI). The chapter begins with a discussion of the purposes of the rule, its source of law,
scope, and to whom the law applies. The chapter suggests a process for complying with the rule and
outlines the five key components of the rule. The chapter also discusses changes to the Security Rule as a
result of the Health Information Technology for Economic and Clinical Health (HITECH) provisions of
the American Recovery and Reinvestment Act of 2009 (ARRA). It concludes with a discussion of the role
of a security officer, how the rule is enforced, and the penalties for noncompliance of the rule.

Want to read all 3 pages?

Want to read all 3 pages?
You've reached the end of your free preview.
Want to read all 3 pages?
- Spring '17
- Julie Wulf-Plimpton
- Computer Security, Ron, HIPAA Security Rule