Abstract : The HIPAA Security Rule, formerly known as the Standards for Security of Individually Identifiable Health Information, is a crucial component in regulating and setting nationwide standards for safeguarding patient health information. It enforces protocols to ensure the protection of sensitive health data at a national level. Additionally, the HIPAA Security Rule incorporates the Security Standards for the Protection of Electronic Protected Health Information, outlining precise measures for securing electronic patient data [1].
Keywords :
Cite : Billore, A., & Khanna, A. (2024). A Study On Hipaa Compliance In Health It Company And Its Application To PHI (1st ed., pp. 64-67). Noble Science Press. https://doi.org/10.52458/978-8197040863.2024.eb.ch-15
References :
Perlin, J. B., Kolodner, R. M., & Roswell, R. H. (2004). The Veterans Health Administration: quality, value, accountability, and information as transforming strategies for patient-centered care. Am J Manag Care, 10(11 Pt 2), 828-836.
Agarwal, R., & Karahanna, E. (2000). Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage. MIS quarterly, 665-694.
Wyne, M. F., & Haider, S. N. (2007). HIPAA compliant HIS in J2EE environment. International Journal of Healthcare Information Systems and Informatics (IJHISI), 2(4), 73-89.