O'Reilly logo

Developing Cybersecurity Programs and Policies, Third Edition by Sari Greene, Omar Santos

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14

Regulatory Compliance for the Health-Care Sector

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

  • Explain health-care–related information cybersecurity regulatory compliance requirements.

  • Understand the components of a HIPAA/HITECH-compliant cybersecurity program.

  • Prepare for a regulatory audit.

  • Know how to respond to an ePHI security incident.

  • Write HIPAA-related policies and procedures.

  • Understand the HIPAA compliance enforcement process.

The genesis of health-care security–related legislation is the Health Insurance Portability and Accountability Act of 1996 (HIPAA, Public Law 104-191). The original intent of the HIPAA regulation was to simplify and standardize ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required