O'Reilly logo

Healthcare Information Technology Exam Guide for CompTIA Healthcare IT Technician and HIT Pro Certifications by Brian Gugerty, Kathleen McCormick

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

John Moehrke*

In this chapter, you will learn how to

• Explain the relationship between identity, access control, authorization, authentication, and role assignment

• Identify and explain access control to data from the perspective of patient, user, and resource, as well as in the context of information use

• Identify and explain how to apply security concepts to a healthcare information exchange (HIE)

This chapter describes how to control access to healthcare information. This includes the typical rules of any business that provides specific types of data to specific types of people while forbidding access to those who don’t have a need for access. Access control is an important part of any system that holds information. Even systems that simply ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required