O'Reilly logo

Healthcare Information Technology Exam Guide for CompTIA Healthcare IT Technician and HIT Pro Certifications by Brian Gugerty, Kathleen McCormick

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Identify Proofing

Policies should be in place that document the methods used to prove that the human is who they say they are before they are allowed access to the user account, given that the user account is going to enable the individual to access sensitive healthcare information. The policies might require that a background check is done on the individual, government-issued identification is inspected, or some form of challenge and response using a previously known identifier is performed. Whatever method is used, this sets up the level of assurance that this user identity provides.

A good standard for this identity proofing is NIST Special Publications 800-63.3 This document defines four levels of assurance that align well with other standards. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required