Interoperability Within and Across Healthcare Systems

John Moehrke*

   In this chapter, you will learn how to

•  Explain the relationship between identity, access control, authorization, authentication, and role assignment

•  Identify and explain access control to data from the perspective of patient, user, and resource, as well as in the context of information use

•  Identify and explain how to apply security concepts to a healthcare information exchange (HIE)


This chapter describes how to control access to healthcare information. This includes the typical rules of any business that provides specific types of data to specific types of people while forbidding access to those who don’t have a need for access. Access control is ...

Get Healthcare Information Technology Exam Guide for CHTS and CAHIMS Certifications, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.