O'Reilly logo

Healthcare Information Technology Exam Guide for CHTS and CAHIMS Certifications, 2nd Edition by John Mattison, Brian Gugerty, Kathleen A. McCormick

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 14

 

Interoperability Within and Across Healthcare Systems

John Moehrke*

   In this chapter, you will learn how to

•  Explain the relationship between identity, access control, authorization, authentication, and role assignment

•  Identify and explain access control to data from the perspective of patient, user, and resource, as well as in the context of information use

•  Identify and explain how to apply security concepts to a healthcare information exchange (HIE)

 

This chapter describes how to control access to healthcare information. This includes the typical rules of any business that provides specific types of data to specific types of people while forbidding access to those who don’t have a need for access. Access control is ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required