In this chapter, you will learn how to
• Explain the relationship between identity, access control, authorization, authentication, and role assignment
• Identify and explain access control to data from the perspective of patient, user, and resource, as well as in the context of information use
• Identify and explain how to apply security concepts to a healthcare information exchange (HIE)
This chapter describes how to control access to healthcare information. This includes the typical rules of any business that provides specific types of data to specific types of people while forbidding access to those who don’t have a need for access. Access control is ...