Chapter 10

Security Rule Detailed


The objectives of this chapter are as follows:

  • ■  Understand what the Security Rule is intended to accomplish.
  • ■  Understand the implementation specifications for the Security Rule.
  • ■  Determine what types of risk analysis and security analysis will be conducted.
  • ■  Understand the implementation process of the Security Rule.
  • ■  Understand the flexibility and scalability the covered entity has to implement the Security Rule.
  • ■  Understand the following terms as they relate to the Security Rule: access, administrative safeguards, authentication, availability, workstation, systems, malicious software, information system; users, confidentiality, encryption, facility, physical safeguards, security ...

Get The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.