The Differences Between The HIPAA Privacy Rule and HIPAA Security Rule

Поделиться
HTML-код
  • Опубликовано: 9 фев 2023
  • We have gone over HIPAA in our videos before, but let me refresh your memory on what the acronym stands for. The Health Insurance Portability and Accountability Act is, to put it simply, the federal law that helps protect your health information.
    LINKS:
    ____________________________________________
    etactics.com/blog/why-was-hip...
    ____________________________________________
    HIPAA contains some of the most detailed and comprehensive requirements of any privacy and data security law to date, but how are providers able to implement all of these rules and regulations? While it would be ideal to be able to just enact a single law to uphold these requirements, anyone who understands the United States Justice System knows it's a bit more complicated than that.
    HIPAA was passed by President Bill Clinton on August 21, 1996. The legislation set the national standard to protect and streamline sensitive health information. Years later, additional rules and regulations were passed to help with implementation of this standard. Let’s go over the HIPAA Privacy Rule vs the HIPAA Security Rule.
    The main goal for the HIPAA Privacy Rule, which was published on December 20, 2000, is to protect health information while still allowing the flow of that information to provide quality healthcare. This rule attempts to balance the confidentiality, integrity and availability of healthcare information. This regulation has three major purposes:
    1. To protect the rights of clients by providing them access to their health information. Also to control the inappropriate use of the information.
    2. To improve healthcare quality in the United States by restoring trust in the healthcare system for consumers, professionals, and other organizations.
    3. To improve the effectiveness of healthcare delivery by creating a national template to protect sensitive health information. This template builds on efforts by states, health systems, individual organizations and individuals.
    The HIPAA Security Rule, which was published on February 20, 2003, protects a subset of information from the Privacy Rule. This information is the individually identifiable health data that a covered entity creates, receives, maintains, or transmits electronically. So in other words this is protected health information that is handled not only on paper, but digitally as well. Such as being stored on computer files or emailed from one professional to another, or to the patient themselves.
    We call this electronic protected health information (e-PHI). To comply with the HIPAA Security Rule, providers:
    1. Must secure the confidentiality, integrity, and availability of all e-PHI.
    2. To detect and protect against anticipated information breaches.
    3. Protect against anticipated impermissible uses or disclosures that are not allowed by the rule.
    4. Certify compliance training through the workforce.
    Since establishing these rules, more regulations have become available such as the Enforcement Rule, The “HITECH” Act, the Breach Notification Rule, and the HIPAA Omnibus Rule.
    These rules further advocate for privacy of data, implementation of appropriate security measures, ensuring proper notifications if a data breach occurs, and more.
    ► Reach out to Etactics @ www.etactics.com​
    ►Subscribe: rb.gy/pso1fq​ to learn more tips and tricks in healthcare, health IT, and cybersecurity.
    ►Find us on LinkedIn: / etactics-inc
    ►Find us on Facebook: / ​
    #HIPAAPrivacy #HIPAASecurity

Комментарии • 1

  • @BrianCesario
    @BrianCesario 4 месяца назад

    Volume levels! Please balance between content and intro/outro. Almost blew my eardrums out