Module 1: Introduction to HIPAA
Module 2: Fundamentals of PHI
Module 3: The Privacy Rule – Uses, Disclosures, and Compliance
Module 4: The Security Rule – Uses, Disclosures, and Compliance
1 of 3

1.1 Introduction to HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) was signed into law by Bill Clinton in 1996. However, it has undergone several substantial revisions, including the Breach Notification Rule in 2009, the Security Rule in 2003, and the HIPAA Privacy Rule in 2000.

HIPAA was first created to enhance the healthcare system and streamline the management of healthcare, but, over time, its parameters have subsequently been enlarged. It now addresses patient privacy, healthcare information uses and disclosures, and data protection.

Organizations exposed to protected health information (PHI) are required to have network, procedural, and physical security criteria in place and adhere to them to comply with HIPAA.

Notify of
0 Discussions
Inline Feedbacks
View all comments
Post a comment

Leave a Comment

Your email address will not be published. Required fields are marked *

Would love your thoughts, please comment.x