Module 1: Introduction to HIPAA
Module 2: Fundamentals of PHI
Module 3: The Privacy Rule – Uses, Disclosures, and Compliance
Module 4: The Security Rule – Uses, Disclosures, and Compliance
1 of 3

4.2.3 Technical Security Zone

Technical safeguards protect ePHI transmitted through an open network by strengthening the security of the IT environment.

For example, access to PHI should be restricted to only a few people with an authorized ID, which can be used to track the activities of the person in charge of transferring or accessing PHI.

Notify of
0 Discussions
Inline Feedbacks
View all comments
Post a comment

Leave a Comment

Your email address will not be published. Required fields are marked *

Would love your thoughts, please comment.x