Site MapHelpFeedbackTHE HIPAA SECURITY STANDARDS
THE HIPAA SECURITY STANDARDS


HIPAA Security

Electronic Protected Health Information
Threats to Information Security
Security Background
Organization of the HIPAA Security Standards
Administrative, Physical, and Technical Standards
Implementation Specifications
Administrative Standards
Key Provisions
Implementation Specifications for Administrative Standards
Physical Standards
Key Provisions
Implementation Specifications for Physical Standards
Technical Standards
Key Provisions
Implementation Specifications for Technical Standards
HIPAA Security Standards: Portable and/or Mobile Media, Faxes, and E-mail
Portable and/or Mobile Media Guidance
Sending Faxes and E-mail
Case Discussion
Case 1
Case 2
Case 3



After studying this chapter, you should be able to:
  1. Define electronic protected health information (ePHI).


  2. List the three goals of the HIPAA security standards.


  3. Compare and contrast risk analysis and risk management.


  4. Define identity theft.


  5. Describe the organization of the HIPAA Security Rule.


  6. Explain the purpose of implementation specifications, distinguishing between those that are required and those that are addressable.


  7. Describe key administrative safeguards.


  8. Discuss key physical safeguards.


  9. Describe key technical safeguards.


  10. Discuss the HIPAA security considerations for portable and/or mobile devices and for fax and e-mail transmissions.







HIPAA for Allied Health CareerOnline Learning Center

Home > Chapter 3