Site MapHelpFeedbackChapter Overview
Chapter Overview
(See related pages)

The information in this chapter will enable you to:

<a onClick="window.open('/olcweb/cgi/pluginpop.cgi?it=jpg::::/sites/dl/free/0073401978/585868/arrow.jpg','popWin', 'width=72,height=90,resizable,scrollbars');" href="#"><img valign="absmiddle" height="16" width="16" border="0" src="/olcweb/styles/shared/linkicons/image.gif"> (1.0K)</a>  Understand the importance of the HIPAA Privacy Rule to the protection of personal health information.

<a onClick="window.open('/olcweb/cgi/pluginpop.cgi?it=jpg::::/sites/dl/free/0073401978/585868/arrow.jpg','popWin', 'width=72,height=90,resizable,scrollbars');" href="#"><img valign="absmiddle" height="16" width="16" border="0" src="/olcweb/styles/shared/linkicons/image.gif"> (1.0K)</a>  Understand when protected health information (PHI) can be released with a patient's consent and when an authorization must be obtained.

<a onClick="window.open('/olcweb/cgi/pluginpop.cgi?it=jpg::::/sites/dl/free/0073401978/585868/arrow.jpg','popWin', 'width=72,height=90,resizable,scrollbars');" href="#"><img valign="absmiddle" height="16" width="16" border="0" src="/olcweb/styles/shared/linkicons/image.gif"> (1.0K)</a>  Understand how the increasing use of computers and networks such as the Internet places health information at risk.

<a onClick="window.open('/olcweb/cgi/pluginpop.cgi?it=jpg::::/sites/dl/free/0073401978/585868/arrow.jpg','popWin', 'width=72,height=90,resizable,scrollbars');" href="#"><img valign="absmiddle" height="16" width="16" border="0" src="/olcweb/styles/shared/linkicons/image.gif"> (1.0K)</a>  Understand the types of safeguards included in the HIPAA Security Rule.

<a onClick="window.open('/olcweb/cgi/pluginpop.cgi?it=jpg::::/sites/dl/free/0073401978/585868/arrow.jpg','popWin', 'width=72,height=90,resizable,scrollbars');" href="#"><img valign="absmiddle" height="16" width="16" border="0" src="/olcweb/styles/shared/linkicons/image.gif"> (1.0K)</a>  Understand how the health care environment has changed since the HIPAA legislation was enacted and why existing privacy and security laws may no longer be adequate.








Electronic Health RecordsOnline Learning Center

Home > Chapter 6 > Chapter Overview