• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

Protection detail. Protecting against breach of electronic protected health information.

作者信息

Blass Gerry, Miller Susan A

机构信息

Blass Affiliates LLC, USA.

出版信息

J Healthc Inf Manag. 2010 Summer;24(3):7-8.

PMID:20677463
Abstract

Covered entities need to conduct risk assessments that cover the requirements of HIPAA, HITECH and Meaningful use, and create a process for steady and consistent mitigation of known gaps and vulnerabilities based on risk. Reducing risk of vulnerabilities of unauthorized access to your ePHI can be done via safeguards and controls, plus audits and monitoring. When reducing risk is outside of a covered entities control, audits and monitoring are required in order to demonstrate due diligence. Know where your ePHI is stored, where it is at risk, and take steps now to reduce or eliminate the risk. Encrypt vulnerable locations. Encrypt sensitive data. By doing so, you will be protecting your organization by reducing risk of breach of ePHI. Finally, don't forget what is sometimes considered to be the hardest part--documenting your compliance activities in order to demonstrate evidence of due diligence in and avoid major $$$$ penalties for negligence under the HITECH Act of 2009.

摘要

相似文献

1
Protection detail. Protecting against breach of electronic protected health information.
J Healthc Inf Manag. 2010 Summer;24(3):7-8.
2
HITECH notice requirements for breach of unsecured PHI. What changes apply to you and your organization?《健康信息技术经济和临床健康法案》(HITECH)关于违反未加密的受保护健康信息(PHI)的通知要求。哪些变化适用于你和你的组织?
J Healthc Inf Manag. 2010 Winter;24(1):15-6.
3
5 steps to prevent a data breach in your practice.
Med Econ. 2011 Oct 25;88(20):54-5.
4
HIPAA risk is contagious: practical tips to prevent breach.
J Med Pract Manage. 2013 Jul-Aug;29(1):53-5.
5
Keys to securing data as a practitioner.作为从业者保护数据的关键。
J Med Pract Manage. 2012 Jan-Feb;27(4):203-5.
6
Privacy and security become financial concern under HITECH Act.根据《健康信息技术经济和临床健康法案》,隐私和安全成为财务问题。
Revenue-cycle Strateg. 2010 Jul-Aug;7(7):6-7.
7
Recognizing and reducing risks: HIPAA privacy and security enforcement.识别与降低风险:《健康保险流通与责任法案》隐私与安全执法
Mich Health Hosp. 2003 Nov-Dec;39(6):32-3.
8
Final HIPAA security regulations: a review.《健康保险流通与责任法案》最终安全法规:综述
Manag Care Q. 2003 Summer;11(3):15-27.
9
Taking aim at medical identity theft. Document security key element to comply with government regulations.瞄准医疗身份盗窃。文档安全是符合政府法规的关键要素。
J Med Pract Manage. 2010 May-Jun;25(6):383-5.
10
HITECH meets HIPAA. HITECH Act changes to HIPAA obligations for covered entities and business associates.《健康信息技术经济与临床健康法案》(HITECH)与《健康保险流通与责任法案》(HIPAA)接轨。《健康信息技术经济与临床健康法案》对受保实体和业务伙伴的《健康保险流通与责任法案》义务作出了修改。
J Healthc Inf Manag. 2009 Fall;23(4):15-6.