Edemekong et al., 2018 - Google Patents
Health insurance portability and accountability actEdemekong et al., 2018
View HTML- Document ID
- 13400057579054098445
- Author
- Edemekong P
- Annamaraju P
- Haydel M
- Publication year
External Links
Snippet
The Health Insurance Portability and Accountability Act of 1996 (HIPAA; Kennedy– Kassebaum Act, or Kassebaum–Kennedy Act) consists of 5 Titles. Title I: Protects health insurance coverage for workers and their families who change or lose their jobs. It limits new …
- 230000036541 health 0 title abstract description 142
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Edemekong et al. | Health insurance portability and accountability act | |
Tovino | The HIPAA privacy rule and the EU GDPR: illustrative comparisons | |
Anderson et al. | Ethics and information technology: a case-based approach to a health care system in transition | |
Assistance | Summary of the hipaa privacy rule | |
Hecker et al. | The impact of HIPAA and HITECH: New standards for confidentiality, security, and documentation for marriage and family therapists | |
Lincke | Complying with HIPAA and HITECH | |
Calloway et al. | The new HIPAA law on privacy and confidentiality | |
Basani | Legal protection of patient's electronic medical record: Indonesian legal perspective | |
Edemekong et al. | Health Insurance Portability and Accountability Act (HIPAA) Compliance | |
Cousins | Health IT legislation in the United States: Guidelines for IS researchers | |
Szalados | Medical Records and Confidentiality: Evolving Liability Issues Inherent in the Electronic Health Record, HIPAA, and Cybersecurity | |
Rule | Health insurance portability and accountability act | |
Harman | HIPAA: a few years later | |
Goodwin et al. | A pilot study: Patients’ perceptions about the privacy of their medical records | |
Petrila et al. | Sequential intercept mapping, confidentiality, and the cross-system sharing of health-related information | |
Tsai | Cheaper and better: The congressional administrative simplification mandate facilitates the transition to electronic medical records | |
Paterick | Why the HIPAA Privacy Rules Are Important for Physicians to Know | |
Nair et al. | A comparative study of security and privacy in electronic health records | |
Vanderpool | Legal aspects of teleanalysis in the United States | |
Schoppmann et al. | HIPAA compliance: The law, reality, and recommendations | |
Osundina et al. | Legal Issues in the Management of Patients’ Records in Tertiary Hospitals in Nigeria | |
SR et al. | Legal Regulations of Electronic Health Records: A Comparative Perspective | |
Schick | After HITECH: HIPAA revisions mandate stronger privacy and security safeguards | |
Zur | HIPAA Compliance Kit | |
Onyejekwe | EHR, The Laws and Limits of the Laws |