e PHI in transit includes patient information sent between computer systems (internal and external).
The security risks are generally greater when e PHI is being transmitted outside of an organization’s internal network.
One of the most important steps in preparing to implement these standards is to review the HIPAA security rule itself.
The most important elements of the rule are summarized below.
The HIPAA Security Rule describes safeguards as the administrative, physical, and technical considerations that an organization must incorporate into its HIPAA security compliance plan.In addition, it highlights the skills that health information management (HIM) professionals possess to maintain HIPAA security compliance within their organizations.The Department of Health and Human Services (HHS) published the HIPAA security rule on February 20, 2003.In a healthcare setting, this security includes e PHI used for clinical decision making or healthcare operations. Health Information Technology for Economic and Clinical Health (HITECH) Act, Title XIII of the American Recovery and Reinvestment Act (Public Law 111-5), enactment on February 17, 2009. Scalability allows organizations to identify security measures appropriate for its own unique operational risks and other factors. “Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules; Final Rule.” 45 CFR Parts 160 and 164.