This Rule sets national standards for protecting the confidentiality, integrity, and availability of electronic protected health information. The Security Rule protects a subset of information covered by the Privacy Rule, which is all individually identifiable health information a covered entity creates, receives, maintains or transmits in electronic form. The Security Rule calls this information “electronic protected health information” (e-PHI). The Security Rule does not apply to PHI transmitted orally or in writing.
HIPAA Security Checklist
Summary of the HIPAA Security Rule
What do I have to do to become HIPAA compliant? READ MORE
EHR attestation: Demonstrating Meaningful Use CR15
CR15 - Protect Electronic Health Information
To purchase the HIPAA Security Policies and Procedures for compliance: CLICK HERE