Reference Hub2
A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach

A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach

Young B. Choi, Christopher E. Williams
Copyright: © 2021 |Volume: 3 |Issue: 2 |Pages: 18
ISSN: 2577-4816|EISSN: 2577-4824|EISBN13: 9781799863410|DOI: 10.4018/IJCRE.2021070103
Cite Article Cite Article

MLA

Choi, Young B., and Christopher E. Williams. "A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach." IJCRE vol.3, no.2 2021: pp.28-45. http://doi.org/10.4018/IJCRE.2021070103

APA

Choi, Y. B. & Williams, C. E. (2021). A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach. International Journal of Cyber Research and Education (IJCRE), 3(2), 28-45. http://doi.org/10.4018/IJCRE.2021070103

Chicago

Choi, Young B., and Christopher E. Williams. "A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach," International Journal of Cyber Research and Education (IJCRE) 3, no.2: 28-45. http://doi.org/10.4018/IJCRE.2021070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Data breaches have a profound effect on businesses associated with industries like the US healthcare system. This task extends more pressure on healthcare providers as they continue to gain unprecedented access to patient data, as the US healthcare system integrates further into the digital realm. Pressure has also led to the creation of the Health Insurance Portability and Accountability Act, Omnibus Rule, and Health Information Technology for Economic and Clinical Health laws. The Defense Information Systems Agency also develops and maintains security technical implementation guides that are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures. The objective is to design a network (physician's office) in order to meet the complexity standards and unpredictable measures posed by attackers. Additionally, the network must adhere to HIPAA security and privacy requirements required by law. Successful implantation of network design will articulate comprehension requirements of information assurance security and control.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.