Reference Hub1
A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach

A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach

Young B. Choi, Christopher E. Williams
Copyright: © 2022 |Pages: 20
ISBN13: 9781668463116|ISBN10: 1668463113|EISBN13: 9781668463123
DOI: 10.4018/978-1-6684-6311-6.ch032
Cite Chapter Cite Chapter

MLA

Choi, Young B., and Christopher E. Williams. "A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach." Research Anthology on Securing Medical Systems and Records, edited by Information Resources Management Association, IGI Global, 2022, pp. 706-725. https://doi.org/10.4018/978-1-6684-6311-6.ch032

APA

Choi, Y. B. & Williams, C. E. (2022). A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach. In I. Management Association (Ed.), Research Anthology on Securing Medical Systems and Records (pp. 706-725). IGI Global. https://doi.org/10.4018/978-1-6684-6311-6.ch032

Chicago

Choi, Young B., and Christopher E. Williams. "A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach." In Research Anthology on Securing Medical Systems and Records, edited by Information Resources Management Association, 706-725. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-6684-6311-6.ch032

Export Reference

Mendeley
Favorite

Abstract

Data breaches have a profound effect on businesses associated with industries like the US healthcare system. This task extends more pressure on healthcare providers as they continue to gain unprecedented access to patient data, as the US healthcare system integrates further into the digital realm. Pressure has also led to the creation of the Health Insurance Portability and Accountability Act, Omnibus Rule, and Health Information Technology for Economic and Clinical Health laws. The Defense Information Systems Agency also develops and maintains security technical implementation guides that are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures. The objective is to design a network (physician's office) in order to meet the complexity standards and unpredictable measures posed by attackers. Additionally, the network must adhere to HIPAA security and privacy requirements required by law. Successful implantation of network design will articulate comprehension requirements of information assurance security and control.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.