Health Information Management

HHS outlines ways to secure PHI, create safe harbor against security breach notification

HIM-HIPAA Insider, April 28, 2009

Want to receive articles like this one in your inbox? Subscribe to HIM-HIPAA Insider!

HHS published guidance April 17 that identifies the technologies and methodologies that render protected health information (PHI) unusable, unreadable, or indecipherable to unauthorized individuals. HHS developed the guidance along with the Office of Civil Rights, the Office of the National Coordinator for Health Information Technology, and CMS in response to requirements outlined in the American Recovery and Reinvestment Act (ARRA) of 2009. When entities that are subject to the regulations apply these technologies and methodologies to secure PHI, those entities they are not required to provide notification when a breach occurs. To view the guidance, visit the HHS Web site.



Want to receive articles like this one in your inbox? Subscribe to HIM-HIPAA Insider!

Most Popular