Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Last revision Both sides next revision
technical_safeguards [2016/06/15 18:11]
jillian_nadette_de_leon
technical_safeguards [2016/06/15 18:53]
jillian_nadette_de_leon
Line 1: Line 1:
 ##TECHNICAL SAFEGUARDS ##TECHNICAL SAFEGUARDS
- 
-* Disclaimer: For information purposes only. Standard terms, definition, sentence construction will still be edited. \\ 
  
 **A. Access Controls**\\ **A. Access Controls**\\
Line 56: Line 54:
  
 **D. Transmission Security**\\ **D. Transmission Security**\\
-Implement technical ​security measures to guard against unauthorized access to electronic ​protected ​health information that is being transmitted over an electronic communications network.\\+Technical ​security measures to guard against unauthorized access to electronic health information that is being transmitted over an electronic communications network ​shall be implemented.\\
  
 **E. Identity Authentication**\\ **E. Identity Authentication**\\
-Implement procedures ​to verify that a person or entity seeking access to electronic ​protected ​health information is the one claimed. \\+Procedures ​to verify that a person or entity seeking access to electronic health information is the one claimed ​shall be implemented. Rule III (Access of Health Information) provides guidelines on authentication of access. \\
  
 **F. Storage Security**\\ **F. Storage Security**\\
Line 65: Line 63:
 (A) Data stored in portable data storage devices (e.g. USB drive, portable hard drives, etc.) must be encrypted. ​ (A) Data stored in portable data storage devices (e.g. USB drive, portable hard drives, etc.) must be encrypted. ​
 (B) Data stored in cloud storage services (e.g. Dropbox, OneDrive, Google Drive, etc.) must be encrypted. (B) Data stored in cloud storage services (e.g. Dropbox, OneDrive, Google Drive, etc.) must be encrypted.
- 
- 
- 
- 
- 
  
 ---- ----