Skip to main content
HIPAA - Health Insurance Portability and Accountability Act

HIPAA

CYBERSECURITY DICTIONARY

HIPAA - Health Insurance Portability and Accountability Act

The goal of HIPAA is to enable the movement of health information among health-related organizations in a protected manner.

It includes various stringent privacy and security protections including limits on sharing and use of encryption, and it specifically defines the authorized uses and disclosures of "individually-identifiable" health information. It also sets requirements for how protected health information (PHI), in any form or medium, should be controlled. It is divided into five main Rules: Privacy Rule, Security Rule, Transactions and Code Sets (TCS) Rule, Unique Identifiers Rule and (HITECH) Enforcement Rule.

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

Related Assets

July 21, 2015

HIPAA

Learn how we can help you address HIPAA compliance and improve PHI security.

See Details

February 22, 2016

Understanding Data Flow and Achieving HIPAA Compliance

Uniting consistent process and strict standards for network security.

See Details

February 03, 2014

HIPAA Compliance

Technology is used today to exchange health information in an electronic environment. The use of this technology will greatly enhance the delivery of ...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.