4.6 MAPPING PHI DATAFLOW


4.6 MAPPING PHI DATAFLOW

To comply with both rules, CEs must understand and map their PHI data flow. In other words, they must know how and where PHI moves throughout their organization. Additionally, they must determine if PHI is being exchanged with outside entities such as business partners . Understanding the data flow is necessary if a CE is to choose and implement appropriate and reasonable PHI safeguards.




HIPAA Security Implementation, Version 1.0
HIPAA Security Implementation, Version 1.0
ISBN: 974372722
EAN: N/A
Year: 2003
Pages: 181

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net