Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals
November 16 2022
Posted in: ePHI Data
Protected health information (PHI) is rendered unusable, unreadable, or indecipherable to unauthorized individuals if one or more of the following applies: Electronic PHI has been encrypted as specified in the HIPAA Security Rule by “the use of an algorithmic process to transform data into a form in which there is a low probability of assigning meaning without use of a confidential process or key” (45 CFR 164.304 definition of encryption) and such confidential process or key that might enable decryption has not been breached.  To avoid a breach of the confidential process or key, these decryption tools should be stored on a device or at a location separate from the data they are used to encrypt or decrypt.  The encryption processes identified below have been tested by the National Institute of Standards and Technology (NIST) and judged to meet this standard. Valid encryption processes for data at rest are ...read more
Label / Permalink
Share |
   


Pages:  1 

December 2024
SuMoTuWeThFrSa
1234567
891011121314
15161718192021
22232425262728
293031

Blog Home  

Newest Blog Entries
11/16/22 Administrative Requirements and Burden of Proof

11/16/22 Notification by a Business Associat

11/16/22 Breach Notification Requirements

11/16/22 Unsecured Protected Health Information and Guidance

11/16/22 Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals

11/16/22 Definition of Breach

11/16/22 Breach Notification Rule

11/16/22 Notify Individuals

11/16/22 Notify Appropriate Parties

11/16/22 Fix Vulnerabilities

11/16/22 Secure Your Operations

Blog Archives
November 2022 (11)

Blog Labels
ePHI Data (1)
Data Breach Reporting (4)
Data Breach Notification (6)