!!! Overview [{$pagename}] ([HIPAA]) is a [United States Federal Law] and a [Federal Health Care Law] As our primary focus is around "[data]" and specifically, [Health information] we will concentrate on the "Security Rule" provisions and data transmission related aspects of [{$pagename}]. %%warning Never trust [{$applicationname}]. Always perform your own due diligence. [Standard Disclaimer|Standard Disclaimer] %% !! [Health Information Portability and Accountability Act (HIPAA)|http://aspe.hhs.gov/admnsimp/pl104191.htm] In basic terms, the [{$pagename}] The [HIPAA Privacy Rule] covers [Protected Health Information] in any medium while the [HIPAA Security Rule] covers electronic [Protected Health Information]. Also known as the Kennedy-Kassebaum Act, the Act includes a section, Title II, entitled Administrative Simplification, requiring [Compliance]: # Improved efficiency in healthcare delivery by standardizing electronic data interchange, and # Protection of [confidentiality] and [security] of health data through setting and enforcing standards. More specifically, HIPAA called upon the [United States Department of Health and Human Services] ([HHS]) to publish new [Regulatory compliance] rules that will ensure: # Standardization of electronic [patient] health, administrative and [Financial Data] # Unique health identifiers for individuals, employers, health plans and health care providers # Security standards protecting the [confidentiality] and [integrity] of "individually identifiable health information," past, present or future. Effective [compliance] requires organization-wide implementation. [Compliance] requirements include: * Building initial organizational awareness of [HIPAA] * Comprehensive assessment of the organization's [privacy] practices, information security systems and procedures, and use of electronic transactions * Developing an action plan for [compliance] with each rule * Developing a technical and management infrastructure to implement the plans * Implementing a comprehensive implementation action plan, including ** Developing new policies, processes, and procedures to ensure [privacy], [security] and [patients]' rights ** Building business associate agreements with business partners to support HIPAA objectives ** Developing a secure technical and physical information infrastructure ** Updating information systems to safeguard [Protected Health Information] ([PHI]) and enable use of standard claims and related transactions ** Training of all workforce members ** Developing and maintaining an internal privacy and security management and enforcement infrastructure, including providing a [Privacy Officer] and a [Security Officer] !! Data Generated By [Patient] Generally, [Data] Generated By [Patient] is "mostly outside of the disclosure restrictions and requirements found in the [{$pagename}] ([HIPAA])"[1] !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [Report on Best Privacy Practices for R&D in the Wearables|https://cdt.org/files/2016/05/2016-05-17-Fitbit-FNL1.pdf/|target='_blank'] - based on information obtained 2016-05-20-