Building a HIPAA-compliant cybersecurity program : using NIST 800-30 and CSF to secure protected health information /
Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area f...
Saved in:
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
[Place of publication not identified] :
Apress,
[2017]
|
Subjects: | |
Online Access: | CONNECT CONNECT |