Building a HIPAA-compliant cybersecurity program : using NIST 800-30 and CSF to secure protected health information /

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area f...

Full description

Saved in:
Bibliographic Details
Main Author: Thompson, Eric C. (Author)
Format: eBook
Published: [Place of publication not identified] : Apress, [2017]
Online Access:CONNECT