SlideShare a Scribd company logo
1 of 12
Download to read offline
1 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Information Security and Legal
Compliance
Simplifying Security.
Module 12
2 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Watchdog Reports: Security Catalysts?
The timing of two new watchdog reports that highlight the need to 
protect the security of electronic health records could help build 
momentum for action, some observers say.
This week's reports from the Department of Health and Human 
Services' Office of the Inspector General call for a ramping up of 
enforcement of the HIPAA Security Rule and the inclusion of more 
security requirements in the HITECH Act electronic health record 
incentive program (see: Watchdog Hits HHS on Records Security).
The HHS Office for Civil Rights, which enforces HIPAA, recently 
requested a 13.5 percent increase in its fiscal 2012 budget for, 
among other things, enforcement of the HIPAA Security Rule and 
compliance reviews of smaller breach incidents (see: More HIPAA 
Enforcement Funding Sought). "So it's timely to raise the issue of 
HIPAA enforcement in the middle of the budget discussions," says 
Dan Rode, vice president of policy and government relations at the 
American Health Information Management Association.
http://www.govinfosecurity.com
May 19, 2011 
3 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Two recent cases suggest we have entered a new era of more stringent enforcement of HIPAA's privacy 
and security standards.
For the first time, the Office for Civil Rights (OCR) at the Department of Health and Human Services, 
which is charged with enforcing HIPAA's privacy and security standards, has imposed a civil money 
penalty under HIPAA, or the Health Insurance Portability and Accountability Act.
In a press release from February, OCR announced that Cignet Health of Maryland was fined a total of 
$4.3 million for ignoring requests for medical records
from 41 individuals and for failing to cooperate with 
OCR's investigation of 27 related complaints.
Two days later, OCR announced a $1 million settlement
with Massachusetts General Hospital after an employee left documents containing patients' health 
information on the subway. OCR's investigation indicated that the hospital "failed to implement 
reasonable, appropriate safeguards to protect the privacy of protected health information."
Business Workshop: HITECH Ushers in Era of Higher 
Penalties Under HIPAA
http://www.post‐gazette.com
Monday, May 23, 2011
4 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Objectives
HIPPA (Health Insurance Portability 
and Accountability Act)
HIPPA Checklist
FERPA (Family Educational Rights and 
Privacy Act)
FERPA Checklist
PCI DSS (Payment Card Industry Data 
Security Standard)
PCI DSS Checklist
5 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
Health Insurance
Portability and
Accountability Act
(HIPPA)
Payment Card
Industry Data
Security Standard
(PCI DSS)
Family Educational
Rights and Privacy
Act (FERPA)
6 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
HIPAA (Health Insurance Portability and
Accountability Act)
Objectives of HIPPA
Its goal is to improve the effectiveness and 
efficiency of the health care system
Group and Individual Insurance Reform
It allows for portability and continuity of health 
insurance and places limits on pre‐existing 
exclusion provisions
It reduces the potential for waste, fraud, and 
abuse
New penalties and sanctions will be imposed
It requires the application of uniform standards to 
electronic data transactions in a confidential and 
secure environment
HIPPA is a security standard to provide physical, technical, and administrative safeguards to protect 
the integrity, availability, and confidentiality of health information
The purpose of this security standard is to prevent the inappropriate use and disclosure of 
individuals’ health information
It imposes restrictions on organizations to protect health information and the systems that store, 
transmit, and process it
7 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
File cabinets or drawers storing 
patient records should be 
securely locked, or if possible, 
the room itself
Restrict access to computer 
terminals to only authorized 
personnel and set up passcodes 
for electronic files
Be alert to security lapses that 
might allow illegitimate users to 
access the records
Professional workforce should be 
trained with HIPPA requirements, 
both on and off the job
Ensure that the employees know 
about the endorsements they can 
expect for violating HIPAA 
restrictions
Violators of HIPPA are punished 
to send a message to other 
employees that HIPAA is 
considered seriously within the 
organization
Ensure that only authorized 
personnel have access to 
the HIPAA protected 
information
Review the file logs or 
computer records regularly 
to know how the 
authorization is used to 
ensure that it is not abused
HIPAA Checklist
File Security Education and Sanctions Authorization Procedures
8 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
FERPA (Family Educational Rights
and Privacy Act)
The Family Education Rights and Privacy Act 
(FERPA) of 1974 also known as the Buckley 
Amendment, is a federal law that is meant 
to protect the accuracy and privacy of 
student education records
This law is applicable to all institutions that 
are recipients of federal service directed by 
the Secretary of Education
FERPA gives certain rights to parents with 
respect to their children’s educational 
records. Rights transfer to the student when 
he/she reaches the age of 18 or a school 
beyond the high school level
The rights given to students by FERPA 
regarding the educational records include:
Right to access educational records kept by 
the school 
Right to demand that educational records be 
disclosed only with student permission
Right to amend educational records
Right to file complaints against the school for 
disclosing educational records in violation of 
FERPA
Right to know about the purpose, content, 
and location of information kept as a part of 
their educational records
Individual staff or faculty’s private notes, campus 
police records, medical records, and statistical 
data compilations that do not contain personally 
identifiable student information are not 
considered as educational records under FERPA
9 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
FERPA Checklist
Post the grades using secure technology
Ensure that the confidential, non‐directory, and 
sensitive student personal information is 
encrypted whereever it is stored such as laptops 
and thumb drives
Do not use social security numbers for any 
purpose unless necessary. Replace them with UINs
(Universal Identification Number)
Do not leave graded tests or papers in a stack for 
students to pickup by sorting through the tests or 
papers of all students
Do not provide anyone with student schedules or 
assist anyone other than professional university 
employees in finding a student on campus
Do not link the name of a student with that 
student’s social security number or universal 
identification number (UIN) in any public manner 
Do not discuss the progress of any student with 
anyone other than the student (including 
parents/guardians) without the consent of the 
student
Do not provide anyone with lists of students 
enrolled in classes for any commercial purpose
Institutions must have written permission from the 
student to release any information from the 
student’s educational record
Only student directory information can be disclosed 
by the institutions without the student’s permission 
but not non‐directory information
Students should be notified about their rights under 
FERPA  by institutions through annual publications
10 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
PCI DSS (Payment Card Industry Data
Security Standard )
Payment Card Industry Data Security Standard (PCI DSS) is a set of guidelines, measures, and controls 
that were established to assist merchants implement strong security precautions to ensure safe credit 
card usage and secure information storage
Businesses with merchant identification that takes credit card payments—whether online, over the 
phone, or using credit card machines or paper forms—need to comply with these standards, even if 
they use a payment service provider
Objectives of PCI DSS include the following:
Build and Maintain a Secure Network
Protect Cardholder Data
Regularly Monitor and Test 
Networks
Maintain a Vulnerability Management 
Program
Maintain an Information Security Policy
Implement Strong Access Control 
Measures
11 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
PCI DSS Checklist
Assign a unique ID to each person with 
computer access
Install and maintain a firewall 
configuration to protect cardholder data
Protect stored cardholder data
Use and regularly update anti‐virus 
software
Track and monitor all access to network 
resources and cardholder data
Restrict physical access to cardholder 
data
Encrypt transmission of cardholder data 
across open, public networks
Maintain a policy that addresses 
information security
Regularly test security systems and 
processes
Do not use vendor‐supplied defaults for 
system passwords and other security 
parameters
Develop and maintain secure systems 
and applications
Restrict access to cardholder data by 
business need‐to‐know
12 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Summary
 HIPPA is a security standard to provide physical, technical, and administrative 
safeguards to protect the integrity, availability, and confidentiality of health information
 The purpose of HIPPA is to prevent the inappropriate use and disclosure of individuals’ 
health information
 FERPA is a federal law that is meant to protect the accuracy and privacy of student 
education records
 PCI DSS is a set of guidelines, measures, and controls that were established to assist 
merchants implement strong security precautions to ensure safe credit card usage and 
secure information storage
 Businesses with merchant identification that takes credit card payments—whether 
online, over the phone, or using credit card machines or paper forms—need to comply 
with PCI DSS standards

More Related Content

What's hot

HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for StartupsObaa, Inc.
 
BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)- Mark - Fullbright
 
ACA Replacement Bill Withdrawn
ACA Replacement Bill WithdrawnACA Replacement Bill Withdrawn
ACA Replacement Bill WithdrawnKelley M. Bendele
 
Federal Benefits Developments - Audits Abound: Are You Ready?
Federal Benefits Developments - Audits Abound: Are You Ready?Federal Benefits Developments - Audits Abound: Are You Ready?
Federal Benefits Developments - Audits Abound: Are You Ready?CBIZ, Inc.
 
Hot Topics of Human Resources
Hot Topics of Human ResourcesHot Topics of Human Resources
Hot Topics of Human ResourcesMPCA
 
HIPAA Security Rule application to Business Associates heats up
HIPAA Security Rule application to Business Associates heats upHIPAA Security Rule application to Business Associates heats up
HIPAA Security Rule application to Business Associates heats upDavid Sweigert
 
Hawaii- Leadership Under Fire - Balancing Governor's Emergency Powers and Gov...
Hawaii- Leadership Under Fire - Balancing Governor's Emergency Powers and Gov...Hawaii- Leadership Under Fire - Balancing Governor's Emergency Powers and Gov...
Hawaii- Leadership Under Fire - Balancing Governor's Emergency Powers and Gov...CliftonHasegawa1
 
You Ought To Know April 8 2014 - HHS Guidance on Health Plan Identifier and P...
You Ought To Know April 8 2014 - HHS Guidance on Health Plan Identifier and P...You Ought To Know April 8 2014 - HHS Guidance on Health Plan Identifier and P...
You Ought To Know April 8 2014 - HHS Guidance on Health Plan Identifier and P...Annette Wright, GBA, GBDS
 
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & SecurityThe Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & SecurityPolsinelli PC
 
D2015 Protected-Health-Information-Data-Breach-Report
D2015 Protected-Health-Information-Data-Breach-ReportD2015 Protected-Health-Information-Data-Breach-Report
D2015 Protected-Health-Information-Data-Breach-ReportThe Internet of Things
 
Hipaa 2013 final rule 2013 01073
Hipaa 2013 final rule 2013 01073Hipaa 2013 final rule 2013 01073
Hipaa 2013 final rule 2013 01073Liberteks
 
You Ought To Know: September 20, 2013 – HIPAA Privacy FAQs
You Ought To Know:  September 20, 2013 – HIPAA Privacy FAQsYou Ought To Know:  September 20, 2013 – HIPAA Privacy FAQs
You Ought To Know: September 20, 2013 – HIPAA Privacy FAQsAnnette Wright, GBA, GBDS
 
Hipaa audits and enforcement
Hipaa audits and enforcementHipaa audits and enforcement
Hipaa audits and enforcementsupportc2go
 
Do You Know How to Handle a HIPAA Breach?
Do You Know How to Handle a HIPAA Breach?Do You Know How to Handle a HIPAA Breach?
Do You Know How to Handle a HIPAA Breach?Compliancy Group
 
4 Digital Health Trends Affecting Your Revenue Cycle
4 Digital Health Trends Affecting Your Revenue Cycle4 Digital Health Trends Affecting Your Revenue Cycle
4 Digital Health Trends Affecting Your Revenue CycleMeduit
 

What's hot (19)

HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for Startups
 
White papers regulations
White papers   regulations White papers   regulations
White papers regulations
 
BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)
 
Chapter 1 the goal of hipaa administrative simplification
Chapter 1 the goal of hipaa   administrative simplificationChapter 1 the goal of hipaa   administrative simplification
Chapter 1 the goal of hipaa administrative simplification
 
ACA Replacement Bill Withdrawn
ACA Replacement Bill WithdrawnACA Replacement Bill Withdrawn
ACA Replacement Bill Withdrawn
 
Federal Benefits Developments - Audits Abound: Are You Ready?
Federal Benefits Developments - Audits Abound: Are You Ready?Federal Benefits Developments - Audits Abound: Are You Ready?
Federal Benefits Developments - Audits Abound: Are You Ready?
 
Hot Topics of Human Resources
Hot Topics of Human ResourcesHot Topics of Human Resources
Hot Topics of Human Resources
 
HIPAA Security Rule application to Business Associates heats up
HIPAA Security Rule application to Business Associates heats upHIPAA Security Rule application to Business Associates heats up
HIPAA Security Rule application to Business Associates heats up
 
Hawaii- Leadership Under Fire - Balancing Governor's Emergency Powers and Gov...
Hawaii- Leadership Under Fire - Balancing Governor's Emergency Powers and Gov...Hawaii- Leadership Under Fire - Balancing Governor's Emergency Powers and Gov...
Hawaii- Leadership Under Fire - Balancing Governor's Emergency Powers and Gov...
 
You Ought To Know April 8 2014 - HHS Guidance on Health Plan Identifier and P...
You Ought To Know April 8 2014 - HHS Guidance on Health Plan Identifier and P...You Ought To Know April 8 2014 - HHS Guidance on Health Plan Identifier and P...
You Ought To Know April 8 2014 - HHS Guidance on Health Plan Identifier and P...
 
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & SecurityThe Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
 
D2015 Protected-Health-Information-Data-Breach-Report
D2015 Protected-Health-Information-Data-Breach-ReportD2015 Protected-Health-Information-Data-Breach-Report
D2015 Protected-Health-Information-Data-Breach-Report
 
Hipaa 2013 final rule 2013 01073
Hipaa 2013 final rule 2013 01073Hipaa 2013 final rule 2013 01073
Hipaa 2013 final rule 2013 01073
 
You Ought To Know: September 20, 2013 – HIPAA Privacy FAQs
You Ought To Know:  September 20, 2013 – HIPAA Privacy FAQsYou Ought To Know:  September 20, 2013 – HIPAA Privacy FAQs
You Ought To Know: September 20, 2013 – HIPAA Privacy FAQs
 
Hipaa audits and enforcement
Hipaa audits and enforcementHipaa audits and enforcement
Hipaa audits and enforcement
 
Do You Know How to Handle a HIPAA Breach?
Do You Know How to Handle a HIPAA Breach?Do You Know How to Handle a HIPAA Breach?
Do You Know How to Handle a HIPAA Breach?
 
4 Digital Health Trends Affecting Your Revenue Cycle
4 Digital Health Trends Affecting Your Revenue Cycle4 Digital Health Trends Affecting Your Revenue Cycle
4 Digital Health Trends Affecting Your Revenue Cycle
 
White papers legislation
White papers   legislationWhite papers   legislation
White papers legislation
 
Marpai Investor Presentation 2022
Marpai Investor Presentation 2022Marpai Investor Presentation 2022
Marpai Investor Presentation 2022
 

Viewers also liked

Финансовые компании глазами клиентов: особенности восприятия
Финансовые компании глазами клиентов: особенности восприятияФинансовые компании глазами клиентов: особенности восприятия
Финансовые компании глазами клиентов: особенности восприятияFIN people group
 
Idea de negocio seminario G Y E Los Libertadores
Idea de negocio seminario G Y E Los Libertadores Idea de negocio seminario G Y E Los Libertadores
Idea de negocio seminario G Y E Los Libertadores Jonathan Herrera
 
CorporateWellness
CorporateWellnessCorporateWellness
CorporateWellnessLisa Walsh
 
Mat102 20140826 - solving 2-step linear inequations
Mat102   20140826 - solving 2-step linear inequationsMat102   20140826 - solving 2-step linear inequations
Mat102 20140826 - solving 2-step linear inequationscheeky88
 
Мистецька інтервенція в урбаністичний простір міста
Мистецька інтервенція в урбаністичний простір містаМистецька інтервенція в урбаністичний простір міста
Мистецька інтервенція в урбаністичний простір містаAlya Druzhenko
 
Nuevas tecnologias
Nuevas tecnologiasNuevas tecnologias
Nuevas tecnologiasSandra3494
 
Lehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketa
Lehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketaLehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketa
Lehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketaIrekia - EJGV
 
partes de word
partes de wordpartes de word
partes de wordErIck NaSh
 
Cómo unirse a un grupo e twinning
Cómo unirse a un grupo e twinningCómo unirse a un grupo e twinning
Cómo unirse a un grupo e twinningeTwinning España
 
Challenges in intensifying India smallholder dairy production: Health risks a...
Challenges in intensifying India smallholder dairy production: Health risks a...Challenges in intensifying India smallholder dairy production: Health risks a...
Challenges in intensifying India smallholder dairy production: Health risks a...ILRI
 
Центр решений КРОК на базе технологий Symantec
Центр решений КРОК на базе технологий SymantecЦентр решений КРОК на базе технологий Symantec
Центр решений КРОК на базе технологий SymantecКРОК
 
La valutazione dei servizi eco sistemici forniti dal suolo per la pianificazi...
La valutazione dei servizi eco sistemici forniti dal suolo per la pianificazi...La valutazione dei servizi eco sistemici forniti dal suolo per la pianificazi...
La valutazione dei servizi eco sistemici forniti dal suolo per la pianificazi...Fabrizio Ungaro
 
Devising a successful Social Media Campaign
Devising a successful Social Media CampaignDevising a successful Social Media Campaign
Devising a successful Social Media CampaignDana Poole
 

Viewers also liked (17)

Финансовые компании глазами клиентов: особенности восприятия
Финансовые компании глазами клиентов: особенности восприятияФинансовые компании глазами клиентов: особенности восприятия
Финансовые компании глазами клиентов: особенности восприятия
 
Idea de negocio seminario G Y E Los Libertadores
Idea de negocio seminario G Y E Los Libertadores Idea de negocio seminario G Y E Los Libertadores
Idea de negocio seminario G Y E Los Libertadores
 
EL SEXO CON NATURALIDAD
EL SEXO CON NATURALIDADEL SEXO CON NATURALIDAD
EL SEXO CON NATURALIDAD
 
Geek
GeekGeek
Geek
 
CorporateWellness
CorporateWellnessCorporateWellness
CorporateWellness
 
Mat102 20140826 - solving 2-step linear inequations
Mat102   20140826 - solving 2-step linear inequationsMat102   20140826 - solving 2-step linear inequations
Mat102 20140826 - solving 2-step linear inequations
 
Мистецька інтервенція в урбаністичний простір міста
Мистецька інтервенція в урбаністичний простір містаМистецька інтервенція в урбаністичний простір міста
Мистецька інтервенція в урбаністичний простір міста
 
Nuevas tecnologias
Nuevas tecnologiasNuevas tecnologias
Nuevas tecnologias
 
Lehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketa
Lehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketaLehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketa
Lehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketa
 
partes de word
partes de wordpartes de word
partes de word
 
Cómo unirse a un grupo e twinning
Cómo unirse a un grupo e twinningCómo unirse a un grupo e twinning
Cómo unirse a un grupo e twinning
 
Challenges in intensifying India smallholder dairy production: Health risks a...
Challenges in intensifying India smallholder dairy production: Health risks a...Challenges in intensifying India smallholder dairy production: Health risks a...
Challenges in intensifying India smallholder dairy production: Health risks a...
 
Informe de flores mjaj
Informe de flores mjaj Informe de flores mjaj
Informe de flores mjaj
 
Центр решений КРОК на базе технологий Symantec
Центр решений КРОК на базе технологий SymantecЦентр решений КРОК на базе технологий Symantec
Центр решений КРОК на базе технологий Symantec
 
filming editing
filming editing filming editing
filming editing
 
La valutazione dei servizi eco sistemici forniti dal suolo per la pianificazi...
La valutazione dei servizi eco sistemici forniti dal suolo per la pianificazi...La valutazione dei servizi eco sistemici forniti dal suolo per la pianificazi...
La valutazione dei servizi eco sistemici forniti dal suolo per la pianificazi...
 
Devising a successful Social Media Campaign
Devising a successful Social Media CampaignDevising a successful Social Media Campaign
Devising a successful Social Media Campaign
 

Similar to EC-Council Module on Legal Compliance and Security Standards

Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Envision Technology Advisors
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraRapid7
 
HIPAA Security Audits in 2012-What to Expect. Are You Ready?
HIPAA Security Audits in 2012-What to Expect. Are You Ready?HIPAA Security Audits in 2012-What to Expect. Are You Ready?
HIPAA Security Audits in 2012-What to Expect. Are You Ready?Redspin, Inc.
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachEMC
 
Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Aegify Inc.
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA TrainingJonathan Montes
 
Hipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideHipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideFelipe Prado
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
White Paper HIPAA Enforcement 04
White Paper HIPAA Enforcement 04White Paper HIPAA Enforcement 04
White Paper HIPAA Enforcement 04Daniel Solove
 
Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Patton Boggs LLP
 
HCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 of
HCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 ofHCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 of
HCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 ofJeanmarieColbert3
 
How to Build a HIPAA-Compliant Software Application
How to Build a HIPAA-Compliant Software ApplicationHow to Build a HIPAA-Compliant Software Application
How to Build a HIPAA-Compliant Software ApplicationXDuce Corporation
 
Hipaa checklist for healthcare software
Hipaa checklist for healthcare softwareHipaa checklist for healthcare software
Hipaa checklist for healthcare softwareConcetto Labs
 
HIPAA Panel Discussion
HIPAA Panel Discussion HIPAA Panel Discussion
HIPAA Panel Discussion Dan Wellisch
 
Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012Redspin, Inc.
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceJim Anfield
 

Similar to EC-Council Module on Legal Compliance and Security Standards (20)

Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH Era
 
HIPAA Security Audits in 2012-What to Expect. Are You Ready?
HIPAA Security Audits in 2012-What to Expect. Are You Ready?HIPAA Security Audits in 2012-What to Expect. Are You Ready?
HIPAA Security Audits in 2012-What to Expect. Are You Ready?
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
 
Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA Training
 
Hipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideHipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guide
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
White Paper HIPAA Enforcement 04
White Paper HIPAA Enforcement 04White Paper HIPAA Enforcement 04
White Paper HIPAA Enforcement 04
 
Hipaa
HipaaHipaa
Hipaa
 
Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...
 
HCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 of
HCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 ofHCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 of
HCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 of
 
How to Build a HIPAA-Compliant Software Application
How to Build a HIPAA-Compliant Software ApplicationHow to Build a HIPAA-Compliant Software Application
How to Build a HIPAA-Compliant Software Application
 
Hipaa checklist for healthcare software
Hipaa checklist for healthcare softwareHipaa checklist for healthcare software
Hipaa checklist for healthcare software
 
HIPAA Panel Discussion
HIPAA Panel Discussion HIPAA Panel Discussion
HIPAA Panel Discussion
 
HIPAA Tittle II
HIPAA Tittle IIHIPAA Tittle II
HIPAA Tittle II
 
Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012
 
arcsight_scmag_hcspecial
arcsight_scmag_hcspecialarcsight_scmag_hcspecial
arcsight_scmag_hcspecial
 
HIPAA
HIPAAHIPAA
HIPAA
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA Compliance
 

Recently uploaded

Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |aasikanpl
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
TOTAL CHOLESTEROL (lipid profile test).pptx
TOTAL CHOLESTEROL (lipid profile test).pptxTOTAL CHOLESTEROL (lipid profile test).pptx
TOTAL CHOLESTEROL (lipid profile test).pptxdharshini369nike
 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)DHURKADEVIBASKAR
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxEran Akiva Sinbar
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett SquareIsiahStephanRadaza
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555kikilily0909
 
Cytokinin, mechanism and its application.pptx
Cytokinin, mechanism and its application.pptxCytokinin, mechanism and its application.pptx
Cytokinin, mechanism and its application.pptxVarshiniMK
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxpriyankatabhane
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiologyDrAnita Sharma
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 

Recently uploaded (20)

Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
TOTAL CHOLESTEROL (lipid profile test).pptx
TOTAL CHOLESTEROL (lipid profile test).pptxTOTAL CHOLESTEROL (lipid profile test).pptx
TOTAL CHOLESTEROL (lipid profile test).pptx
 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett Square
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555
 
Cytokinin, mechanism and its application.pptx
Cytokinin, mechanism and its application.pptxCytokinin, mechanism and its application.pptx
Cytokinin, mechanism and its application.pptx
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiology
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 

EC-Council Module on Legal Compliance and Security Standards