enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Medical data breach - Wikipedia

    en.wikipedia.org/wiki/Medical_data_breach

    Medical data, including patients' identity information, health status, disease diagnosis and treatment, and biogenetic information, not only involve patients' privacy but also have a special sensitivity and important value, which may bring physical and mental distress and property loss to patients and even negatively affect social stability and national security once leaked.

  3. Protected health information - Wikipedia

    en.wikipedia.org/wiki/Protected_health_information

    Names; All geographical identifiers smaller than a state, except for the initial three digits of a zip code if, according to the current publicly available data from the U.S. Bureau of the Census: the geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; the initial three digits of a zip code for all such geographic units ...

  4. Health Insurance Portability and Accountability Act - Wikipedia

    en.wikipedia.org/wiki/Health_Insurance...

    Under HIPAA, HIPAA-covered health plans are now required to use standardized HIPAA electronic transactions. See, 42 USC § 1320d-2 and 45 CFR Part 162. Information about this can be found in the final rule for HIPAA electronic transaction standards (74 Fed. Reg. 3296, published in the Federal Register on January 16, 2009), and on the CMS website.

  5. Data breach - Wikipedia

    en.wikipedia.org/wiki/Data_breach

    A data breach is a violation of "organizational, regulatory, legislative or contractual" law or policy [2] that causes "the unauthorized exposure, disclosure, or loss of personal information". [1] Legal and contractual definitions vary.

  6. Data breach notification laws - Wikipedia

    en.wikipedia.org/wiki/Data_breach_notification_laws

    Data breach notification laws have two main goals. The first goal is to allow individuals a chance to mitigate risks against data breaches. The second goal is to promote company incentive to strengthen data security. [2] Together, these goals work to minimize consumer harm from data breaches, including impersonation, fraud, and identity theft. [3]

  7. Personal health record - Wikipedia

    en.wikipedia.org/wiki/Personal_health_record

    The term "personal health record" is not new. The term was used as early as June 1978, [2] and in 1956, there was a reference was made to a "personal health log." [3] The term "PHR" may be applied to both paper-based and computerized systems; [4] usage in the late 2010s usually implies an electronic application used to collect and store health data.

  8. Telehealth - Wikipedia

    en.wikipedia.org/wiki/Telehealth

    Telehealth is sometimes discussed interchangeably with telemedicine, the latter being more common than the former. The Health Resources and Services Administration distinguishes telehealth from telemedicine in its scope, defining telemedicine only as describing remote clinical services, such as diagnosis and monitoring, while telehealth includes preventative, promotive, and curative care ...

  9. Personal Health Information Protection Act - Wikipedia

    en.wikipedia.org/wiki/Personal_Health...

    Section 2: Practices to Protect Health Information details the required practices for the handling of personal health information and health records. Accountability of information is also discussed. Section 3: Consent Concerning Personal Health Information discusses consent for the use, collection and disclosure of personal health information ...