|
- What is PHI? - HHS. gov
PHI stands for Protected Health Information The HIPAA Privacy Rule provides federal protections for personal health information held by covered entities and gives patients an array of rights with respect to that information
- 为什么有的希腊字母会有好几个字符,比如「ϕ」和「Φ」? - 知乎
为了避免 phi 的大写与符号弄混,当时在作业和试卷里,我会在大写的竖画两端刻意加上衬线。 希腊字母在国家标准 GB2312 里也有相应的编码值,如图中所示。 然而,这三个字母的符号却没有定义编码,给理工书刊的排版造成了困难。
- Summary of the HIPAA Privacy Rule - HHS. gov
Statutory and Regulatory Background The Health Insurance Portability and Accountability Act of 1996 (HIPAA), Public Law 104-191, was enacted on August 21, 1996 Sections 261 through 264 of HIPAA require the Secretary of HHS to publicize standards for the electronic exchange, privacy and security of health information Collectively these are known as the Administrative Simplification provisions
- Protected Health Information | HHS. gov
354-Does the HIPAA Privacy Rule protect genetic information Genetic information is health information protected by the Privacy Rule Like other health information, to
- Standards for Privacy of Individually Identifiable Health Info
For uses of PHI, the policies and procedures must identify the persons or classes of persons within the covered entity who need access to the information to carry out their job duties, the categories or types of PHI needed, and conditions appropriate to such access
- Research - HHS. gov
This guidance explains certain requirements for an authorization to use or disclose PHI for future research The guidance also clarifies aspects of the individual’s right to revoke an authorization for research uses and disclosures of PHI
- Understanding Some of HIPAA’s Permitted Uses and Disclosures
The other fact sheet, Permitted Uses and Disclosures: Exchange for Treatment, illustrates how HIPAA supports sharing of PHI between and among health care providers in order to treat or coordinate care for their patients
- HHS Office for Civil Rights Settles HIPAA Security Rule Investigation . . .
HHS settlement resolves investigation into potential HIPAA security rule failures exploited by a malicious insider
|
|
|