1/9
HI
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Health Information Privacy
Protecting patient data from unauthorized access
Data Security
Safeguarding data from loss, theft, or corruption
Encryption
Converting data into a secure code for protection
Authentication
Verifying user identity before system access
Audit Logs
Tracking who accessed or modified data
Cybersecurity Threats
Risks such as malware, phishing, and hacking
Access Levels
Different permissions for users depending on role
Confidentiality
Ensuring patient information is only shared appropriately
HIPAA Security Rule
Standards to protect electronic health information
Breach Notification
Requirement to inform affected parties after a data breach