iTnews

NIST releases HIPAA resource guide

By Marcia Savage on Mar 29, 2005 6:42PM

The National Institute of Standards and Technology (NIST) has released a guide that federal agencies can use to help them understand HIPAA's security requirements.

The HIPAA Security Rule sets out requirements for protecting electronic protected health information. Organizations affected by HIPAA face an April 20 deadline for compliance with rule, except for small entities, which have another year to comply.

The NIST Special Publication 800-66 summarizes the HIPAA security standards and aims to educate readers about the terms used in the HIPAA Security Rule and to help them understand the meaning of the security standards.

The NIST guide is intended to help federal agencies understand the HIPAA Security Rule, but state and local governments as well as private companies are encouraged to consider the guidelines too.

www.nist.gov

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
guidehipaanistreleasesresourcesecurity

Partner Content

DoT Victoria turns to Oracle to implement unified cloud-based platform
Promoted Content DoT Victoria turns to Oracle to implement unified cloud-based platform
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Teaching tech teams every step of implementing a machine learning project
Promoted Content Teaching tech teams every step of implementing a machine learning project
Security through visibility: supporting Essential Eight cyber mitigation strategies
Promoted Content Security through visibility: supporting Essential Eight cyber mitigation strategies

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Marcia Savage
Mar 29 2005
6:42PM
0 Comments

Related Articles

  • Apple patches actively exploited macOS Big Sur bug
  • Apple's "Find My" feature created attack vector, researchers say
  • RBA pushes first IaaS workload into Azure
  • EU governments, lawmakers agree on tougher cyber security rules for key sectors
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

Telstra to open its 5G network to wholesale customers

Telstra to open its 5G network to wholesale customers

Macquarie Bank creates a broker portal on Salesforce

Macquarie Bank creates a broker portal on Salesforce

Active Directory defaults lead to no-fix PrivEsc vulnerability

Active Directory defaults lead to no-fix PrivEsc vulnerability

Digital Nation

As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.