Reference Hub8
Scrutinizing the Rule: Privacy Realization in HIPAA

Scrutinizing the Rule: Privacy Realization in HIPAA

S. Al-Fedaghi
Copyright: © 2008 |Volume: 3 |Issue: 2 |Pages: 16
ISSN: 1555-3396|EISSN: 1555-340X|ISSN: 1555-3396|EISBN13: 9781615202935|EISSN: 1555-340X|DOI: 10.4018/jhisi.2008040104
Cite Article Cite Article

MLA

Al-Fedaghi, S. "Scrutinizing the Rule: Privacy Realization in HIPAA." IJHISI vol.3, no.2 2008: pp.32-47. http://doi.org/10.4018/jhisi.2008040104

APA

Al-Fedaghi, S. (2008). Scrutinizing the Rule: Privacy Realization in HIPAA. International Journal of Healthcare Information Systems and Informatics (IJHISI), 3(2), 32-47. http://doi.org/10.4018/jhisi.2008040104

Chicago

Al-Fedaghi, S. "Scrutinizing the Rule: Privacy Realization in HIPAA," International Journal of Healthcare Information Systems and Informatics (IJHISI) 3, no.2: 32-47. http://doi.org/10.4018/jhisi.2008040104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Privacy policies, laws, and guidelines have been cultivated based on overly verbose specifications. This article claims that privacy regulations lend themselves to a firmer language based on a model of flow of personal identifiable information. The model specifies a limited number of situations and acts on personal identifiable information. As an application of the model, the model is applied to portions of the Privacy Rule of Health Insurance Portability and Accountability Act (HIPAA).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.