Date Published: October 2008
Supersedes: SP 800-66 (March 2005)
Author(s)
Matthew Scholl (NIST), Kevin Stine (NIST), Joan Hash (NIST), Pauline Bowen (NIST), L. Johnson (NIST), Carla Smith (BAH), Daniel Steinberg (BAH)
Special Publication 800-66 Rev. 1, An Introductory Resource Guide for Implementing the Health Insurance Probability and Accountability Act (HIPAA) Security Rule, which discusses security considerations and resources that may provide value when implementing the requirements of the HIPAA Seucurity Rule, was written to help educate readers about information security terms used in the HIPAA Security Rule and to improve understanding of the meaning of the security standards set out itn the Security Rule, direct readers to helpful information in other NIST publications on individual topics the HIPAA Security Rule addresses, and aid readers in understanding the security concepts discussed in the HIPAA Security Rule. This publication does not supplement, replace, or supersede the HIPAA Security Rule itself.
Special Publication 800-66 Rev. 1, An Introductory Resource Guide for Implementing the Health Insurance Probability and Accountability Act (HIPAA) Security Rule, which discusses security considerations and resources that may provide value when implementing the requirements of the HIPAA Seucurity...
See full abstract
Special Publication 800-66 Rev. 1, An Introductory Resource Guide for Implementing the Health Insurance Probability and Accountability Act (HIPAA) Security Rule, which discusses security considerations and resources that may provide value when implementing the requirements of the HIPAA Seucurity Rule, was written to help educate readers about information security terms used in the HIPAA Security Rule and to improve understanding of the meaning of the security standards set out itn the Security Rule, direct readers to helpful information in other NIST publications on individual topics the HIPAA Security Rule addresses, and aid readers in understanding the security concepts discussed in the HIPAA Security Rule. This publication does not supplement, replace, or supersede the HIPAA Security Rule itself.
Hide full abstract
Keywords
Information Security; Healthcare; HIPAA; security rule
Control Families
Access Control;
Audit and Accountability;
Awareness and Training;
Security Assessment and Authorization;
Contingency Planning;
Identification and Authentication;
Incident Response;
Media Protection;
Personnel Security;
Physical and Environmental Protection;
Planning;
Risk Assessment;
System and Communications Protection;
System and Information Integrity;
System and Services Acquisition;